NIOS 8.6.x Documentation
NIOS 8.6.x Documentation
NIOS 8.6.x Documentation
x Documentation
06/14/2022
Infoblox NIOS 8.6.x
Contents
What's New ......................................................................................................................................................3
Getting Started ...............................................................................................................................................10
Support Matrix ................................................................................................................................................23
Installing NIOS ...............................................................................................................................................24
Upgrading NIOS .............................................................................................................................................26
Using the Grid Manager Interface ..................................................................................................................58
Administering NIOS......................................................................................................................................182
Using NIOS APIs ........................................................................................................................................1916
Using the NIOS CLI....................................................................................................................................1917
Reference Information................................................................................................................................2088
This command is a maintenance mode command and has no arguments. Only superusers can execute this command.
The value of password and enable password in the output of the configuration file commands such as show bfd are
encrypted when you run the command. For more information, see the set regenerate_anycast_password.
New Port Placements for the Infoblox 2205 and Infoblox 4005 Series
Appliances
The front panels of the Infoblox 2205 Series and the Infoblox 4005 Series have been modified to have slots for the four
ports (LAN2, HA, LAN1, MGMT) at the right. However, the Infoblox 2205 and Infoblox 4005 Series models that have the
Infoblox BloxConnect
The Infoblox Customer Experience Improvement Program is now called Infoblox BloxConnect. This screen appears
when you first log in to Grid Manager. The Infoblox Customer Experience Improvement Program checkbox used to
configure BloxConnect, has now been renamed to BloxConnect Data Collection and Opt-Out Notice. For information
about configuring BloxConnect, see the Setting Login Options.
New CLI Command to Set DNS and Anycast Start and Restart
(RFE-10176)
This release of NIOS introduces the following commands:
• set restart_anycast_with_dns_restart: sets DNS and anycast start and restart sequences. This command
brings down the anycast service during the DNS restart or stops and redirects the traffic on the IP address of
anycast to another site. You can use this command only on Grid Master.
• show restart_anycast_with_dns_restart: displays the status of the set restart_anycast_with_dns_restart
command.
For more information about these commands, see the set restart_anycast_with_dns_restart and show
restart_anycast_with_dns_restart topics.
Unbound Upgrade
The Unbound version has been upgraded to 1.10.1.
To... See...
Understand the underlying architecture of various NIOS features and SSL and TLS Protocols
components
Get familiar with the Grid Manager interface About the Grid Manager Interface
Create and manage administrator, users, roles, and groups Managing Administrators
Learn about different types of licenses and how to add and manage licenses Managing Licenses
Add Bookmark Adds a bookmark for an object and displays it in the Bookmarks panel
Search Head Indicates that the reporting member functions as a search head
View Lists data in the current panel or lists detailed status about an object
Configure • Configures DHCP properties • Data Management tab -> DHCP tab
• Configures File Distribution -> Toolbar
properties • Data Management tab -> DHCP tab
• Configures Licenses -> Toolbar
• Grid tab-> Grid Manager tab ->
Toolbar
Conflict Indicates an IP address conflict Data Management tab -> IPAM tab -> Net Map
Convert Converts an object Data Management tab -> IPAM tab ->
network -> IP Map -> Toolbar
Discovery Performs a network discovery Data Management tab -> IPAM tab -> Toolbar
Force HA Failover Forces an HA failover Data Management tab -> DHCP tab -> Toolbar
Force Recovery Forces a recovery Data Management tab -> DHCP tab -> Members
tab -> Failover Associations tab -> Toolbar
Grid Manager Indicates the Grid Master Data Management tab -> DHCP tab -> Members
tab ->
Data Management tab -> IPAM tab
Grid Manager Candidate Indicates the Grid Master candidate Data Management tab -> DHCP tab -> Members
tab ->
Data Management tab -> IPAM tab
Grid Member Indicates the Grid member Data Management tab -> DHCP tab -> Members
tab ->
Data Management tab -> IPAM tab
Join Joins networks Data Management tab -> IPAM tab ->
network -> Toolbar
Key-signing Key Rollover Indicates the key-signing key that is due to rollover Data Management tab -> DNS tab
Microsoft Server Indicates a Microsoft server Data Management tab -> DHCP tab -> Members
tab ->
Data Management tab -> IPAM tab
Multi-Ping Pings all the addresses in a network Data Management tab -> IPAM tab -> IP Map ->
Toolbar
Network Container Indicates a non-cloud network container Data Management tab -> IPAM tab or DHCP tab
Network Indicates a non-cloud network or a leaf network in Data Management tab -> IPAM tab or DHCP tab
a network container
Network Container (for Indicates a cloud network container Cloud tab -> Networks tab or
Cloud platform appliance) Data Management tab -> IPAM tab or DHCP tab
Network (for Cloud Indicates a cloud network Cloud tab -> Networks tab or
platform appliance) Data Management tab -> IPAM tab or DHCP tab
Network (Disabled) Indicates a disabled network Data Management tab -> IPAM tab or DHCP tab
Microsoft Network Indicates a network with Microsoft servers Data Management tab -> IPAM tab or DHCP tab
Infoblox Network Indicates a network with Infoblox appliances Data Management tab -> IPAM tab or DHCP tab
Ping Pings an IP address Data Management tab -> IPAM tab -> IP Map ->
Toolbar
Properties Configures Grid DNS properties Data Management tab -> DNS tab -> Toolbar
Reclaim Reclaims an IP address Data Management tab -> IPAM tab -> IP Map ->
Toolbar
Resize Resizes a network Data Management tab -> IPAM tab ->
network -> Toolbar
Resolve Conflict Resolves an IP address conflict Data Management tab -> IPAM tab -> IP Map ->
Toolbar
Set Partner Down Sets partner down Data Management tab -> DHCP tab -> Members
tab -> Failover Associations tab -> Toolbar
Split Network Splits a network Data Management tab -> IPAM tab -> network ->
Toolbar
DNSSEC status Displays status for DNSSEC Data Management tab -> DNS tab -> Toolbar
Secondary Zone Status Displays status for the secondary zone Data Management tab -> DNS tab
Zoom In Zooms in to the selected network Data Management tab -> IPAM tab -> Net Map
Zoom Out Zooms out from the selected network Data Management tab -> IPAM tab -> Net Map
Directory Indicates a directory Data Management tab -> File Distribution tab
Smart Folder (Group By) Lists smart folders in a group-by list Smart Folders tab
Smart Folder (Link) Indicates a link to the smart folder Smart Folders tab and other selectors
Backup Backs up the configuration file and Grid tab-> Grid Manager tab -> Toolbar
database
Restore Restores the configuration file and Grid tab-> Grid Manager tab -> Toolbar
database
bloxTools Performs bloxTools services Grid tab-> Grid Manager tab -> Toolbar
Certificate Creates, generates, uploads, or Grid tab-> Grid Manager tab -> Toolbar
downloads an HTTPS certificate
Control Restarts, reboots, or shuts down a Grid tab-> Grid Manager tab -> Members tab ->
member member -> Toolbar
Manage Services Manages member services Grid tab-> Grid Manager tab -> Members tab -> member
Syslog Displays the syslog file Grid tab-> Grid Manager tab -> Members tab -> member ->
Toolbar
Traffic Capture Captures the traffic report on a member Grid tab-> Grid Manager tab -> Members tab -> member ->
Toolbar
Execute Now Executes a scheduled task immediately Administration tab -> Toolbar
DNS View Mapping Maps NIOS DNS view to GLB DNS view
Glossary of Terms
The following table provides descriptions of some key terminology used in the Infoblox products. Some terms, such as
Grids and high availability, are used in different ways by other networking product vendors. The alphabetically arranged
table can help you understand the terms and concepts as Infoblox uses them and as they are used in this guide.
Active Node The NIOS appliance in an HA (high availability) pair that receives, processes, and responds
to all service requests. When an HA failover occurs, the active node becomes the passive
node in the HA pair.
API (Application Programming Interface) A set of rules and specifications that software programs follow to communicate with each
other. It serves as an interface between different software programs and facilitates their
interaction. Infoblox provides a Perl API to help facilitate the integration of Infoblox NIOS
appliances into network environments. It is an alternate method to the GUI (graphical user
interface) in which you use a mouse pointer to click and select options and items to perform
tasks.
Authenticated DHCP The process of authenticating a network device before a DHCP server assigns a lease. On
Infoblox appliances, you can divide a network into segments for unauthenticated,
authenticated, and guest users. The Infoblox DHCP server assigns clients to the
appropriate segment based on their MAC addresses and authentication credentials.
BIND (Berkeley Internet Name Domain) The most commonly used DNS server on the Internet. It allows a standard way to name
objects and resource records in distributed UNIX environments. It also provides operations
to store and retrieve information of these objects and records.
bloxSYNC An Infoblox proprietary mechanism for secure, real-time synchronization of the database
that maintains the data, system configuration, and protocol service configuration between
the active and passive nodes of an HA pair. With bloxSYNC, the nodes continuously
synchronize changes of their configurations and states. When a failover occurs, the passive
node can quickly take over services from the active node.
bloxTools An Infoblox pre-installed environment provides tools to create custom applications that
facilitate administrative tasks for an organization.
Captive Portal An Infoblox service that you enable on Grid members to register users, guest users, or both
types of users for authentication purposes on network segments that you define using the
authenticated DHCP feature.
CIDR (Classless Inter-Domain Routing) Notation A compact specification of an IPv4 or IPv6 address and its associated routing prefix. For
example, the CIDR notation of 192.168.100.1/24 represents the IPv4 address of
192.168.100.1 and its routing prefix of 192.168.100.0, or its subnet mask of 255.255.255.0.
The CIDR notation of 2001:DB8::/48 represents the IPv6 addresses from
2001:DB8:0:0:0:0:0:0 to 2001:DB8:0:FFFF:FFFF:FFFF:FFFF:FFFF.
CLI (Command-line Interface) A way to interact with Infoblox products by typing text-only commands to perform specific
tasks.
Dashboard Your home page on Infoblox Multi-Grid Manager, Grid Manager, and System Manager. It
provides easy access to tasks and to the status of your Grids and networks. It also provides
various widgets for viewing and managing data.
DDNS (Dynamic DNS) The automatic updating of real-time DNS configuration changes and other information on a
DNS server when a network device is assigned a new IP address.
DHCP (Dynamic Host Configuration Protocol) A configuration protocol that provides address assignments to network devices within a
network. It keeps track of network configuration for each network device.
DHCP Failover Association The pairing of two DHCP servers that establish a TCP connection for their communications.
The servers form a pair of DHCP failover peers and provide DHCP protocol redundancy to
minimize DHCP service outages.
DHCP Filter A set of criteria and rules used to screen requesting hosts by matching MAC addresses,
relay agent identifiers, DHCP options, or RADIUS authentication results.
DHCP Template A set of predefined properties that you use to create IPv4 and IPv6 DHCP objects, such as
networks and DHCP ranges, on the Infoblox appliance.
DIW (Data Import Wizard) An Infoblox software tool that facilitates the import of DNS, DHCP, and TFTP data from
legacy servers to Infoblox NIOS appliances. DIW supports DNS data import in the following
formats: BIND 9, BIND 8, BIND 4, Microsoft DNS, Lucent VitalQIP, and Nortel NetID. It
supports DHCP data import in the following formats: ISC DHCP, Microsoft DHCP, Lucent
VitalQIP, and Nortel NetID.
DNS (Domain Name System) A hierarchical naming system that translates domain names of any network devices into IP
addresses for the purpose of locating and addressing these devices worldwide.
DNS View On Infoblox appliances, a DNS view provides the ability to serve one version of DNS data
to one set of clients and another version to another set of clients. With DNS views, the
Infoblox appliance can provide a different answer to the same DNS query, depending on
the source and match destinations of the query.
DNSSEC (Domain Name System Security Extensions) A suite of IETF (Internet Engineering Task Force) specifications to secure certain kinds of
information provided by DNS for use on IP networks. It is a set of extensions to DNS, which
provide DNS resolvers with the original authentication of DNS data, authenticated denial of
existence, and data integrity.
DNSone™ The software package that enables Infoblox appliances to provide DNS, DHCP and TFTP
services. You can add the Grid upgrade to Infoblox appliances running DNSone.
Endpoint An IP device such as a personal computer, laptop, or mobile handheld device. This term is
often used in a security context.
Filters Criteria the Infoblox NIOS appliance uses to request specific information in the database.
You can use filters to control the amount and the kind of data displayed in a panel or table
in Infoblox Multi-Grid Manager, Grid Manager, and System Manager.
FQDN (fully qualified domain name) A complete domain name that specifies its exact location in the hierarchy of the DNS. It
specifies all the domain levels, including the top-level domain and the root domain.
FTP (File Transfer Protocol) A standard network protocol used to transfer files from one network device to another over
a TCP-based network, such as the Internet. FTP is built on a client-server architecture and
utilizes separate control and data connections between the client and server.
Gateway The default router for the immediate network segment of an interface.
Grid™ Technology Infoblox's unique and patented high availability Grid technology ensures network reliability.
The Infoblox Grid provides resilient network services, failover, recovery, and seamless
maintenance for an Infoblox deployment inside a single building, across a networked
campus, or between remote locations. The Infoblox Grid establishes a distributed
relationship between individual or paired appliances to remove single points of failure and
other operational risks inherent in legacy DNS, DHCP, and IP address management
infrastructure.
Grid Manager The NIOS web interface that provides access to your Grid for performing IPAM, DNS, and
DHCP management and other administration tasks.
Grid Master The Grid member in an Infoblox Grid that maintains the NIOS database that is distributed
among all members of the Grid. You connect to the Grid Master to configure and monitor
the entire Grid.
Grid Member Any single Infoblox NIOS appliance or HA pair that belongs to a Grid. Each member can
use the data and services of the Grid. You can also modify settings so that a Grid member
can use unique data and member-specific services.
HA Pair Two physical Infoblox NIOS appliances that are linked to perform as a single virtual
appliance in an HA (high availability) configuration. The HA configuration provides hardware
redundancy to minimize service outages. In this configuration, one appliance is the active
node and the other is the passive node.
Host Record On Infoblox appliances, host records provide a unique approach that enables you to
manage multiple DNS records and DHCP and IPAM data collectively, as one object on the
appliance.
IBOS (Infoblox Orchestration Server) IBOS is the Infoblox IF-MAP (Interface to Metadata Access Points) server that contains a
searchable database for storing state information about network resources. It is the central
point with which IF-MAP clients communicate to send and retrieve real-time information
defined in the IF-MAP data format.
IF-MAP (Interface for Metadata Access Points) An open standard client-server protocol developed by the Trusted Computing Group as one
of the core protocols of the TNC (Trusted Network Connect) open architecture. IF-MAP
allows network resources to share real-time information.
IP Map In Infoblox Grid Manager or System Manager, this is a graphical representation of all IPv4
addresses in a given subnet.
IPAM (IP Address Management) Infoblox IPAM provides a means of planning, tracking, and managing IP address space in a
network. It glues DNS and DHCP services together so that each service is aware of
changes in the other. The Infoblox IPAM implementation offers an IP address-centric
approach so you can manage your networks and IP addresses through a centralized GUI.
License Pool A license pool is a container associated with the Grid and holds dynamic licenses for a
specific feature. Licenses in the pool can be dynamically allocated to and deallocated from
Grid members. When not in use, dynamic licenses are released back to the pool for future
allocation. There is no expiration for dynamic licenses.
Limited-Access User An admin user account that has specific roles and permissions assigned. Limited-access
users have restricted access to Infoblox Multi-Grid Manager, Grid Manager, and System
Manager, and can only perform certain tasks based on their assigned roles and
permissions.
Lite Upgrade On Infoblox appliances, a lite upgrade occurs when there are incremental changes to the
NIOS software that do not require any change to the database. The appliance can perform
a lite upgrade only if the format of the database between the existing NIOS version and the
upgrade version is the same. In general, when you upgrade from a major release to a patch
release or a patch release to another patch release, you are performing a lite upgrade.
Loopback Interface On Infoblox appliances, the virtual network interface on which you can consolidate DNS
servers for migration purposes, add anycast addresses to improve the performance of the
DNS service, and separate DNS traffic.
Managing Member An Infoblox Grid member that is configured to manage Microsoft DNS and DHCP servers.
Master Candidate An Infoblox Grid member that is designated to assume the role of the Grid Master as a
disaster recovery measure.
Master Grid A group of Infoblox appliances that are connected to provide a single point of administration
for multiple Grids and network management of these Grids.
Master Grid Member Any single Infoblox appliance or HA pair that belongs to the Master Grid. All Master Grid
members serve as Master Candidates.
Multi-Grid Manager The NIOS web interface that provides access to the Master Grid, from which you can
manage multiple Grids and their networks.
Multi-Grid Master The Infoblox Master Grid member that maintains the NIOS database that is distributed
among all Master Grid members. You connect to Multi-Grid Manager to configure and
monitor the Master Grid.
Multi-Grid Master Candidate An Infoblox Master Grid member that is designated to assume the role of the Multi-Grid
Master as a disaster recovery measure.
Name Server Group On Infoblox appliances, a server group that contains one primary DNS server and/or one or
more secondary DNS servers. Specifying a single name server group can simplify DNS
zone creation.
NAT (Network Address Translation) Group A group of Infoblox Grid members that are configured on the same side of a NAT appliance.
In a Grid configuration where the Grid Master is configured behind a NAT appliance and
there are Grid members on both sides of the NAT appliance, it is necessary to create a NAT
group to ensure that the Grid Master and Grid members use the correct NAT and interface
addresses for Grid communications.
Network Block On Infoblox appliances, an IP address space that is defined in the Master Grid. A network
block can consist of other network blocks, network containers, and leaf networks.
Network Container On Infoblox appliances, an automatically created container of multiple networks that are
subnets of the IP address space configured for the network container. A network container
cannot be assigned to a Grid member or be directly created.
Network Discovery A set of tools provided by the Infoblox NIOS appliance for detecting active hosts on
specified networks and specified VMware vSphere servers.
Network Mask or Netmask A numeric representation of the bits that are used to split an IP address into the network
portion and the host portion. In Infoblox products, this is represented by either quad-dotted
decimal representation or CIDR notation for IPv4 network masks, or by CIDR notation for
IPv6 network masks.
Network View On Infoblox appliances, a single routing domain with its own networks and shared
networks. A network view can contain both IPv4 and IPv6 networks. All networks must
belong to a network view on the Infoblox appliance.
NIOS An Infoblox proprietary system that powers Infoblox solutions with an embedded processor
that delivers core network services. It is the operating system that runs on the NIOS
appliances—a security-hardened, real-time set of appliances built to ensure the non-stop
operation of network infrastructure. NIOS automates the error-prone and time-consuming
manual tasks associated with deploying and managing IPAM, DNS, and DHCP required for
continuous IP network availability and business uptime.
NIOS Virtual Appliance Any Infoblox supported platform, such as AWS, VMWare, Azure appliances that runs the
vNIOS software. These appliances are also known as the vNIOS appliances.
Node A single Infoblox appliance of an HA (high availability) pair. An HA pair consists of an active
node and a passive node.
NTP (Network Time Protocol) A protocol for synchronizing the clocks of computer systems over packet-switched, variable
latency data networks; it essentially keeps network devices on a common clock by resisting
the effects of variable latency by means of a jitter buffer.
Passive Node The Infoblox NIOS appliance in an HA pair that constantly keeps its database synchronized
with that of the active node, so it can take over core network services when an HA failover
occurs. When an HA failover occurs, the passive node becomes the active node in the HA
pair.
PortIQ An Infoblox switch port appliance that enables quick discovery of the Ethernet switch ports.
PortIQ identifies ports that are not fully utilized and those that exceed their capacity. You
can use PortIQ to troubleshoot LAN environments.
Quick Filter A filter that stores specific filter criteria for requesting information displayed in a specific
panel in Infoblox Multi-Grid Manager, Grid Manager, and System Manager. For more
information, see "Filter."
Overlapping Network On Infoblox appliances, a network that exists in multiple locations, which can be multiple
Grids in the Master Grid or within various network views in a Grid.
Replication Database distribution among the Infoblox Grid Master and Grid members as well as among
the Multi-Grid Master and Master Grid members.
Replication Factor (Reporting - Multi-Site Cluster) The number of copies of reporting data in each bucket that the cluster maintains.
Reservation On Infoblox appliances, a static IP address that you create for future use. A reservation is a
pre-provisioned fixed address. You can reserve this static IP address on the NIOS
appliance and assign it to a client in the future.
Resource Records A collection of data in the DNS server database. Each resource record specifies information
about a DNS object. For example, an A (address mapping) record maps a host name to an
IP address, and a PTR (reverse-lookup pointer) record maps an IP address to a host name.
The DNS server uses these records to answer queries.
Roaming Host On Infoblox appliances, a host with a dynamically assigned IP address and a specific set of
properties and DHCP options. When you create a roaming host for a network device, the
device can receive any dynamically assigned address from the network to which it belongs.
Search Factor The number of searchable copies of reporting data in each bucket that the cluster
maintains.
Shared Network On Infoblox appliances, a network segment to which you assign two or more subnets.
When subnets in a shared network contain IP addresses that are available for dynamic
allocation, the addresses are put into a common pool for allocation when client requests
arise.
Shared Record Group On Infoblox appliances, a set of resource records that you add to multiple DNS zones. You
can create resource records in a group and share the group among multiple zones. The
zones handle the shared resource records as any other resource record.
SSO (Single Sign On) An Infoblox feature that allows you to automatically sign in to selected Grids from the
Master Grid, without having to log in to each individual Grid each time you sign on.
Smart Folder On Infoblox appliances, a virtual folder in which you place the results of filter criteria that
you select to request specific data in the NIOS database. Once you set up a smart folder,
the appliance displays up-to-date information based on your filter and grouping criteria
each time you access the folder.
Subnet (or network) A logical division of an IP network. A subnet of network may also be called a network. For
example, 10.1.0.0/16 is a subnet of 10.0.0.0/8, and fc80:8:8:16::/64 is a subnet of
fc80:8:8::/48.
Superscope On a Microsoft server, superscope comprises multiple scopes or DHCP address ranges
created on a single physical network segment. Microsoft superscope information is
converted to equivalent network information after Microsoft data is synchronized with the
NIOS appliance.
Superuser An admin user account that has unrestricted access to Infoblox Multi-Grid Manager, Grid
Manager, or System Manager.
Support Bundle A tar.gz file that contains configuration files and system files of the Infoblox NIOS appliance.
You can download a support bundle for an independent appliance and for each member in
a Grid.
System Manager The NIOS web interface that provides access to an independent appliance (single or HA)
for performing IPAM, DNS, and DHCP management and other administration tasks.
TFTP (Trivial File Transfer Protocol) A data transfer service that provides devices—such as phones, RFID readers, IP cameras,
and other devices—with up-to-date software and configuration data.
Traffic Capture An Infoblox tools that captures the traffic on one or all of the ports on a NIOS appliance.
The NIOS appliance saves all captured traffic in a .cap file and compresses it into a .tar.gz
file.
Upgrade Group On Infoblox appliances, a group of Grid members that you put together so you can perform
software distribution and upgrade at the same time.
VIP (Virtual IP) On Infoblox appliances, the shared IP address of an HA pair. A VIP address links to the HA
port on the active node of an HA pair.
VRID (Virtual Router ID) VRID identifies the VRRP (Virtual Router Redundancy Protocol) HA pair to which the
Infoblox appliance belongs. Through VRID, two HA nodes identify each other as belonging
to the same HA pair, and they obtain a virtual MAC address to share with a VIP. A VRID can
be any number between 1 and 255, and it must be unique on the local LAN so that it does
not conflict with any other Infoblox appliances using VRRP on the same subnet.
vNIOS The virtual version of NIOS. You can install Infoblox vNIOS software on any supported
virtual platform and configure the system as a vNIOS virtual appliance.
Hardware Requirements
• (Minimum) 1.4 GHz CPU with 1 GB RAM available to the product GUI, and 256 Kbps connectivity to NIOS
appliance
• (Recommended) 2.0 GHz (or higher) dual core CPU with 2 GB RAM
• Monitor Resolution:
• 1280 x 768 (minimum)
• 1280 x 1024 or better (recommended)
Software Requirements
For CLI access:
• Secure Socket Shell (SSH) client that supports SSHv2
• Terminal emulation program, such as minicom or Hilgraeve Hyperterminal®
For Grid Manager:
• JavaScript
• SSL version 3
• TLS version 1 connection
Supported Browsers
For information about supported browsers, see the NIOS 8.6 Release Notes on the Infoblox Support Site.
Prerequisites
Before you begin the configuration, ensure that you have all the necessary components. The following are needed and
must be acquired before continuing with this guidance:
• Supported NIOS appliances
• A management station or computer from which you configure and manage the NIOS appliance. See Support
Matrix for the system and browser requirements.
• The IP address of the appliance on your network.
Supported Appliances
For the list of supported physical appliances and virtual appliances that NIOS is supported on, see the Release Notes.
Note
• Images of types .vhd and .raw comprise only one file each and can be resized. The minimum size of
the .vhd image is 250 GB and that of the .raw image is 43 GB.
• Infoblox recommends that you provision 70 GB or more disk space for the NIOS instance while
deploying resizable images.
• If you add members to a FIPS mode -enabled Grid Master, ensure that the members have the same
NIOS build version. That is, the same NIOS build must be installed on Grid Master and members before
joining. You can perform upgrades and install hotfixes in FIPS mode.
Note
• You cannot upgrade directly to NIOS 5.x from NIOS releases earlier than 4.2r4. Refer to the release
notes for the appropriate upgrade and revert paths.
• In a Grid that is configured with an HA pair, Infoblox does not recommend that you disconnect any node
of the HA Grid Master and then join it back after installing a NIOS version that does not match with the
current running version of NIOS on the other node. If an upgrade operation is performed this way, the
Grid displays an unexpected behavior and will need a manual intervention of the Support team to
recover the Grid.
• The shared secret that you enter when adding a RADIUS authentication server in the Add RADIUS
Authentication Service wizard > RADIUS Servers > Shared Secret field must be between 4 and 64
characters (inclusive) in length. Otherwise, the upgrade will fail.
Caution
Do not attempt to add or remove a member, or convert an HA pair to single members or vice versa during a
distribution or upgrade.
Note
When you upload the NIOS software upgrade to an HA Grid Master, only the active node receives the software.
The passive node does not. Therefore, if the Grid Master fails over before a distribution starts, you must upload
the software again. If you do not, the distribution fails because the new active node does not have the uploaded
software.
Scheduling Distributions
When you schedule a distribution, you schedule the distribution of the Grid Master as well as the upgrade groups,
including the Default group. The Grid Master distribution must always occur before the distribution of the upgrade groups.
To schedule a software distribution:
1. From the Grid tab, select the Upgrade tab, and then click Distribute -> Schedule Distribution from the Toolbar.
Managing Distributions
After you start a distribution, you can pause, resume, or stop it. For information, see Pausing and Resuming Distributions
and Stopping Distributions. Grid Manager displays the status of the overall distribution as well as the status of individual
members. You can view this information in the Upgrade tab.
Stopping Distributions
You can stop a distribution immediately, for example, if there are offline members and you do not want to wait for them to
come back online, or if you realize that you have uploaded the wrong software version. When you stop a distribution, you
can do the following:
• If the Grid Master has completed its distribution, you can upgrade the Grid immediately. This forces members that
do not have a complete distribution to synchronize their releases with the Grid Master.
Performing a software upgrade involves rebooting the appliances and then running the new software. Essentially, each
appliance switches between the two software partitions on its system, activating the staged software and saving the
previously active software and database as backup.
Note
Before you upgrade the software, Infoblox recommends that you back up the current configuration and
database. For information, see Backing Up and Restoring Configuration Files.
Depending on your upgrade paths, you can upgrade to a new release immediately or you can schedule the upgrade. For
information about how to upgrade immediately, see Upgrading the Grid Immediately. Before you schedule an upgrade,
ensure that you understand the limitations, as described in Managing Upgrade Groups. For information about how to
schedule an upgrade, see Scheduling Upgrades.
Note
The Grid upgrades immediately and if there is an active upgrade schedule, it becomes inactive.
Scheduling upgrades
You can schedule lite upgrades and full upgrades for certain NIOS versions. For limitations about scheduling a full
upgrade, see Managing Upgrade Groups. When you schedule an upgrade, you schedule the upgrade for the Grid Master
and the upgrade groups, including the Default group. The Grid Master must always upgrade before the upgrade groups.
Depending on your upgrade paths, you can schedule the upgrade for the Grid Master and upgrade groups at different
times over a period of nine days. If you schedule an upgrade that takes more than nine days, the appliance displays a
warning.
To schedule an upgrade:
1. From the Grid tab, select the Upgrade tab, and then click Upgrade -> Schedule Upgrade from the Toolbar.
2. In the Upgrade Schedule editor, complete the following:
• Activate Upgrade Schedule: Select this to enable the upgrade schedule. Clear it if you are creating an
upgrade schedule that you plan to activate at a later date. You can configure and save information in this
editor even when you deactivate a distribution.
• Grid Master Upgrade Start Information: Enter a Grid Master upgrade date, time, and time zone. The date
and time must be before those of the upgrade groups.
• Date: Enter a start date of the Grid Master upgrade in YYYY-MM-DD (year-month-day) format. You
can click the calendar icon to select a date from the calendar widget.
• Time: Enter a start time of the Grid Master upgrade in hh:mm:ss AM/PM (hour:minute:second in
AM or PM) format. You can select a time from the drop-down list.
• Time Zone: Select a time zone that applies to the start time you enter. If this time zone is different
from the Grid time zone, the appliance converts the time you enter here based on the Grid time
zone, after you save this schedule. When you display this schedule again, it displays the
converted time. Selecting the time zone here does not affect any time zone settings in the Grid.
(For information about setting the Grid and member time zones, see Managing Time Settings.)
• Admin Local Time: Displays the Grid Master upgrade date and start time in the time zone of the
administrator, as explained in Creating Local Admins.
• In the upgrade member table, specify the following by clicking the corresponding field in each row:
• Group: The name of the upgrade group. You can assign a different upgrade group by selecting the
group from the drop-down list.
• Group Members: When you expand an upgrade group, this field displays the group members.
• Warning: This field turns yellow when there is a conflict among the upgrade groups. Hover your
mouse over the field and the tooltip displays the member that contains the conflict. It also displays
recommended upgrade groups in the Group column so you can change the group assignment to
resolve the conflict. The tooltip can display one of the following: GMC, DNS Primary, DHCP
Logging Member, or DHCP Failover. For information about how to resolve a conflict, see
Resolving Upgrade Warnings. Select an upgrade group from the drop-down list in the Group
column to assign a different upgrade group. Click Validate and Refresh to validate the new group
assignment.
• Start Upgrade: Specify when the upgrade occurs. Select one of the following from the drop-down
list:
• Date/Time: Select this to configure the upgrade start date, time, and time zone.
• After <group> : Select After Grid Master to start the distribution immediately after the
completion of the Grid Master distribution. Select an upgrade group that must complete its
distribution before the group you are configuring. If you select this option, you cannot enter
a date, time, and time zone.
Date, Time, and Time Zone are enabled only when you select Date/Time for Start
Upgrade.
Note
You may potentially lose some data when you revert a member. The appliance keeps information about DHCP
leases and DNS records intact.
Upgrade Process
When an upgrade starts, Grid Manager checks if the nodes of an HA Grid Master have the same NIOS software version
on their alternate partitions. If they do not have the same software version, the upgrade process stops. Grid Manager
displays an error message and if it is a scheduled upgrade, Grid Manager deactivates the schedule as well. Otherwise,
the upgrade process continues.
Note
During the upgrade, you can view the status of the Grid Master in the serial console.
During the upgrade, if a Grid member has not completed its distribution, it automatically resynchronizes with the Grid
Master after the Grid Master upgrade is complete.
Due to the nature of the upgrade sequence, HA pairs fail over during the upgrade. Therefore, be aware that the active
and passive nodes reverse roles. The order in which Grid members upgrade, including when HA pairs fail over, is shown
Note
Grid members that do not have the correct NIOS version on their alternate partitions due to an incomplete
distribution automatically resynchronize the NIOS version with the Grid Master, and then upgrade.
Managing Upgrades
During an upgrade, Grid Manager displays a system message at the top of the screen indicating the Grid is being
upgraded. After you start an upgrade, you can pause or resume it. For information, see Pausing and Resuming
Upgrades and Monitoring Distribution and Upgrade Status.
To resume an upgrade:
1. From the Grid Upgrade Status bar, click the Resume icon.
2. When the appliance displays a dialog box confirming that you want to resume the upgrade, click Yes to continue.
Members that have not completed or started upgrades that were scheduled at an earlier time resume the upgrade.
Detailed Status
You can view detailed process information of a member during a distribution or an upgrade. To view detailed process
information:
1. From the Grid tab, select the Upgrade tab, and then click Toggle Member List View.
2. Select a member and then click the Detailed Status icon.
Grid Manager displays a panel that shows the required steps during a distribution or an upgrade. It also displays a color
indicator, next to each step, to indicate the current status of each step. The color indicator can be one of the following:
• Grey: The process has not started yet.
• Green: The process is complete.
• Blue: The distribution or upgrade that is in progress.
• Red: There is an error; Grid Manager displays a description of the problem.
• Yellow: A warning message.
When the selected member is an HA pair, Grid Manager displays the status information for both nodes. The panel
remains open until you close it or select a different member.
Lite Upgrades
A lite upgrade occurs when there are incremental changes to the software that do not require any upgrade to the
database. The appliance can perform a lite upgrade only if the format of the database between the existing NIOS version
and the upgrade version is the same.
In general, when you upgrade from a patch release to another patch release, you are performing a lite upgrade. In a lite
upgrade, members can be running a different software version than the Grid Master. You can add objects, such as
zones, networks, and resource records to the members that are running an older NIOS version. Replication of zones,
networks, resource records, and DHCP leases is supported between the Grid Master and members. When you want to
revert a member however, you must revert the entire Grid.
Whenever possible, the appliance uses the lite upgrade mode to speed up the upgrade process. You can always
schedule a lite upgrade. Note that the appliance disables the testing function for lite upgrades because you do not need
to test a lite upgrade for any database translation. For information about how to schedule an upgrade, see Scheduling
Upgrades.
Full Upgrades
A full upgrade occurs when there are database schema changes between the existing and upgrade releases. In general,
when you upgrade to a major release, you are performing a full upgrade. Depending on the upgrade and revert paths
that your existing release supports, you may or may not be able to schedule a full upgrade. A full upgrade that cannot be
scheduled does not allow for data replication between the Grid Master and members. For information about supported
upgrade and revert paths, refer to the latest release notes on the Infoblox Support site.
Depending on the upgrade paths your current release supports, when you schedule a full upgrade, the Grid Master
immediately replicates certain core network service tasks to Grid members while putting other tasks in queue until the
members have been upgraded. For information about which data and tasks the Grid Master replicates to members
Note
Deactivation of these functions does not affect data on the Microsoft servers. After the upgrade, the member
automatically restarts the synchronization of Microsoft data.
On a member that synchronizes data with Microsoft DNS and DHCP servers, the following rules apply:
• Do not modify the managing member if the old and new members have not been upgraded and have not exited
their revert time windows.
• Do not add, modify, or delete zones, IPv4 DHCP ranges, and IPv4 networks until the managing member has
been upgraded and exits the revert time window.
• Do not add, modify, or delete DNS resource records if the associated zone is managed by a Microsoft server and
the managing member is still in its revert time window.
Note
During an upgrade, data loss might happen if the peers that hold all searchable copies of a bucket are
in the same group and they are all offline at the same time. To avoid this, ensure that you group the
members in separate groups.
• Default: This is the default upgrade group to which the appliance automatically assigns Grid members. If you do
not explicitly assign a member to an upgrade group, it remains in the Default group. You cannot delete or rename
this group. For information, see Modifying Upgrade Groups.
Note
Make sure that the default group has at least one member associated with it, otherwise the appliance
displays that the upgrade process is still in progress even though it is complete. To avoid this, you can
either use the Infoblox > set grid_upgrade forced_end command to stop the upgrade process or
keep at least one member in the default group.
Note
The appliance displays a warning message when you create an upgrade group that includes the two peers of a
DHCP failover association. Infoblox recommends that you assign DHCP failover peers to separate upgrade
groups to minimize the risk of a loss in DHCP services. For example, if DHCP failover peers are in the same
upgrade group and its members upgrade simultaneously, the upgrade causes a loss in DHCP services.
Note
After you add a member, the appliance adds it to the group members list. The first Grid member
in the list determines the time zone of the group when you schedule the distribution and
upgrade. Therefore, Grid Manager displays the time zone of the first Grid member in the list.
(For information about setting time zones, see Managing Time Settings.)
5. Save the configuration and click Restart if it appears at the top of the screen.
Note
Grid Manager leaves a field empty when there is no available software for the specific function.
Grid Manager automatically refreshes the Upgrade tab with the latest information and displays the timestamp in the Last
Updated field below the Grid Version Information section.
Downgrading Software
Each Infoblox appliance model has a minimum required release of Infoblox software. Before downgrading an appliance,
refer to the document, Minimum Required Release Software for Hardware Platforms, that shipped with your product.
The downgrade procedure is for single independent appliances only. Infoblox does not support software downgrades for
Grid members, but you can revert to the previous NIOS release (see the next section) on a Grid Master.
Note
Although the downgrade process preserves license information and basic network settings, it does not preserve
data. After you complete the downgrade procedure, all data in the database is lost.
Applying Hotfixes
Infoblox periodically releases hotfixes that contain resolved issues. Only superusers can apply hotfixes through Grid
Manager. When you install hotfixes through Grid Manager, you can apply them to the Grid Master and All Grid members,
the Grid Master only, the Grid Master and Grid Master Candidates, or selected Grid members. This feature is supported
on appliances running NIOS version 7.1 or later. Note that each hotfix addresses specific issues.
Infoblox recommends that you verify the hotfix before you apply it to ensure that it is the correct version.
After you apply a hotfix, Grid manager displays the hotfix status in the Upload Status bar. In addition, you can view the
history of the most recent list of applied hotfixes in the Hotfix History dialog box. For information about viewing hotfix
history, see Viewing Hotfix History.
Note
A hotfix installation may fail if there is a mismatch in the NIOS software versions or if a hotfix image fails to meet
the software or hardware restrictions.
To apply a hotfix:
1. From the Grid tab, select the Upgrade tab, and then click ApplyHotfix from the Toolbar and select one of the
following:
• ToGridMasterandallGridMembers: Click this to apply hotfix to the Grid Master and all Grid members.
• ToGridMaster: Click this to apply hotfix to the Grid Master only.
• ToGridMasterandGridMasterCandidates: Click this to apply hotfix only to the Grid Master and Grid Master
candidates.
• ToselectedGridMembers: Click this to apply hotfix to the selected Grid member. This option is available
only after you have selected a Grid member or members.
2. In the ApplyHotfix dialog box, click Select and navigate to the hotfix image file you want to upload. Click Open to
select the file, and click Upload.
Note
If you have already installed a hotfix and subsequently try to upgrade or downgrade NIOS, the appliance
displays a warning message because resolved issues in the hotfix will no longer be valid if the upgrade or
downgrade version does not contain the original hotfix.
The appliance applies the hotfix to the targeted appliance(s). You cannot stop the hotfix process once you start it. Grid
Manager displays the hotfix status in the Upload Status bar.
Note
While the content of the backup file in plaintext it does not contain any plaintext representation of any
passwords. These are either encrypted with AES-256 or salted hashed with SHA-128.
You may also schedule automatic backups of the discovery database, which consists of the complete discovery data for
networks and network devices such as core, distribution and edge routers, enterprise switches, security devices, and end
host devices. NIOS backs up the discovery database in a .tar.gz file, with the raw discovery data formatted as an XML
file.
Note
Infoblox recommends that you backup the configuration after you convert a Grid to a different mode. Restoring
the old backup by performing a forced restore, may prevent the Grid members from rejoining the Grid Master
after the restore.
The following sections describe how to use the backup and restore functions:
• Backing Up Files
• Automatically Backing Up Data Files
• Backing Up Files
• Restoring Backup Files
• Downloading Backup Files from a Different Appliance
Note
Infoblox highly recommends that you always back up the current configuration file before upgrading, restoring,
or reverting the software on the appliance. If you are performing these operations on appliances licensed for
Discovery and that perform discovery, the discovery database can be backed up and restored using the same
mechanisms.
Local Backup
You can store a backup file on the appliance itself. However, Infoblox recommends that you store backup files in an
alternate location. When you back up the system files locally, the appliance uses the following format to name the file:
BACKUP_YYYY_MM_DD_MM.tar.gz. For example, a file name of BACKUP_2013_11_30_23_00 means that the file is
backed up on November 30th, 2013 at 11:00 PM.
The appliance can save up to 20 configuration files, regardless of how often the files are saved (weekly, hourly, or daily).
Ensure that you take the size of the configuration file into consideration when backing up files because the storage limit
on an appliance is 5 Gb (gigabytes). If your configuration file is 500 Mb (megabytes), then the appliance can store 10
configuration files. When uploading configuration files on to a TFTP, FTP, or SCP server, you must consider the file size
on that server as well.
Using TFTP
TFTP is a client-server protocol that uses UDP as its transport protocol. It does not provide authentication or encryption,
therefore it does not require a username or password.
When you back up the system files to a TFTP server, you select the backup file you want to download, enter the name in
which the file is stored on the TFTP server and the server IP address.
Using FTP
FTP is a client-server protocol used to exchange files over TCP-based networks. The appliance, as the FTP client,
connects to a remote FTP server that you identify. When you use FTP to back up the system files, the password and file
contents are transmitted in clear text and may be intercepted by other users.
When you back up the system files to an FTP server, the appliance, as the FTP client, logs on to the FTP server. You
must specify the username and password the appliance uses to log on to the FTP server. The user account must have
write permission to the directory to which the appliance uploads the backup file.
Using SCP
SCP is more secure than TFTP and FTP. It uses the SSH protocol to provide authentication and security. You can use
SCP to back up the NIOS system files to a server running SSHv2.
When you use SCP to back up the system files to an SSH server, you must specify the username and password the
appliance uses to log on to the server. Note that you must use either "password" or "Password" in the SCP password
prompt because the appliance does not recognize "PASSWORD" in the prompt. Therefore, ensure that you customize
the SCP password prompt to say "Enter your password" or "Enter your Password." Otherwise, the SCP backup will fail.
Note
The SCP protocol uses SSH for data transfer and thus provides the same authentication and security as SSH.
SCP uses LAN1 regardless of whether the MGMT port is enabled or not.
Note
If you have configured AD server for authentication, you must specify "domain name\
\username".
Note
If you have configured AD server for authentication, you must specify "domain name\
\username".
Note
When you select FTP or SCP, ensure that you have a valid user name and password on the
server prior to backing up the files.
New status types such as Upload keys triggered, Upload keys in progress, Upload keys done
are displayed in the Reporting Restore dialog box also.
• Grid Master (Local): Back up to a local directory on the Grid Master. This is the default.
By default, the Grid Master generates a backup file and saves it locally in its own storage at 3:00 AM daily.
Be aware that backing up the Grid and saving it locally on an hourly basis increases the turnover of files stored
on the Grid Master. Backing it up hourly to a remote server increases the overall amount of traffic on your
network.
• If the Grid has a discovery member, Grid Manager displays the NIOS data and Discovery data checkboxes. You
can select the NIOS data checkbox, to back up NIOS configuration data for the Grid and select the Discovery
data checkbox, to back up discovery data for the Grid.
If the Grid has a reporting member, Grid Manager displays the Infoblox Splunk App checkbox. You can select the
Infoblox Splunk App checkbox, to back up Splunk application reporting data.
• Save the configuration and click Restart if it appears at the top of the screen.
Note
If you have configured AD server for authentication, you must specify "domain name//
username".
Note
If you have configured AD server for authentication, you must specify "domain name//
username".
• Use Keys: If you select this checkbox, you can back up files to SCP without entering the password. The
first time you select the checkbox, you need to enter the password. However, during subsequent times,
the Infoblox server verifies whether Infoblox keys are available on the SCP server. If they are available,
you can click the Backup button without entering the password. If Infoblox keys are not available on the
SCP server, the following message is displayed:
Infoblox SSH keys are not present on SCP server. Please upload the keys to the SCP
server or download the keys and manually add it to the SCP server.
Password: Enter the password of your SCP account.
• Keys Type: Select the SSH key type to be uploaded. At present, only ECDSA and RSA keys are
supported. Click Upload Keys to upload the keys to the SCP server. If the keys are not available, click
Download Keys to download the keys and manually add them to the SCP server.
Note
• If you are using Fedora, ECDSA keys are supported only on Fedora versions later than Fedora
12.
• When you select FTP or SCP, ensure that you have a valid user name and password on the
server prior to backing up the files. Also ensure that the target SSH server has the required
permissions for an SCP backup. The permission must be 755 and the target server must have
write permission to the directory to which you upload the backup file.
• If the Grid has a discovery member, Grid Manager displays the NIOS data and Discovery data checkboxes. You
can select the NIOS data checkbox, to back up NIOS configuration data for the Grid and select the Discovery
data checkbox, to back up discovery data for the Grid.
If the Grid has a reporting member, Grid Manager displays the Infoblox Reporting & Analytics App checkbox. You
can select the Infoblox Reporting & Analytics App checkbox, to back up Splunk application reporting data.
• Click Backup.
Note
When you select FTP or SCP, ensure that you have a valid username and password on the server prior
to backing up the files.
Note
When you restore NIC interfaces to a VM, ensure that you provision appropriate NIC interfaces with the
database content that must be restored to avoid any errors.
Note
You cannot restore a backup from a HA GM to a single node GM, if the HA GM has specific HA passive
configuration.
Related topic
Scheduling Tasks
Note
Infoblox Reporting and Analytics integrates with Splunk to deliver an enhanced reporting interface so you can
create dashboards, reports, and alerts. This chapter attempts to explain all reporting functionality you can
perform through the enhanced interface. However, you may need to refer to the Splunk documentation for
certain functionality as indicated in specific sections of this chapter. In addition, some functions and capabilities
referenced in the Splunk documentation, such as setting up custom Python scripts, are not available or
applicable to the Infoblox Reporting and Analytics as some Splunk functionality in the Infoblox product may be
limited or modified by Infoblox. Infoblox does not represent or warrant that Infoblox Reporting and Analytics will
function in accordance with the Splunk documentation. Infoblox is also not responsible for the accuracy of the
Splunk documentation. For Infoblox Reporting and Analytics technical support, contact Infoblox Technical
Support. DO NOT contact Splunk.
Searches Reports
Reports Dashboards
• Object Management: NIOS no longer manages reporting objects such as searches, smart folders, alerts, and
reports. You will not be able to perform operations such as global search, quick filtering, bookmarking, and others
for these objects. You can now manage these objects through the new user interface.
Note
Smart folders are migrated after an upgrade. However, data in the smart folders is not migrated, and all
filters for the smart folders are reset to default.
• Permissions: Permissions for all reporting objects are migrated to the new Reporting and Analytics solution and
managed through the new user interface after an upgrade. You may see the new built-in role, Everyone, when
configuring Reporting permissions. For best practices, do not alter permissions for this new built-in role. Note that
the Reporting Dashboard and Reporting Search global permissions have been removed. If an admin group or
admin role was granted these permissions before an upgrade, the permissions will still be displayed after an
upgrade. However, they won't take any effect. The Grid Reporting Properties permission is retained. In addition,
reporting object permissions for dashboards and searches (including global dashboards and searches) are
migrated. These object permissions are retained for applicable migrated users. If permissions were granted to a
specific admin group for a dashboard or search before an upgrade, only these admin users and superusers have
permissions to access the migrated dashboard and report after an upgrade. If a limited-access user group is
created through the new interface after the upgrade, users in this admin group will not be able to access the
dashboard and report even if they are granted access to the Infoblox Reporting and Analytics App. Superusers
must explicitly grant permissions to this limited-access admin group for users in this group to access the
dashboard and report. For more information, see Administrative Permissions
• Navigation and Visualization: Navigations for some reporting functions, such as searches, alerts, email and page
settings, and email PDF delivery, have changed. You can navigate through the new user interface to get familiar
with the changes in this release. In addition, all predefined reports might look different than the traditional ones
depending on your filtering configuration. The Grid Reporting Properties editor and Groups tab are moved under
the Administration tab –> Reporting tab.
Note
Bookmarked groups are migrated after an upgrade. The bookmarked group navigates to
the Administration tab –> Reporting tab –> Groups tab.
• Extensible Attributes: The reports that supported filtering and grouping by multiple extensible attributes are
migrated to the new interface with filtering and grouping only by the extensible attribute Site. You must clone the
dashboard, add filter inputs and modify the view XML to support additional extensible attributes. For information,
see Editing the XML Source Code of a Dashboard.
• Searches and Reports: Only NIOS system and global reports and searches are migrated to NIOS 7.3.0 and later
versions as dashboards and reports respectively. All user private reports and searches are dropped. In addition,
bookmarked reports and searches are not migrated to 7.3.x release. If you want to keep any customization for the
user private dashboards and reports, do one of the following:
• Create global dashboards and reports using the same settings.
Related topic
Infoblox Reporting and Analytics
Note
Some configuration changes require a service restart. Grid Manager displays a message whenever you make
such a change. Click the Restart icon that appears in the message to restart services.
Breadcrumbs Navigation
Breadcrumbs navigation displays your path to the current page. It helps you keep track of your location in Grid Manager.
You can click any of the links to get back to a previous page.
Global Search
Use Global Search to find data. Grid Manager searches the entire NIOS database for data that matches the criteria you
specify. For additional information on Global Search, see Using Global Search.
Finder Panel
The Finder panel appears on all pages in Grid Manager. It provides the following tools:
• Smart Folders: Use smart folders to organize your data according to criteria that you specify.
• Bookmarks: Stores data that you have marked for easy retrieval.
• Recycle Bin: Stores deleted objects that you can either restore or permanently remove.
• URL Links: You can add, modify, and delete third party URL links of frequently used portals and destination
pages.
You can resize, collapse, and expand the Finder panel.
Toolbar Panel
The vertical Toolbar panel provides easy access to commands. The Toolbar is available in all pages, except the
Dashboard. Its content changes depending on the type of data displayed in the work area. You can resize, collapse, and
expand the Toolbar panel.
Tooltips
Tooltips display the function of each button. Hover your mouse over a button or icon to display its label.
Customizing Tables
Grid Manager uses dynamic tables to display information. You can customize tables by resizing columns, sorting the
data, and selecting certain columns for display. Your settings remain active until you log out.
To resize columns in a table:
1. In the table, place your pointer on the right border of the header of the column you want to resize.
2. Drag the border to the desired width.
To sort the data displayed in a table, click the header title. You can click the header title again to reverse the sort order.
Alternatively, you can do the following:
1. In the table, mouse over to a header title and click the down arrow key.
2. Select Sort Ascending or Sort Descending. To edit columns:
3. In the table, mouse over to a header title and click the down arrow key.
4. Select Columns > Edit Columns.
5. Do the following:
• Width: Specify the width of the column in pixels. The minimum is five and the maximum is 999.
• Sorted: Indicates whether the data in the column can be sorted
• Visible: Click the checkboxes of the columns you want to display, and clear the checkboxes of those you
want to hide.
6. Do one of the following:
• Click Apply to apply your settings to the column.
• Click Cancel to close the editor without saving your settings.
• Click Reset to reset the settings to the default.
Grid Manager displays the selected column in the table.
To reorder columns in a table, drag and drop the columns to the desired positions.
Note that when multiple users log in to Grid Manager using the same admin account, they share the same user profile
and preference settings, such as the widget, table size and column settings, independent of their browser settings.
Instead of using the same admin account for multiple users, you can add multiple users to the same admin group so they
can share the same permissions. For information about configuring admin accounts and admin groups, see Managing
Administrators.
If you can access only the Tasks Dashboard, you may not see or configure certain fields in the User Profile editor.
Configuring BloxConnect
Infoblox BloxConnect is the ability of the Infoblox DDI platform to send snapshots of encrypted and automated system
data and utilization information to the Infoblox business operations center. Infoblox uses this data to improve product
functionality and provide better customer service. The BloxConnect feature collects and sends encrypted data during the
following instances:
• On the first setup of the system
• Daily, following an up time of 24 hours
• When a system reboots following a system failure
The Data Collection and Opt-Out Notice, which explains the BloxConnect feature, appears only when you log in to Grid
Manager from the NIOS UI for the first time. By default, data collection is enabled. If you want to disable it, select To opt-
out of BloxConnect, please click here, and then click OK. Snapshots include information about basic configuration,
features, and protocols collected from your physical and virtual systems. Additionally, snapshots provide health,
diagnostic, and utilization information related to CPU, disk, leases per second (LPS) , queries per second (QPS), IPAM,
and memory usage. The data does not include customer-sensitive or personal information.
Only administrators with superuser privileges can configure BloxConnect for a Grid Master or an independent
appliance. To configure BloxConnect, complete the following:
1. Log in to Grid Manager as a superuser.
2. Grid: On the Grid tab, select Grid Manager tab -> Members tab. Expand the Toolbar, and
click Grid Properties -> Edit.
Or
Standalone system: On the System tab, select System Manager tab -> Node tab. Expand the Toolbar and then
click System Properties -> Edit.
3. In the editor, click Toggle Advanced Mode to switch to the advanced mode.
Note that if the editor is already in the advanced mode, then you will see the Toggle Basic Mode button.
4. On the CSP Config tab -> Advanced tab, complete one of the following:
• To opt in for data collection, select the BloxConnect Data Collection and Opt-Out Notice checkbox.
Or
• To opt out of data collection, clear the BloxConnect Data Collection and Opt-Out Notice checkbox.
Infoblox recommends that you enable BloxConnect as Infoblox uses the data collected to improve its
technical support services.
5. Save the configuration and click Restart if it appears at the top of the screen.
Browser Limitations
• When you use Internet Explorer 7 or 8 without installing the latest updates, Grid Manager may stop loading a
page when you navigate from one tab to another or when you use the back navigation button to go back to a
previous page. To solve this problem, you can press Ctrl+F5 to refresh the browser or install the latest updates.
• When you use the zoom function in Internet Explorer 7 running on Microsoft Windows XP, Grid Manager may not
properly display some pop up windows. This is a known issue in Internet Explorer 7.
• In Internet Explorer 8, Grid Manager does not display the directory path of an uploaded file. Instead, it displays
"fakepath" in place of the directory path. To resolve this issue, you can add Grid Manager as a trusted site or
enable the "Include local directory path when uploading files to a server" feature in the browser. For information,
refer to the MSDN documentation at https://msdn.microsoft.com/en-us/library/ms535128.aspx.
• When you use FireFox to access Grid Manager, tooltips do not display for disabled drop-down menu items. In
addition, when you run a large query of smart folders, Grid Manager may display a warning message about
"Unresponsive Script". Click Continue to proceed.
• Depending on the browser you use, Grid Manager may display a dialog box that indicates the system is
unavailable during a system restart or reboot.
Multilingual Support
The NIOS appliance supports UTF-8 (Unicode Transformation Format-8) encoding for the following:
• Hostnames for Microsoft Windows clients that support Microsoft Windows code pages. For information, see
Configuring UTF-8 Encoding for Hostnames.
• Input fields through Grid Manager. For information, see UTF-8 Supported Fields.
UTF-8 is a variable-length character encoding standard for Unicode characters. Unicode is a code table that lists the
numerous scripts used by all possible characters in all possible languages. It also has a large number of technical
symbols and special characters used in publishing. UTF-8 encodes each Unicode character as a variable number of one
to four octets (8-bit bytes), where the number of octets depends on the integer value assigned to the Unicode character.
For information about UTF-8 encoding, refer to RFC 3629 (UTF-8, a transformation format of ISO 10646) and the ISO/
IEC 10646-1:2000 Annex D. For information about Unicode, refer to The Unicode Standard.
Depending on the OS (operating system) your management system uses, you must install the appropriate language files
in order to enter information in a specific language. For information about how to install language files, refer to the
documentation that comes with your management system.
Note
For data fields that do not support UTF-8 encoding, the appliance displays an error message when you use
non-English characters.
Note
You can use special characters in the Unicode and Punycode fields.
• Click Clear to clear the entries. Note that when you click Clear for a specific conversion, the appliance
clears only the error message that corresponds to that conversion.
3. Click Close.
Note
Make sure that you enable DNS Resolver or Use SMTP Relay to create a support case from the GUI. For
information about enabling DNS resolution and notifying administrators,
see Enabling DNS Resolution and Notifying Administrators.
Note
Click Go to the Editor and enable DNS Resolver or Use SMTP Relay if you have not already enabled either one
of them.
Note
It might take up to 15 minutes before you get an email confirmation.
Using Bookmarks
The Bookmarks section displays objects for which you have created bookmarks. You can create bookmarks for objects
such as networks, DNS zones, and admin groups. To bookmark an object, navigate to its page and click the Bookmark
icon at the top of the page. If you have more than one network view, Grid Manager displays the name of the bookmark
with the network view to which the object belongs. For example, when you bookmark IP address 10.128.0.10 in the
default network view, Grid Manager displays the bookmark as default > 12.128.0.10.
However, if you have only one network view, Grid Manager displays only the object name 12.128.0.10. If you create
a bookmark before adding more network views, the bookmark name (without the network view) remains the same. You
can rename the bookmark at any time. You can create only one bookmark for each object, up to 500 objects. When your
bookmarks are close to 500, you may want to remove some to create room for new ones.
You can perform the following in Bookmarks:
• Access a bookmarked object
• Edit the name of a bookmark
• Delete a bookmark
To access a bookmarked object, click the name of the bookmark. Grid Manager displays the network view to which the
bookmarked object belongs. For example, clicking on the bookmark of network 10.0.1/24 takes you to the network list
Note
When you upgrade to a new NIOS release, the appliance permanently deletes the objects from the Recycle
Bin.
On a NIOS appliance, only superusers have permissions to fully manage the Recycle Bin. If you have limited-access
permissions, you can view, restore, and permanently remove only the objects that you deleted.
For Cloud Network Automation, the Recycle Bin is not supported on the Cloud Platform Appliance. Only deletions
perform on the Grid Master are stored in the Recycle Bin. Deleted objects can only be restored from the Grid Master. For
information about Cloud Network Automation, see Deploying Cloud Network Automation.
Using Filters
You can control the amount and the kind of data displayed in a specific panel by adding filter criteria. When you add filter
criteria, the appliance screens the data based on your filter rules and displays only the information that matches the
rules. To narrow your search for specific information, you can add up to 10 filter rules. In some panels, such as the DHCP
Networks tab, you can switch between viewing information with and without the filter criteria by toggling the filter on and
Note
In the default DNS zone view, the appliance displays forward mapping zones first, followed by IPv4
reverse mapping zones, and then IPv6 reverse mapping zones.
• Global quick filters: Only superusers can define global quick filters. You can make global filters available to all
users. Limited-access users can use global quick filters, but they cannot modify them. Global filters are prefixed
with \[G\] in the filter lis
• Local quick filters: Limited-access users can create local quick filters for their own use. You cannot share local
quick filters with other users in the Grid. Local filters are prefixed with \[L\] in the filter list.
Note
• Depending on the size of your database, global search may take a long time to complete. Grid Manager
times out when queries or searches take longer than 120 seconds. To expedite searches, use filters to
refine the search criteria. You can also use basic global searches if you have a large data set and you
only need to search by a single filter criterion.
• To search for any DHCP objects or its attributes using Global Search, you must have DHCP license
installed.
Note
You can save each search that contains multiple filter criteria as a quick filter for future
use. For information about quick filters, see Using Quick Filters.
3. Optionally, you can click Reset to clear the search results and start a new search. You can also click the Refresh
icon to refresh the search results.
Grid Manager stores the search results until you reset the search parameters or log out.
4. After you finish defining filters, click Search or press Enter.
Note
If you have selected to include extensible attribute values, you can select the corresponding columns to be
displayed in the search results. Extensible attribute columns are hidden by default.
TLS Suite Name Open SSL Suite Name SSHd Cipher SSHd MAC
When a client first connects to a server, it starts a series of message exchanges, called the SSL/TLS handshake. During
this exchange, the server authenticates itself to the client by sending its server certificate. A certificate is an electronic
form that verifies the identity and public key of the subject of the certificate. (In SSL/TLS, the subject of the certificate is
the server.) Certificates are typically issued and digitally signed by a trusted third party, the Certificate Authority (CA). A
certificate contains the following information: the dates it is valid, the issuing CA, the server name, and the public key of
the server. For information about certificates, see Managing Certificates.
A server generates two distinct but related keys: a public key and a private key. During the SSL/TLS handshake, the
SSL/TLS Handshake
Managing Certificates
This section covers the following:
• About HTTPS Certificates
• About Client Certificates
• About CA Certificates
• Converting CA Certificates to PEM Format
Note
The SHA-384 and SHA-512 are not supported during scheduled full upgrades for the Grid. If
your Grid includes a reporting server, ensure that you DO NOT select a key size of 4096 bit for
SHA-256. Otherwise, the reporting feature might not function properly because Java does not
support SHA-256 with a 4096 key size.
Note
The SHA-384 and SHA-512 are not supported during scheduled full upgrades for the Grid.
• Common Name: Specify the domain name of the NIOS appliance. You can enter the FQDN of the
appliance.
• Organization: Enter the name of your company.
• Organizational Unit: Enter the name of your department.
• Locality: Enter a location, such as a city or town of your company.
• State or Province: Enter the state or province.
• Country Code: Enter the two-letter code that identifies the country, such as US.
About CA Certificates
If the CA sends an intermediate certificate that must be installed along with the server certificate, you can upload both
certificates to the appliance. The appliance supports the use of intermediate certificates to complete the chain of trust
from the server certificate to a trusted root CA. This eliminates intermediate certificate security warnings that appear
when you open a web browser and try to connect to an Infoblox appliance.
When you configure two-factor authentication for smart card users, ensure that you upload the required CA certificates
before you enable the certificate authentication service. For information about two factor authentication and how to
configure it, see Defining the Authentication Policy. Only superusers and limited-access users with the required
permissions can manage CA certificates. For information about admin permissions, see Administrative Permissions for
Certificate Authentication Services and CA Certificates.
Also, see About CA Certificates for CISCO APIC.
Uploading CA Certificates
To upload a CA-signed certificate:
1. Grid: From the Grid tab, select the Grid Manager tab.
Member: From the Grid tab, select the Grid Manager tab -> Members tab -> member checkbox.
2. Select Certificates -> Manage CA Certificates from the Toolbar.
3. In the CA Certificates editor, click the Add icon.
4. In the Upload dialog box, click Select and navigate to the certificate you want to upload.
Note
NIOS can only upload certificates that are in PEM format. A.PEM file can contain more than one certificate. For
information about how to convert CA certificates to .PEM format, see Converting CA Certificates to PEM
• Make sure that the Subject (CN) of the APIC Key Ring certificate is a fully qualified domain name or a
distinguished name of the requesting device.
When NIOS tries to establish a connection to the APIC using SSL, it compares the APIC hostname value with the
value specified in the APIC Key Ring certificate CN (common name). If they do not match, the certificate
verification fails. If you want to specify something different than FQDN, for example, an IP address, for the APIC
Key Ring certificate CN, include an additional Subject Alternative Name marker in X509v3 extensions:
• Make sure to include the following markers in the APIC Key Ring certificate:
X509v3 extensions:
X509v3 Basic Constraints:
CA:FALSE
Netscape Cert Type:
SSL Server
...
X509v3 Key Usage: critical
Digital Signature, Key Encipherment
X509v3 Extended Key Usage:
TLS Web Server Authentication
• The time settings in Cisco ACI and NIOS must be valid and accurate.
Note
When an admin group is defined as a submitter group, there are certain operations the submitters cannot
perform even though they may have the permissions to do so. For information about such operations,
see Unsupported Operations for Submitters
Change the schedule of a task after it has been Yes (Task is re-submitted for approval) Yes Yes
approved
Delete tasks by selecting the Select all objects in Yes Yes Yes
this
dataset option
3. Click Next and complete the following to specify notification options for the workflow:
• Approver Notification Address(es): Select one of the following to specify to which approver email addresses the
appliance sends workflow notifications. The default is Group Email Address(es).
• Group Email Address(es): Select this if you want the appliance to send notifications to the list of email
addresses configured for the admin group. For information about how to configure this list, see About
Admin Groups.
• User Email Address(es): Select this if you want the appliance to send notifications to individual email
addresses of the admin group.
• Notifications sent on: Select the operations that can trigger email notifications. When you select an operation, the
appliance sends a notification each time that operation occurs. By default, all operations are selected.
• Approval Required: The appliance sends an email notification each time an approval is required.
• Task Approved: The appliance sends an email notification each time a task is approved.
Notification:
=============
Message: Task 32 submitted by subm has been approved The following task has been approved:
Task details
Note
When you can click the hyperlink displayed in the notification, you can log in to Grid Manager and access
the Task Manager tab in a separate browser tab or window.
Warning
CSV imports and operations that involve massive data such as deleting large zones and recursive deletion of
networks and all child objects, will significantly affect member performance, resulting in service outage.
Notes
• The list of CSV import jobs is not restored when you restore a backup file or when you promote a
master candidate.
• Superusers can view any jobs in the CSV Job Manager, and limited-access users can only view jobs
they submitted.
• A non-superuser can import or export CSV files for subscriber records.
Actions taken on user permissions CSV import and export behaviors associated with the affected user account
Delete a user account • CSV import jobs remain in the system and are accessible
by superusers only.
• All pending import jobs cannot be executed due to
authentication failures.
• If the action is taken during an import job that is in progress,
the rest of the import will fail.
• All stopped and successful jobs are available to superusers
only.
Modify a user account • If the action is taken during an Import in progress import
job, the rest of the import will fail.
Remove user permissions in a user account • Pending import jobs may be completed with errors.
Note
The replace operation might affect system performance if you try to replace a zone with
a lot of changes. Infoblox recommends that you perform the replace operation for large
import files (more than 10,000 rows of changes) during non-peak hours. This operation
ignores _new_XXX fields in the imported CSV files.
Note
The Test button is enabled only when you select the Replace operation and is disabled for other import
options.
7. Click Import to import the CSV file to the database. Click Yes in the dialog box to import the CSV file or No to
cancel the operation.
8. You can view the progress and results of your import operation in the CSV Import Progress wizard. This wizard
displays the following information:
• Import type: The type of import option you have selected.
• Filename: The name of the CSV file you have selected.
• Separator: The separator you have selected for your CSV file. The default value is Comma.
• On Error: The option you have selected when the import operation encounters an error.
• Current status: If an import is in progress, this field displays its current status. Otherwise, it displays the
date and time of the last import.
• Last action: Displays the last operation and the admin who initiated it.
• Rows Completed: The number of rows of data the import has processed. Depending on the import
options, Grid Manager displays either the row number at which it stops an import when it encounters an
error or the total number of rows it has processed by skipping over the erroneous data. For example, if
there are 100 rows of data and you select "On error: Stop importing," and there is an error in row 90, Grid
Manager displays 90 of 100 here. If you select "On error: Skip to the next row and continue," Grid
Manager displays 100 of 100 here and displays 1 in Rows with Errors.
• Rows with Errors: The number of rows of data the import has detected errors. Click Download Errors to
download the CSV file that contains the fields and the rows of erroneous data. You can use this report as
a reference to update the data file before you import the file again.
9. You can also perform the following actions if needed:
Note
Superusers can view all CSV import jobs and limited-access users can view only the jobs they submitted.
Note
After a product restart, which can be caused by a failover, all Import in progress jobs go
into Import stopped state; all Import pending jobs continue to be queued for execution.
Note
Superusers can view all CSV import jobs and limited-access users can view only the jobs they
submitted.
Note
When you delete a parent object from the CSV file, the child objects associated with the parent objects are also
deleted.
• Results File: Select this to download the results file. The file displays the content of the database after the
content of the file replaced the content of the database. You can view the results file only after the replace
operation is complete.
You can export these files to your local system.
Related topic
CSV Import Reference
Note
Port configuration tasks (or any operation that queries for or changes device configurations through Grid
Manager, including Discovery) are subject to a feature called Blackout Periods, which are defined elsewhere in
Grid Manager. Blackouts are a scheduled feature that instructs Grid Manager not to perform Discovery
operations and Port Control/provisioning operations on the managed network at specified times, days and
dates. See the section Defining Blackout Periods for details.
Note
Network provisioning tasks (or any operation that queries for or changes device configurations through Grid
Manager, including Discovery) are subject to a feature called Blackout periods, which are defined elsewhere in
Grid Manager. Blackouts are a scheduled feature that instructs Grid Manager not to perform Discovery
operations and Port Control/provisioning operations on the managed network at specified times, days and
dates. See the section Defining Blackout Periods for details.
Scheduling Deletions
You can schedule the deletion of an object or an operation for a later date and time. However, you cannot schedule the
deletion of a previously scheduled task.
To schedule a deletion:
1. Navigate to the object.
2. Select Schedule Deletion from the Delete drop-down menu.
3. In the Schedule Deletion dialog box, complete the following:
• Delete Now: Select this to delete the object upon clicking Delete Now.
• Delete Later: Select this to schedule the deletion at a later date and time. Complete the following:
• Date: Enter the date in YYYY-MM-DD (year-month-day) format. The appliance displays today's
date. You can also click the calendar icon to select a date from the calendar widget.
• Time: Enter the time in hh:mm:ss AM/PM (hours:minutes:seconds AM or PM) format. You can also
select a time from the drop-down list by clicking the time icon.
• Time Zone: Select a time zone for the scheduled date and time from the drop-down list. This field
displays the time zone of the browser that the admin uses to log in to Grid Manager.
4. Click Schedule Deletion.
The appliance performs the deletion at the scheduled date and time.
In the editor, Grid Manager displays the Schedule icon in green to indicate a pending scheduled task associated with the
corresponding object, as shown in the Scheduling Icon Indicating a Pending Task figure. You can click the Schedule icon
to view the date and time of the scheduled task. You can also reschedule the task if you have the applicable permissions.
For information, see Rescheduling Tasks.
Scheduling Icon Indicating a Pending Task
Rescheduling Tasks
Superusers can reschedule any scheduled task. Limited-access admins can reschedule only the tasks that they
scheduled, depending on their permissions. Approvers can reschedule tasks that they have approved, if they have the
scheduling permission. You can reschedule a task from different panels of Grid Manager, depending on your
permissions. When you reschedule a task from the object list panel, Grid Manager displays the object or operation
configuration in a read-only mode. You can modify the date and time to reschedule the task. However, you cannot modify
the configuration of the object or operation. You can also reschedule your own task or a task you have approved from
Task Manager.
To reschedule tasks associated with objects, see Rescheduling Tasks Associated With Objects.
To reschedule tasks associated with operations, see Rescheduling Tasks Associated with Operations.
Scheduling Tasks
When you perform a task, such as adding a DNS zone or modifying a DHCP range, you can execute it immediately or
schedule it for a future date and time, depending on your permissions. The scheduling feature is useful when you want to
add, modify, or delete a record, or schedule a network discovery at a desired date and time. Using this feature, you can
streamline your day-to-day operations. For example, you can schedule the deletion of records that you use for testing
when the test time is up. You can also reassign an IP address to a fixed address when the location of the server to which
the fixed address is assigned changes from one network to another.
Certain tasks, scheduled or not, may be subject to approvals if approval workflows are defined for specific admin groups.
For information about how to define submitters and approvers for an approval workflow, see Configuring Approval
Workflows.
Note that not all tasks can be scheduled or routed for approval. For a list of supported objects, see Supported Objects for
Scheduled and Approval Tasks.
When you schedule a task or submit it for approval, consider the following:
• The appliance cannot execute a scheduled or approval task that is associated with an extensible attribute, if you
delete the extensible attribute after you have scheduled the task or submitted it for approval. For information
about extensible attributes, see About Extensible Attributes.
• The appliance cannot execute, reschedule, or delete a task that is associated with a child object (such as a
DHCP range) if you delete the parent object (such as a network) after you have scheduled the task or submitted it
for approval.
• There are certain guidelines about scheduled and approval tasks when you upgrade the software, back up the
database, and restore data. For information, see Guidelines for Upgrading, Backing Up, and Restoring Data.
You can schedule the addition, modification, and deletion of certain objects. For a list of the supported objects, see
Supported Objects for Scheduled and Approval Tasks.
Depending on your permissions and the admin group to which you belong, your scheduled tasks may be subject to
approvals by other admins in your organization. You may or may not receive email notifications about the status of your
scheduled tasks depending on the configuration of the approval workflows. Approvers can reschedule your tasks after
they have approved the tasks, if they have scheduling permissions. When you schedule and submit a task, you may
need to enter a ticket number associated with the task or a comment about the task. For more information about approval
workflows, see Configuring Approval Workflows.
Only superusers can view, reschedule, and delete all scheduled tasks. Limited-access admins can reschedule and delete
only their scheduled tasks. If your scheduled tasks require approvals, the approvers who have scheduling permissions
may reschedule your tasks to a different date and time after they have approved the tasks. Depending on your admin
permissions, there are certain scheduled and approval tasks that you may or may not be able to perform. For more
information, see Supported Tasks for Different Admin Groups.
The appliance sends email notifications to local admins, except for those who do not have email addresses, when email
notification is enabled for the admins and any of the following happens:
• A superuser schedules a task, and another superuser reschedules or deletes the task.
• A limited-access admin schedules a task, and a superuser reschedules or deletes the task.
• A superuser or a limited-access admin schedules a task, and the task fails.
• An admin is configured to receive notifications based on the configuration of an approval workflow. For
information about approval workflows, see Configuring Approval Workflows.
Note
Only IPv4 MAC filters support approval workflows.
Note
Service restarts are not subject to approvals.
Note
You cannot stop a long running task once you start it.
Viewing Tasks
The appliance displays scheduled tasks and approval tasks in the Task Manager tab of Grid Manager. Scheduled tasks
are those with scheduled time listed and approval tasks contain approval status. A task can also be scheduled and
queued for approval at the same time. By default, all completed and rejected tasks are displayed in Task Manager for up
to 14 days before they are removed from the list. You can configure how long the completed and rejected tasks are
displayed in Task Manager using the CLI command set delete_tasks_interval. For more information about the CLI
command, see Infoblox CLI Guide.
The appliance logs all tasks in the audit log and associates each with a task ID. By default, Grid Manager sorts tasks by
Task ID in Task Manager. You can view tasks that you are allowed to see based on your permissions. For information
about admin permissions, see About Administrative Permissions.
To view tasks:
1. From the Administration tab, select the Workflow tab -> Task Manager tab.
2. Grid Manager displays the following information for each task:
Field Name Description
Task ID The ID associated with the task. The appliance assigns an ID to a task in chronological order. By
default, the appliance sorts tasks by Task ID.
Type Indicates key information about certain types of executing/executed jobs. The Type column lists
values for Port Control and for Object Change tasks undertaken by Grid Manager or submitted
by Grid Manager for approval by the administrator.
Affected Object The name or value of the object that is associated with the task. For example, if the task involves
an A record, this field displays the domain name of the record. If it is a fixed address, it displays
the IP address of the fixed address.
Scheduled Time The date, time, and time zone when the appliance executes the task.
Submitted Time The date, time, and time zone when the task was submitted.
Submitter The username of the admin who scheduled or submitted the task.
Ticket Number For an approval workflow, this number may be entered by the submitter to associate the task
with a help desk ticket number or a reference number.
Approval Status The current approval status. Possible values are Approved, Not Applicable, Pending, and
Rejected.
Execution Status The execution status of the task. Possible values are Completed, Failed, Pending, and
Executing.
Executed Time The date, time, and time zone the task was executed.
Associated Task (hidden by default) Applies to Port Configuration tasks. If a port configuration task is dependent
on an object change task (such as a new Fixed Address or an edit to an existing object), this
could will show the Task ID value for the associated object change task.
Action The operation the appliance performs in this task. The can be: Add, Modify, Delete, Network
Discovery, Lock/Unlock Zone, or Restart Services.
Task Details Detailed information about the task. This message also appears in the audit log.
Approver The username of the admin who has approved this task.
Object Type The object type. For example, the appliance can display A Record or Fixed Address.
Note
You cannot use the search function to search for approval or execution status. Use filters to search for these
values.
• Create a quick filter to save frequently used filter criteria. Grid Manager provides the following default quick filters
that you can select from the Quick Filter drop-down list: PendingApprovals, RejectedTasks, and ScheduledTasks.
For more information, see Using Quick Filters.
• Export and print the information in the table.
• Control the display of information in the panel by toggling between a single-line view and a multi-line view.
• Reschedule a task, cancel a scheduled task, or execute a task immediately.
• For approvers, select a task and click the Approve icon to approve the task, or click the Reject icon to disapprove
the task. You can also reschedule the task while approving it.
Note
If you have multiple pages of tasks in Task Manager, you can select multiple tasks on the current page for
approval or disapproval. If you click the Select all objects in this dataset link to select all the tasks in the
dataset, the Approve and Reject icons are disabled and you cannot approve or reject any task.
(AppliesonlywithNetworkInsight) Approve and Reject Enables admins to approve or reject a pending job; rejecting a job immediately
cancels it.
AssociatedTask (applies only with port configuration tasks) Choosing this option opens the object change task, if any, for the currently selected
port configuration task.
ExecutionLog Opens a completed task's execution log window. the Execution Log lists the
complete communications sequence sent to a device to perform a port control
task.
Re-execute Allows you to re-run the selected task. Combined with the Execution Log, this
process can aid in troubleshooting a failed port control task.
Reschedule Opens the Reschedule window for the selected task. To immediately execute this
task, click Now. Or, in the Reschedule panel, click Later, and then specify a date,
time, and time zone. You can reschedule the task if you have the applicable
permissions. Click Save to commit the changes.
View Opens the Task Viewer to the currently selected task. For related information,
see Using the Task Viewer to View Job Logs and Approve Jobs.
Smart Folders
Use smart folders to organize your core network services data. Depending on your administrative roles and business
needs, you can filter your data by object types, names, extensible attributes, and discovered data such as conflicts,
unmanaged data, or the virtual entity data, and then place the filtered results in a smart folder. You can also group the
filtered results by defining up to 10 extensible attributes as the Group By rules. For example, you can create a smart
folder that contains all the networks you manage in Belgium, and then group the networks by building number, as
illustrated in the figure below.
Once you set up a smart folder, the appliance displays up-to-date information based on your filter and grouping criteria
each time you access the folder. You can also view and modify object information in the folder. For information, see
Viewing and Modifying Data in Smart Folders. With smart folders, you can organize your data in a meaningful way and
quickly obtain the information you need to perform specific tasks without searching the entire database.
Before you set up your smart folders, decide how you want to organize your data. You can specify search and Group By
criteria to help you group information in a meaningful way. You can also decide whether you want to include objects that
do not contain attribute values when you use the Group By criteria to group filtered data by extensible attributes. For
information, see Creating Smart Folders. Note that a smart folder becomes invalid when you delete an extensible
attribute that the folder uses as a filter or Group By criterion. You must redefine the extensible attribute and reconfigure
the folder criteria to validate the smart folder.
In Grid Manager, you can create smart folders in both the Global Smart Folders and My Smart Folders panels. In Global
Smart Folders, you can create smart folders to which other administrators can create links. Only administrators with
superuser accounts can create, edit, and delete global smart folders. For information, see Global Smart Folders. You can
Note
Infoblox strongly recommends that you use Type as one of the filter criteria to improve system performance.
3. Create smart folders in either the My Smart Folders or Global Smart Folders panel. For information, see Creating
Smart Folders.
Note
Infoblox strongly recommends that you use Type as the first filter criterion to improve system
performance.
Grid Manager displays smart folders hierarchically in a tree view based on your Group By rules as follows:
• Smart Folder section in the Finder panel.
• Selectors from which you can select a smart folder.
In the smart folder list panel however, Grid Manager displays all the smart folders in a flat list. You can modify some of
the data in the table. Double-click a row of data, and either edit the data in the field or select an item from a drop-down
list. Note that some fields are read-only. For more information about this feature, see About the Grid Manager Interface.
In the smart folder data panel, Grid Manager displays the first hierarchical level of the smart folder based on your Group
By rules. If you do not configure any Group By rules, Grid Manager displays all the objects in the results table. If you
select to include objects with no attribute values, Grid Manager also includes these objects in the hierarchical view.
Depending on your Group By rules, you can view detailed information about the objects by clicking the object link and
drilling down to the lowest hierarchical level, and then opening an object. To go back to a previous hierarchical view, click
the link of the corresponding level in the breadcrumb.
Note
For the folder copy, the appliance appends the word Copy to the original name of the smart folder. You can
change the name of the folder at anytime by editing the folder.
My Smart Folders
In My Smart Folders, you can create personal smart folders and links to global smart folders. When you create links to
global smart folders, you can only view information in the folders. However, you can create a local copy of the global
smart folder in its current state for editing purposes. Note that when the original global smart folder is updated,
information in your local copy is not updated. For information, see Saving Smart Folders Data. When you delete a link to
a global smart folder in this tab, only the link is deleted. There is no impact on the information in the original global smart
folder.
Grid Manager displays a list of smart folders in the list panel. The same list of smart folders is also displayed in the Finder
panel. For information, see Finder Panel.
When you mouse over a smart folder in the list panel, the following icons appear:
• Information: Displays information about the selected smart folder. Information includes comments and filter
criteria of the folder. It also displays how you grouped the filtered data.
• Edit: Click this icon to edit the definition and filter criteria for the smart folder.
• Delete: Click this icon to delete the smart folder. This operation does not affect the objects or networks that are in
the folder. Only the smart folder is deleted.
Related topics
DHCP Fingerprint
Infoblox Network Insight
Dashboards
The Dashboard is your home page on Grid Manager and provides easy access to tasks and a quick overview to the
status of your Grid and DNS, DHCP and IPAM services. It provides easy access to tasks and a quick view to the status
of your Grid and core network services. Grid Manager provides the following dashboards:
• Tasks: The Tasks dashboard contains task packs that provide easy access to commonly performed tasks. A task
pack is a collection of tasks that belong to a specific service or function, such as IPAM or Automation. For
information, see Tasks Dashboard.
• Status: A status dashboard contains widgets from which you can view and manage DNS, DHCP, and IPAM status
and data. You can configure multiple status dashboards for managing a large number of Grid members. For
information, see Status Dashboard.
• Reporting Clustering Status: The Reporting Clustering Status dashboard displays the reporting clustering status.
This tab is displayed only if you have configured reporting clustering. For information, see Report Clustering
Dashboard
When you first log in to Grid Manager, the tasks dashboard is your home page. You can change your home page for
subsequent logins.
To change your home page:
1. Navigate to any tab in Grid Manager (except for the Dashboards tab).
2. Click User Profile from the Toolbar and complete the following In the User Profile dialog box:
Default Dashboard: Select Status or Task from the drop-down list.
3. Save the configuration.
Grid Manager displays the selected dashboard as your home page when you log in the next time.
Task Packs
Grid Manager displays task packs, including the IPAM and NetMRI task packs, based on valid licenses installed on the
appliance. To access the IPAM task pack, you must have valid DNS or DHCP license installed on the NIOS appliance. To
access the Automation task pack, you must first set up an Infoblox NetMRI appliance, install the Automation Change
Management license on the NIOS appliance, and register as a user. For information about how to activate the
Automation task pack, refer to the Infoblox NetMRI Administrator Guide.
Note
The Tasks Dashboard will not appear in the NIOS system if no task packs are licensed for the system. Some
task packs will also have dependencies. For example, the NetMRI Task Pack licensing activates along with
either the MS license or the NIOS DHCP/DNS combination license. Should either of those licenses be disabled
for any reason, the NetMRI Tasks will also be disabled.
To use the Automation Task Pack, you must enable the NetMRI Tasks feature set and establish a working connection
between the NIOS appliance and an Infoblox NetMRI appliance. See Enabling NetMRI Tasks for details. Each task in a
task pack opens a workflow dialog in which you can create task-related objects without navigating through other tabs and
editors in Grid Manager. Depending on the task you perform, Grid Manager displays task results in the Result page from
which you can access newly created objects, such as networks and host records. Note that when a task takes longer
than usual to complete, it becomes a long running task. For information about long running tasks, see About Long
Running Tasks.
With valid licenses and proper registrations, Grid Manager displays the following task packs in the Tasks Dashboard:
Add Networks
You can create IPv4 and IPv6 networks from the Tasks Dashboard (either from scratch or from a network template that
contains predefined properties). You can also create networks from the Data Management tab. For more information
about IPv4 and IPv6 networks, see Configuring IPv4 Networks and Configuring IPv6 Networks.
To add networks from the Tasks Dashboard:
1. Click Add Networks in the IPAM task pack and complete the following in the Add Networks wizard:
• Regional Internet Registry: This section appears only when support for RIR updates is enabled. For
information about RIR, see RIR Registration Updates. Complete the following to create an RIR IPv4
network container or network:
• Internet Registry: Select the RIR from the drop-down list. The default is RIPE. When you select
None, the network is not associated with an RIR organization.
• Organization ID: Click Select Organization and select an organization from the RIR Organization
Selector dialog box.
• Registration Status: The default is Not Registered. When adding an RIR allocated network, you
can change this to Registered and select the Do not update registrations checkbox below. Note
that when you select API as the communication method, the registration status will be updated
automatically after the registration update is completed. However, when you select Email as the
communication method, the registration status will not be automatically updated. If you are
creating a new network and the registration update is completed successfully, the status will be
changed to Registered. If the update fails, the status will be changed to Not Registered. The
Note
You must click Add Next to add the network container you enter in
the Next Available Networks section. If you enter a network in
the Next Available Networks section and then use the Add icon to add another network, the
appliance does not save the network you enter in the Next Available Networks section until you
click Add Next.
• Extensible Attributes: Click the Add icon to enter extensible attributes. Grid Manager adds a row to the table each
time you click the Add icon. Select the row and the attribute name from the drop-down list, and then enter the
value. All inheritance attributes which can be inherited from a parent object will be automatically inherited when
you add a network. Inheritable extensible attributes that are required are automatically displayed. Optional
extensible attributes that are not inheritable are not automatically displayed. For more information about
extensible attributes, see Managing Extensible Attributes.
• If you are adding an RIR network, the RIR network attribute table appears. For information about these attributes
and how to enter them, see Managing RIR Attributes.
Preview RIR Submissions: Click this to view the updates before the appliance submits them to the RIPE
database. This button is enabled only when the registration action is Create, Modify, or Delete, and the Do not
update registrations checkbox is not selected.
2. Save the configuration.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, click Later and
enter a date, time, and time zone. For information, see Managing Extensible Attributes.
Add Hosts
Host records provide a unique approach to the management of DNS, DHCP, and IPAM data. By using host records, you
can manage multiple DNS records and DHCP and IPAM data collectively, as one object on the appliance. You can add
IPv4 and IPv6 addresses to host records from the Tasks Dashboard or the Data Management tab. Note that when you
add a host record from the Tasks Dashboard, they are configured only for DNS. For more information about Infoblox host
records, see About Host Records.
To add host records from the Tasks Dashboard:
1. Click Add Hosts in the IPAM Task Pack and complete the following in the Add Hosts wizard:
• Network View: This appears only when you have multiple network views. From the drop-down list, select
the network view in which you want to create the host record.
• Zone Name: Click Select to select a DNS zone from the Zone Selector dialog box.
• Exclude from Network Discovery and Immediate Discovery. When creating the new Host record, you can
direct NIOS to immediately discover the host, or to exclude it from network discovery. By default, the Add
Hosts task enables immediate discovery.
• DNS View: Displays the DNS view of the selected zone.
• Hosts: Do one of the following to add a host record:
Click the Add icon and the appliance adds a row to the table. Complete the following in the table to add a new
host record:
• Name: Enter the name of the host record.
• Zone: Displays the DNS zone you select in Zone Name. When you enter a different zone here, the
appliance displays an error message.
• Address: Enter the IP address you want to associate with this host record.
or
Click the Next Available icon to have the appliance search for the next available IP address for the host
record. For information about the next available IP address, see Configuring the Next Available Network or IP
Address. Complete the following in the Next Available IP section:
• Create new host addresses under: Click Select to select the network or address range in the
Network/Range Selector dialog box from which you want the appliance to search for the next
available IP address for this host record.
• Number of new host addresses: Enter the number of host addresses. Note that if there is not
enough space in the selected network or address range to create the number of host addresses
specified here, Grid Manager displays an error message. The maximum number is 20 at a time.
Note that when you have existing host addresses in the table and you select one, the number you
enter here includes the selected host address.
• Click Add Next to add the IP addresses to their corresponding hosts. Grid Manager lists the host
addresses in the table. Ensure that you enter a name for each host record.
• Extensible Attributes
• Apply to all above hosts: Select this to associate extensible attributes with all hosts that you have
defined. This is selected by default. You can define and associate multiple extensible attributes
with multiple hosts at once.
• Apply to selected host: Select this to associate extensible attributes with the selected host only.
Note that when you select this option for another host in the list, the Extensible Attributes table is
refreshed for you to associate a different set of extensible attributes with the selected host.
• Extensible Attributes table: Click the Add icon to enter extensible attributes. The appliance adds a
row to the table each time you click the Add icon. Select the row and the attribute name from the
drop-down list, and then enter the value. All inheritance attributes which can be inherited from a
parent object will be automatically inherited when you add a host. Inheritable extensible attributes
Add A Record
An A (address) record is a DNS resource record that maps a domain name to an IPv4 address. You can add an A record
from the Tasks Dashboard or from the Data Management tab. For more information about managing A records, see
Managing Resource Records.
To add networks from the Tasks Dashboard:
1. Click Add A Record in the IPAM task pack and complete the following in the Add A Record wizard:
2. In the Add A Record wizard, do the following:
• Name: If Grid Manager displays a zone name, enter the hostname that you want to map to an IP address.
The displayed zone name can either be the last selected zone or the zone from which you are adding the
host record. If no zone name is displayed or if you want to specify a different zone, click Select Zone.
When there are multiple zones, Grid Manager displays the Zone Selector dialog box. Click a zone name
in the dialog box and then enter the hostname. The name you enter is prefixed to the DNS zone name
that is displayed, and the complete name becomes the FQDN (fully qualified domain name) of the host.
For example, if the zone name displayed is corpxyz.com and you enter admin, then the FQDN becomes
admin.corpxyz.com. Ensure that the domain name you enter complies with the hostname restriction policy
defined for the zone. To create a wildcard A record, enter an asterisk * in this field.
• DNS View: This field displays the DNS view to which the DNS zone belongs.
• Shared Record Group: This field appears only when you are creating a shared record from the Data
Management tab. Click Select Shared Record Group. If you have only one shared record group, the
appliance displays the name of the shared record group here. If you have multiple shared record groups,
select the shared record group in the Shared Record Group Selector dialog box. You can use filters or the
Go to function to narrow down the list.
• Hostname Policy: Displays the hostname policy of the zone.
• In the IP Addresses section, click the Add icon and do one of the following:
• Select Add Address to enter the IPv4 address to which you want the domain name to map.
or
• Select Next Available IPv4 to retrieve the next available IP address in a network.
If the A record is in zone that has associated networks, the Network Selector dialog box lists the
associated networks. If the zone has no network associations, the Network Selector dialog box
lists the available networks. When you select a network, Grid Manager retrieves the next available
IP address in that network.
• Comment: Optionally, enter additional information about the A record.
• Create associated PTR record: Select this option to automatically generate a PTR record that
maps the specified IP address to the hostname. To create the PTR record, the reverse-mapping
zone must be in the database.
• Disable: Select this checkbox to disable the record. Clear the checkbox to enable it.
3. Click Next to define extensible attributes. For information, see Managing Extensible Attributes.
4. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. For information
about how to schedule a task, see Scheduling Tasks.
5. Click Restart if it appears at the top of the screen.
Note
In a signed zone, if you add or delete a TXT record that has @in its host name, you must also create or delete
the corresponding NSEC3 record.
Add MX Record
An MX (mail exchanger) record maps a domain name to a mail exchanger. A mail exchanger is a server that either
delivers or forwards mail. You can specify one or more mail exchangers for a zone, as well as the preference for using
each mail exchanger. A standard MX record applies to a particular domain or subdomain. You can add an MX record
from the Tasks Dashboard or the Data Management tab. For more information about MX records, see Managing MX
Records.
To add MX records from the Tasks Dashboard:
1. Click Add MX Record in the IPAM task pack and complete the following in the Add TXT Record wizard:
• Network View: This appears only when you have multiple network views. From the drop-down list, select the
network view in which you want to create the MX record.
• Mail Destination: If Grid Manager displays a zone name, enter the mail destination here. If no zone name is
displayed or if you want to specify a different zone, click Select Zone. When there are multiple zones, Grid
Manager displays the ZoneSelector dialog box. Click a zone name in the dialog box, and then enter the mail
destination. If you want to define an MX record for a domain whose name matches the zone you selected, leave
this field blank. Grid Manager automatically adds the domain name (the same as the zone name) to the MX
record. For example, if you want to create an MX record for a mail exchanger serving the corpxyz.com domain
and you selected the corpxyz.com zone, and leave this field empty. If you want to define an MX record for a
subdomain, enter the subdomain name. The appliance prefixes the name you enter to the domain name of the
selected zone. For example, if you want to create an MX record for a mail exchanger serving site1.corpxyz.com—
a subdomain of corpxyz.com—and you define the MX record in the corpxyz.com zone, enter site1 in this field.If
you want to define an MX record for a domain and all its subdomains, enter an asterisk ( * ) to create a wildcard
MX record.
• DNS View: Displays the DNS view of the selected zone.
• Shared Record Group: This field appears only when you are creating a shared record from the Data Management
tab. Click Select Shared Record Group. If you have only one shared record group, the appliance displays the
name of the shared record group here. If you have multiple shared record groups, select the shared record group
in the Shared Record Group Selector dialog box. You can use filters or the Goto function to narrow down the list.
• Host Name Policy: Displays the hostname policy of the selected zone. Ensure that the hostname you enter
complies with the hostname restriction policy defined for the zone.
CSV Import
You can access CSV Import Manager and perform CSV imports, manage import jobs, and view import status. You can
perform CSV imports from the Task Dashboard and the Toolbar. You can also click CSV Import Manager, which allows for
importing of data, managing import jobs, and viewing import status.
You can click New CSV import job icon in the CSV Job Manager wizard to import a CSV file to the database. You can
also verify the content in your CSV file before replacing the content of the database with the content in the imported CSV
file. For detailed information about the CSV import feature, see Importing and Exporting Data using CSV Import.
Note
Note
Ensure that the user account that you use for the registration and further communication between the products
is identical to the existing valid account on the NetMRI appliance.
Note
After you successfully register a NetMRI appliance with NIOS, you can use the Ecosystem > Cisco ISE
Endpoint feature. It is available with the NetMRI license or Network Insight license that is installed by default on
the discovery member in NIOS installations. This feature enables you to enhance identity management across
devices and applications that are connected to your network routers and switches. You can monitor domain
users, the IP addresses they log on to, the login status, and the time duration of their current status in
the IPAM tab. For information about how to collect user and device information from Cisco ISE, see Integrating
Cisco ISE into NIOS.
Network Provisioning
The Network Provisioning task runs in two modes: a basic mode with a much shorter list of configuration options, and a
more complex mode that provides detailed configuration for provisioning a network, including the use of NIOS network
views, extensible attributes and network templates.
New networks can be provisioned on routed networks and on switched networks. In the latter case, you can specify the
new VLAN number and VLAN name for provisioning, along with the Device Group Device and Interface. the Device
Group values are taken from the Device Groups defined on the NetMRI appliance from which NIOS obtains its data.
Network Provisioning supports two types of networks: IPv4, in which the new network is IPv4 only, and IPv4 and IPv6, in
which the new network runs both protocol stacks.
The system sends the configuration request to the NetMRI appliance and displays the task configuration sequence.
Note
Make sure the defined offset value lies within the addressable boundaries of the provisioned network.
The same principles also apply for IPv6 networks, except that the IPv6 value is entered manually in hexadecimal instead
of being selected from a drop-down list. Most provisioned IPv6 networks will use a /64 network address.
You can also select a different script from the default for the Network Provisioning task. To define settings for the Network
Provisioning task:
1. From the Dashboards tab, select the Tasks tab. Under the Network Provisioning task, click the settings icon on
the top right.
2. If the provisioning process requires a hostname, enable the Hostname Required? checkbox. (The network
interface hostname ("eth0," "serial0") and the Zone that it belongs to are defined in the Network Provisioning
task.)
3. Choose a gateway offset value from the IPv4 Gateway Address Offset drop-down list. If no value is selected, the
offset value defaults to 1 for the provisioned network address.
4. If an IPv6 offset is required for provisioning an IPv6 network or for provisioning a network that supports both IPv4
and IPv6 addressing, enter the IPv6 Gateway Address Offset value in hexadecimal. If no value is entered, the
offset value defaults to 0000.0000.0000.0001 for the provisioned network address, indicating an offset value of 1
for the gateway IP address.
5. In the Script Name dropdown, choose the script that you wish to run for the Port Activation task. The scripts are
located on the Trinzic Automation 4000 appliance, and referenced for use by NIOS. By default, the bundled Port
Activation script is selected.
6. Click Save.
7. Click Cancel to close the dialog.
The system sends the request to the NetMRI appliance and displays a Provisioning Network Config updated notification
message.
Port Activation
The Port Activation task provides a central console on which the interfaces for any device anywhere in the managed
network can be conveniently enabled or disabled. Ports can be taken administratively Up or Down using this task, and all
interfaces on a selected device can be activated or deactivated with a series of mouse clicks.
1. From the Dashboards tab, select the Tasks tab -> Port Activation.
2. Choose the Device Group from the drop-down list.
3. From the Device drop-down list, choose the network device on which port activation will be executed.
The Interfaces table lists all interfaces on the current device. The VLAN and VLAN Name columns list the VLAN
assigned to each port (VLAN 1/Default resides on all ports without an explicit VLAN assignment). The OP Status
column will show the current state of each interface.
4. Scroll down the table to locate the interface(s) you want to activate.
5. From the Admin Status column, select Up (or Down) from the drop-down list for the chosen interface.
6. Set any other interfaces on the current device based on your assigned task.
VLAN Reassignment
VLANs can be reassigned to new interfaces on individual L2/L3 switches in the managed network. A VLAN can have a
path across several switches; when you make changes on a given switch, make sure that the path is maintained.
To ensure end-to-end connectivity, you may need to change VLAN port assignments on more than one switch in the
path. This feature operates with the VLAN Trunking Protocol (VTP). VLAN switching is changed across one port per
switch at a time. Should you need to change VLAN assignments across more than one switch in the path, plan
accordingly.
VLANs must already be configured on the switch(es) being changed, and be detected by the NetMRI appliance.
1. From the Dashboards tab, select the Tasks tab -> VLAN Reassignment.
2. Begin by selecting the Device Group from the drop-down list. For VLAN Reassignments, you typically choose the
Switching device group.
3. From the Device drop-down list, choose the switch on which port reassignment will be executed.
4. From the Port list, choose the interface to which the VLAN will be reassigned. The Port list also shows the
Administrative and Operational states of each interface on the current device (Administratively Up/Operationally
Down, for example.)
Note
You can reassign a VLAN to a port that is operationally or administratively Down.The Current VLAN
value will show the VLAN to which the selected interface is currently assigned.
5. Choose the new VLAN value for port reassignment from the New VLAN drop-down list.
6. Click Move VLAN.
The system sends the configuration request to the NetMRI appliance and displays the task configuration sequence.
The VLAN Reassignment task will also write the full running configuration to memory, making it the saved configuration.
If the user made a change to the running configuration, in parallel with the port activation change, and did not save it,
those changes will also be saved.
Viewing Tasks Execution Logs and Approving Tasks in the Task Viewer
You can view the logged results from any task run from the Automation Tasks panel through Grid Manager's Task Viewer
that displays the following pages:
• Job History: Provides a log history of all NetMRI tasks that have recently run, including all automation task types
in the dashboard.
• Issues & Approvals: Provides links to two important items:
• Issue Details: Displays details about any network issue related to NetMRI tasks and jobs in an Issue
Viewer from the NetMRI appliance.
• Approve Jobs: These are jobs that must be approved before the NetMRI appliance can execute the job.
For example, the Isolate Rogue DHCP Server job must be approved before it will run and attempt to
isolate the detected rogue DHCP server in the network.
To view and approve tasks:
1. From the Dashboards tab, select the Tasks tab.
2. In the Automation Tasks panel, click the down arrow icon on the right and select Task Viewer.
The Task Viewer window appears, displaying a scrollable and sortable Job History table. Important columns
include the Start Time, the Job ID (a numeric value with a clickable link to the TAE Job Details Viewer, which will
open in a new browser tab), the Job Name, the User account that executed the task, the job Status and the #
Devices (the number of devices) against which the task ran. The Job History page shows the most recent subset
of executed NetMRI jobs. A yellow bar at the top of the table provides a click here to see more link, which takes
the user to the NetMRI appliance Job History page in a new browser tab.
3. If an item appears in the Issues & Approvals page, do one of the folllowing in the Action column:
a. To view an issue in more detail, click an Issue Details link. This displays the NetMRI appliance Job Details
page in a new browser tab for the selected job.
Status Dashboard
A status dashboard contains widgets from which you can view and manage data. Widgets are the building blocks of
status dashboards. For more information about widgets, see Adding Widgets to Dashboards. They provide information
about different aspects of your Grid and networks. For example, the Member Status widget provides general information
about a Grid member, and the Network Statistics widget provides data for a specified network.
The appliance provides a default status dashboard. Grid Manager displays the default dashboard only when there is
more than one widget on the dashboard. You can add and modify widgets in the default dashboard, but you cannot
rename or delete it. From a dashboard, you can access your most commonly accessed tasks and monitor appliance
status. You can configure your own status dashboards to which you can add widgets that help you manage different data.
Configuring multiple status dashboards helps organize widgets in a meaningful way and improves dashboard and widget
performance. This is especially useful when you have a Grid serving a large number of Grid members. When you
configure a new dashboard, you can use the existing dashboard as a template. You can create up to 100 copies at a time
using the Add Dashboard option. For information about how to add status dashboards, see Adding Status Dashboards.
You can add widgets to different dashboards, however, you can add only one widget at a time on each dashboard. The
default number of widgets per dashboard is 10. The maximum number of widgets that you can add on each dashboard is
20 at a time. You can define the number of widgets that can be configured on each dashboard in User Profile. This
limitation applies only to dashboards that you configure and does not apply to the default dashboard. For information
about how to specify the widget limit, see Configuring Widget Limit per Dashboard.
Grid Manager provides a default Security dashboard if you have installed any or all of the following licenses on the
appliance: Threat Protection, RPZ, and Threat Analytics. The Security dashboard contains widgets that help you monitor
the security status of the Grid. In the Security dashboard, you can add and remove widgets, but you cannot rename or
delete them.
Note
To ensure that the Security dashboard displays correct data, use NTP to synchronize the time of the Grid
members with that of the Grid Master.
If you have configured a lot of status dashboards, you can use the Quick Navigation icon to quickly access each status
dashboard. For information, see Using Quick Navigation. The Status Dashboard figure below illustrates the typical layout
in Grid Manager after you configure multiple status dashboards.
Status Dashboard
Reset . When you click on an icon, Grid Manager displays thumbnails of the widgets belonging to the
respective filter. If you click filters one after the other without clicking Reset, Grid Manager displays thumbnails of
all widgets along with the icon that indicates the category to which the widget belongs. Click Reset to view only
those widgets that belong to the selected category.
3. Select and drag a widget to the desired location on your dashboard. You can also click icon to add a widget
to the desired dashboard.
After you add a widget to the dashboard, you can configure it to provide relevant data. You can also copy or move
a widget, by selecting and dragging it to its new location on your dashboard. Grid Manager saves your dashboard
configuration and displays it the next time you log in.
You can turn on auto-refresh by clicking On in the Turn Auto Refresh field at the top of the dashboard to
periodically refresh the contents of all widgets in the dashboard. Click Off to disable auto-refresh for all widgets in
the dashboard. When auto-refresh is disabled, you can enable it for individual widgets by clicking the Configure
Warning
If the Detailed Status panel is open, the following actions take place:
• Grid Manager auto refreshes at a rate of 30 seconds.
• Widgets that support user-specified auto refresh, refresh at the rate specified in the Auto
Refresh Period field.
Therefore, even if you set the session timeout to be to greater than the auto refresh rate, auto refresh
still takes place. The Grid Manager session does not time out because auto refresh takes precedence
over the session timeout. For more information about widgets, see Status Dashboard.
Note that "Security" is reserved for the default Security dashboard. Grid Manager displays an error message if you name
a new dashboard "Security".
Note
If you have configured the same threshold value for both Yellow and Red color in
the Global Dashboard Properties editor and if the same number of events are triggered, then Grid Manager
displays the status in red in the Grid Security Status widget.
Grid Status
The Grid Status widget provides status information about the Grid members and services. Add the Grid Status widget to
your Dashboard to monitor the Grid status.
You can configure the Grid Status widget to display information about all Grid members or only Grid members that have
service errors. To modify the Grid Status widget, click the Configure icon and select one of the following:
• Show all Grid members (this is the default)
• Only show members with service warnings or errors: When you select Only show members with service warnings
or errors, the widget displays only the members that have service errors. The widget does not display any data in
the member table if all the services on all members are running properly.
• Group Members by: If you want to group members by the same extensible attribute value, select this and choose
an extensible attribute from the drop-down list. The appliance groups Grid members that have the same
extensible attribute value, and the Grid Status displays the following information:
• <Extensible Attribute Name>: The value of the selected extensible attribute. You can click the link of the
extensible attribute value to view all the members in this group in the Grid/Members view.
• Status: This is the overall status for all members in the group. Depending on the status of each member,
the overall status can be one of the following:
• Working: Indicates that all the members in the group are running properly.
• Warning: Indicates that one of the members in the group has operational problems. For example,
if there are two members in a group with one member Running and another member is Offline,
then the overall status will be Warning.
• Failed: Indicates that at least one of the members in the group is in the failed status and none of
the members in the group are in the Running or Working status. For example, if there are two
members in the group and one of them is in Failed status and the other is Offline, then the overall
status is Failed.
• Offline: Indicates that one or more members in the group is offline and none of the members in the
group are in the Failed or Running status. For example, if a member is in the Working status and
another member is in the Offline status, then overall status is Offline.
• Inactive: Indicates that one or more members in the group is inactive and none of the members in
the group are in the Failed, Offline, Working, or Running status.
• Unknown: Indicates that the status of all the members in the group is unknown.
Note
You can click a member link to monitor the detailed status of the selected member. Grid Manager
displays the Grid tab -> Member tab. You can click on a group to show the members of the group in the
Grid/Members view.
The Grid Status widget also displays the following information in the member table:
• Member Name: The name of the member.
Yellow At least one of the Grid members is connecting or synchronizing with its Grid Master.
Red At least one of the Grid members does not have a Grid license, is offline, upgrading,
downgrading, or shutting down.
This section also displays the overall operational status of the DNS, DHCP, NTP, FTP, TFTP, HTTP (File Distribution),
bloxTools, Captive Portal, DNS Accelerator usage, and Reporting services that are currently running on the Grid. The
status icon can be one of the following:
At least one of the Grid members is having issues with the enabled service.
Yellow
The enabled service is not running properly on at least one of the members. (A red status icon can also appear
Red temporarily when the service is enabled and begins running, but the monitoring mechanism has not yet notified
Grid Manager.)
You can modify the Member Status or the System Status widget by clicking the Configure icon. If you have an
independent appliance, you can only configure some of the following:
• For Member Status widget only: Click Select Member to select a Grid member for display. When you select the
reporting server, the widget displays reporting usage.
• Select the information you want to display:
• Show Role: For Member Status widget only. Click to display whether the appliance is a Grid Master, Grid
Master candidate, or Grid member. An independent appliance does not have a Grid license installed.
• Show Hardware Type: Click to display the appliance hardware model.
• Show HA Status: Click to display whether the appliance is part of an HA pair. It displays one of the
following:
• Standalone: The Grid member is an independent appliance.
• HA OK: The Grid member is part of an HA pair that is functioning properly.
• HA Broken: The appliance is part of an HA pair that is not operating properly. You can check the
logs to determine the problem.
• Show System Uptime: Click to display the duration of time (days, hours, and minutes) that the Grid
member has been up and running.
• Statistics: Select the data that you want to display and its format:
• CPU: Click to display the percentage of CPU that is in use. Select either Dial or Bar for the display format.
• Memory: Click to display the current percentage of memory that is in use. Select either Dial or Bar for the
display format.
• Database: Click to display the percentage of the database that is in use. Select either Pie or Bar for the
display format.
• Disk: Click to display the percentage of the data partition on the hard disk drive in use. Select either Pie or
Bar for the display format.
• System Temperature: Click to display the system temperature. Depending on the hardware model, the
system temperature may not be available. Select to display the temperature in either Celsius or
Fahrenheit.
• CPU Temperature: Click to display the CPU temperature. Depending on the hardware model, the CPU
temperature may not be available. Select to display the temperature in either Celsius or Fahrenheit.
Click the Configuration icon again to hide the configuration panel after you complete the modification.
Grid Manager displays the hostname of the appliance at the top of the widget. You can click the name link to view
detailed information about the appliance. The widget also displays the upgrade status if the member is currently in the
process of an upgrade. If the member is scheduled for an upgrade, the Scheduled for upgrade link appears. You can
click this link to access the Grid tab -> Upgrade tab to view more details about the date and time of the scheduled
upgrade.
The widget also displays the service status of the following: FTP, TFTP, HTTP (File Distribution), DNS, DHCP, NTP,
bloxTools, Captive Portal, DNS Accelerator, and Reporting in the Services section. The service status can be one of the
following:
Yellow The service is enabled, but there may be some issues that require attention.
Red The service is enabled, but it is not running properly or is out of synchronization. (A red status
icon can also appear temporarily when a service is enabled and begins running, but the
monitoring mechanism has not yet notified the GUI engine.)
The widget also displays the statistics you specified, such as CPU usage, memory, and database usage, in the format
you selected.
When you select the reporting server, you can also see the reporting usage information:
• Reporting Usage: Displays the daily consumption rate for the reporting service.
For more information about reporting, see Infoblox Reporting and Analytics.
DNS Statistics
The DNS Statistics widget provides statistics for a member or for a zone. The zone statistics are cumulative, collected
from all the members that are authoritative servers for zones or are hosting stub zones. The widget displays the totals for
each type of DNS response as well as a line graph that tracks the responses per second.
You can add a DNS Statistics widget to your Dashboard for each zone or member DNS server on the Grid. To configure
the DNS Statistics widget, click the Configure icon and do the following:
• Click Select Member. In the Member Selector dialog box, choose a Grid member to display statistics for all its
stub zones and authoritative zones.
or
• Click Select Zone. In the Zone Selector dialog box, choose a DNS zone to display statistics for that zone only.
The widget displays only the option that you selected on your subsequent logins. For example, if you clicked Select
Member, the widget displays the Select Member option only, and not the Select Zone option, when you log in again.
• Graph Configuration: Select which DNS messages you want to track in the Responses per Second graph.
• Success: The number of successful queries.
• NXDOMAIN: The number of queries for domain names that did not exist in the database.
• Referral: The number of queries that became referrals.
• NXRRSET: The number of queries for domain names that did not have the requested records.
• Failure: The number of queries that failed due to reasons other than nonexistent domain names or
records in a domain.
• Recursion: The number of recursive queries for which the name server sent queries to other name
servers.
The widget displays the following information:
• DNS Responses tab: Displays a pie chart and the total number of each type of message. It also displays the total
number of full and incremental zone transfers that the Grid member performed.
• Responses per Second tab: Displays a line graph that tracks the DNS responses received per second, within an
hour. The time is displayed according to the time zone specified in the User Profile. If the auto-detect time zone
The widget displays the IPv4 ranges with utilization percentages that surpass the threshold. To configure the Ranges
Over Threshold widget, click the Configure icon and do the following:
• Network View: Select a network view in which you want to monitor the IPv4 ranges. This field is displayed only
when you have more than one network view.
• Threshold: Enter a new threshold value. The default is 75%.
In addition, you can do the following:
• Click the Export button to export the list of IPv4 ranges that surpass the threshold to a file in CSV format.
• Click the Refresh button to refresh the data in the list.
DHCP Statistics
The DHCP Statistics widget displays statistics about the different types of DHCP messages that a Grid member sends
and receives. The widget displays the totals for each type of DHCP message as well as a line graph that tracks the
messages per second.
You can add a DHCP Statistics widget to your Dashboard for each member DHCP server in the Grid. If the DHCP
service is not enabled or is offline, the widget displays a message indicating that the DHCP statistic are not available.
To configure the DHCP Statistics widget, click the Configure icon and do the following:
• Protocol: Select either IPv4 or IPv6.
• Click Select Member. In the Member Selector dialog box, select a Grid member from the list.
• Graph Configuration: This section lists IPv4 or IPv6 messages, depending on the protocol you selected.
• Select which IPv4 messages you want to track in the Messages per Second graph.
• Discovers: The number of DHCPDISCOVER messages that the Grid member received from DHCP
clients. A DHCP client broadcasts a DHCPDISCOVER message to obtain an IP address.
• Offers: The number of DHCPOFFER messages that the Grid member sent to DHCP clients. If the Grid
member has an IP address that it can allocate to the DHCP client that sent the DHCPDISCOVER
message, the Grid member responds with a DHCPOFFER message that includes the IP address and
configuration information.
• Requests: The number of DHCPREQUEST messages that the Grid member received from DHCP clients.
A DHCP client sends DHCPREQUEST messages when it selects a lease, connects to the network, and if
it renews the lease.
Network Statistics
The Network Statistics widget provides information about IP address usage in an IPv4 network. You can monitor several
networks simultaneously to view the distribution of address resources. Such information can indicate if there is a
sufficient number of available addresses in each network. It can also provide information about the distribution of address
resources, indicating if there are too many unused addresses in one network while all the addresses in another are in
use.
For network containers, the threshold is the percentage of IP address space that has been allocated. For subnets, it is
the percentage of used addresses, except the broadcast and network addresses. The widget displays the network
containers and subnets with utilization percentages that surpass the threshold.
You can also select to view IPv4 cloud networks only if you have deployed Cloud Network Automation. For information
about this feature, see Deploying Cloud Network Automation.
Port Status
The Port Status widget provides a quick way to inspect the interface status for any discovered device in the network. The
widget shows an overview of all interfaces on all devices or for a single device (called the Data Scope).
Discovery Status
The appliance can run an IP discovery to detect and obtain information about active hosts in specified networks. For
information about the discovery process, see About Discovery.
You can add the Discovery Status widget to your Dashboard. From this widget, you can access Discovery Manager and
configure parameters for a discovery. You can do the following from the widget:
• Start a discovery immediately. For more information about immediate discovery, see Configuring IP Discovery.
• Schedule a discovery for a later date and time. For more information about discovery, see Configuring IP
Discovery.
• Configure a recurring discovery. For more information about recurring discovery, see Configuring IP Discovery.
• Click the Start button to start a discovery process.
• Click the Pause button to temporarily pause the process.
• Click the Stop button to stop the process.
This widget displays the status of discovery tasks. If there are no active discovery tasks, the widget displays the
discovery results of the previous tasks. For information about starting and scheduling a discovery task, see Guidelines
Before Starting a Discovery.
After you start a discovery, the Discovery Status widget displays a status bar that indicates the discovery is in progress. It
also tracks the number of networks in an IP discovery. You can click the Refresh icon to update the discovery status.
The widget displays the following information about the discovery process:
For more information about discovery and its features and requirements, see Infoblox Network Insight and its associated
sections.
The Advanced Discovery Status widget provides several basic counts describing the general state of device discovery
within the Grid, and for networks outside the Grid being inventoried by the NIOS appliances designated for discovery.
The widget divides counters into two categories: Networks and Assets. Network counters refer to counts of managed and
unmanaged networks discovered by Probe appliances. Asset counters refer to counts of specific types of network
devices, termed Assets, which are comprised of end hosts, enterprise servers, enterprise printers, and any other
enterprise asset that exists in an end-user network segment. The widget counters include:
My Commands
The My Commands widget provides easy access to commands that you frequently use, so you can perform your tasks
without leaving the Dashboard. You can add one My Commands widget to your Dashboard.
To configure the My Commands widget, click the Configure icon and do the following:
DDNS Statistics
The DDNS Statistics widget provides information about the dynamic DNS (DDNS) updates that occur on the DNS service
of a selected Grid member. The widget displays the total number of DDNS updates that succeeded, failed, and that were
rejected. It also displays a line graph that tracks the status of the DDNS updates per second.
You can add a DDNS Statistics widget to your Dashboard for each DNS server on the Grid that accepts dynamic DNS
updates.
To configure the DDNS Statistics widget, click the Configure icon and do the following:
• Click Select Member. In the Member Selector dialog box, select a Grid member from the list.
• Graph Configuration: Select which updates you want to track in the Updates per Second graph:
• Success: The number of DDNS update requests that succeeded.
• Prerequisite Reject: The number of DDNS update requests that were rejected because the prerequisite
conditions specified in the request were not met.
• Reject: The number of DDNS update requests that were rejected by the DNS service.
• Failure: The number of DDNS update requests that failed.
The widget displays the following information:
• DDNS Updates tab: Displays totals for each type of update.
• Updates per Second tab: Displays a line graph that tracks the status of the DDNS updates. The time is displayed
according to the time zone specified in the User Profile. If the auto-detect time zone option is enabled and Grid
Manager cannot determine the browser time zone, then the time is displayed in UTC format. You can mouse over
the graph to display the coordinates of any point in the graph.
To configure the System Activity Monitor widget, click the Configure icon and select a Grid member and the resources
that you want to track:
• Click Select Member. In the Member Selector dialog box and select a Grid member from the list.
• CPU: Select which type of CPU usage you want to track:
• User: The CPU usage of user applications, such as programs and libraries.
• System: The CPU usage of the kernel and drivers.
• Idle: The percentage of CPU that is not in use.
• System Memory: Select which portion of the system memory you want to track:
• Real Memory Used: The physical RAM usage.
• Swap Used: The swap area usage. The swap area is the disk area that temporarily holds a process
memory image.
• NIC Usage: Select how you want to measure network traffic:
• Bytes: Reports the number of bytes.
• Packets: Reports the number of packets.
Note
For vNIOS appliances, some of the options in the drop-down list may vary depending on your vNIOS
configuration. For example, if you are using a single network interface instance of vNIOS for GCP, you
will see choices specific to the LAN1 interface only. For more information, see the vNIOS documentation
specific to your product at Appliances.
• CPU Utilization and Top N Processes: Set the auto refresh period in this section. NIOS displays the information
for all available cores.
• Auto Refresh Period for CPU Utilization and Top N Processes: Enter the time interval in seconds for the
CPU Core Utilization graph and the top N process data to auto refresh and display the CPU core
utilization information. If you enter 12, the graph displays new information after every 12 seconds. You can
enter a minimum refresh interval of 10 seconds and a maximum refresh interval of 30 seconds. By
default, the time interval is set to 10 seconds. This field is applicable only to the CPU Utilization and Top N
Processes tabs.
• Auto Refresh Period: Enter the refresh interval in seconds for the data in the CPU, System Memory, and NIC
Usage tabs to auto refresh.
The System Activity Monitor widget displays a tab for each resource: CPU, System Memory, NIC Usage, CPU Utilization,
Top N Processes.
Each tab contains a line graph that tracks the resource utilization per second.
• CPU: The graph on the CPU tab tracks the percentage of CPU usage.
• System Memory: The graph on the System Memory tab tracks the memory utilization percentage.
• NIC Usage: The graph on the NIC Usage tab tracks either bytes or packets per second.
• CPU Utilization: If you select the Live option, the graph tracks live CPU utilization data for the last 10 minutes for
all CPUs in your Grid member. The graph is refreshed based on the time interval you specify in the Auto Refresh
Period for CPU Utilization and Top N Processes field. Each CPU is denoted in a different color. If you select the
Historical option, you can view the CPU utilization data for up to a maximum of past 60 minutes based on the time
range you specify in the Earliest and Latest fields. For example, if you enter 2019-09-05 and 09:20:42 AM in the
Earliest field and 2019-09-05 and 10:20:42 AM in the Latest field, the graph displays the CPU utilization data for
5th September 2019 between 9:20:42 AM and 10:20:42 AM. You can view data for a maximum of past of 5 days
but the time difference between Earliest and Latest time should not exceed 60 minutes.
• Top N Processes: If you select the Live option, the table displays the process ID and name of the top N
processes that are consuming CPU utilization. N is the number that you specify in the Number of Top Processes
field on the Monitoring tab of the Grid Properties editor. It also displays the percentage of CPU utilized by each
process. The data is refreshed based on the time interval you specify in the Auto Refresh Period for
CPU Utilization and Top N Processes field. If you select the Historical option, you can view past top N process
data based on the time range you specify in the Earliest and Latest fields. For example, if you enter 2019-09-05
and 09:20:42 AM in the Earliest field and 2019-09-05 and 10:20:42 AM in the Latest field, the graph displays the
top process data on 5th September 2019 between 9:20:42 AM and 10:20:42 AM. You can view data for a
maximum of 5 days.
The time is displayed according to the time zone specified in the User Profile. If the auto-detect time zone option is
enabled and Grid Manager cannot determine the browser time zone, then the time is displayed in UTC format. You can
mouse over the graph to display the coordinates of any point in the graph.
To configure the File Distribution Statistics widget, click the Configure icon and select one of the following chart types:
• Pie
• Bar
The File Distribution Statistics widget displays the following information:
• File System Utilization: The percentage of utilization of the overall allocated file distribution subsystem space on
all members. You can use this information to verify if there is sufficient space for file distribution in the Grid.
You can add only one Active WebUI Users widget to the Dashboard. You must have a superuser account to add this
widget to the Dashboard.
Gray The DNS service is stopped or management of the Microsoft DNS server is disabled.
• DHCP: The status of the DHCP service on the Microsoft server. The DHCP service status can be one of the
following:
Gray The DHCP service is stopped or management of the Microsoft DHCP server is
disabled.
• Active Directory Sites: The status icon in green indicates the synchronization status of Active Directory Sites on
the Microsoft server.
• Enable DNS Monitor & Control: Displays Yes if the monitor and control status is enabled for the DNS service on
the Microsoft server and displays No if it is disabled.
• Enable DHCP Monitor & Control: Displays Yes if the monitor and control status is enabled for the DHCP service
on the Microsoft server and displays No if it is disabled.
The widget displays the following information about the import jobs that were submitted in the past 30 days:
• User Name: The admin user who submitted the CSV import. Only superusers can view this column.
Note
After a product restart, which can be caused by a failover, all Import in progress jobs go
into Import stopped state; all Import pending jobs continue to be queued for execution.
Note
Superusers can view all CSV import jobs and limited-access users can view only the jobs they submitted.
Pending Approvals
The Pending Approvals widget provides information about tasks that are pending your approvals. Add the Pending
Approvals widget to your Dashboard to monitor tasks that require your approvals.
You can select a task and perform the following:
• Click the Approve icon to approve the task.
• Click the Reject icon to disapprove the task.
You can also click Task Manager to access the Administration tab -> Workflow tab -> Task Manager tab.
The Pending Approvals widget displays the following information about each task that requires your approval:
• Task ID: The ID associated with the task. The appliance assigns an ID to a task in chronological order.
• Submitter: The username of the admin who scheduled or submitted the task.
• Ticket Number: The reference number entered by the submitter to identify the task. You can enter up to 20
alphanumeric characters.
• Scheduled Time: The date, time, and time zone when the task was scheduled for execution.
• Affected Object: The name or value of the object that is associated with the task. For example, if the task involves
an A record, this field displays the domain name of the record. If it is a fixed address, it displays the IP address of
the fixed address.
• Object Type: The object type. For example, the appliance can display A Record or Fixed Address.
Infoblox Community
The Infoblox Community widget displays the latest news from Infoblox. It provides links to video clips that show you how
to perform certain tasks, such as how to prepare for IPAM Express and how to add a network. You can click available
links in the widget to get more information about Infoblox products and solutions.
Note that content in the Infoblox Community widget may not be displayed in certain versions of Mozilla FireFox, Google
Chrome, and Microsoft Internet Explorer due to restrictions these browsers use to block certain secure data.
Follow these steps to unblock the Infoblox Community widget and view data in your respective browser:
• MozillaFireFox: Click the Shield icon in the address bar and choose DisableProtectiononThisPage from the
drop-down list. The icon in the address bar changes to a warning triangle and content is displayed in the
InfobloxCommunity widget. For more details, refer to information at https://blog.mozilla.org/tanvi/2013/04/10/
mixed-content-blocking-enabled-in-firefox-23/.
• Google Chrome: Click the Shield icon in the address bar and click Load unsafe script in the pop-up box.
Chrome automatically refreshes the webpage and loads the content in the Infoblox Community widget. For more
details, refer to information at https://support.google.com/chrome/answer/1342714?hl=en.
• Internet Explorer: Click the Compatibility View icon adjacent to the address bar. The browser refreshes and
the Security Warning dialog box is displayed. Click No in the dialog box. The Only Secure content is displayed
pop-up blocker is displayed at the bottom of the browser. Click the Show all content button in this pop-up blocker
to view the content. For more details, refer to the information at http://windows.microsoft.com/en-in/internet-
explorer/use-compatibility-view#ie=ie-8.
Note
The Mobile Devices widget updates its data every 15 minutes. A device might not be displayed in this widget if
its lease expires within 15 minutes.
To configure the Mobile Devices widget, click the Configure icon and do the following:
• Click Select Network View. In the Network View Selector dialog box, select a network view from the list and click
OK.
Note that if multiple network views were previously configured, Grid Manager displays the default network view. You can
select another network view from the Network View Selector dialog box.
The widget displays the number of active leases for the following device classes:
Microsoft Windows 8
Microsoft Windows XP
Cloud Statistics
The Cloud Statistics widget appears only when you have deployed the Cloud Network Automations license on the Grid
Master. This widget displays statistical information for cloud objects. It contains the following tabs: Tenant & VMs, Fixed
vs. Floating and Available vs. Allocated. You must install valid cloud related licenses to access this widget. For more
information about installing licenses and enabling Cloud Network Automation, see Deploying Cloud Network Automation.
To modify the Cloud Statistics widget, click the Configure icon and select one of the following:
• Show Statistics From:
• All Tenants: Select this to display statistics for all tenants.
• Select Tenant: Click Select to choose a specific tenant for which statistics are displayed.
• Show:
• All IP Addresses: Select this to display all IP address allocation for all tenants or the tenant of your choice.
• Fixed: Select this to display only fixed IP address allocation for all tenants or the tenant of your choice.
Fixed IP addresses correspond to OpenStack Fixed IP Addresses.
Dig Request
The Dig Request widget enables you to perform a DNS lookup on the Grid Master or on the specified Grid member and
displays the output of the dig command.
Note
When RPZ license is installed on both the Grid Master and the Grid member, the RPZ rule might not be
triggered if you perform dig on the Grid member from the Grid Master.
To perform a DNS lookup using the dig command, complete the following:
• Run dig command on: Select one of the following. The default is Grid Master.
• Grid Master: Select this to perform a DNS lookup on the Grid Master.
• Grid Member: Select this to perform a DNS lookup on the Grid member. Click Select Member to select a
Grid member. If there are multiple members, the Member Selector dialog box is displayed, from which you
can select a member. Click the required member name in the dialog box. You can also click Clear to clear
the displayed member and select a new one.
• Name Server to Query(Optional): Optionally, specify the name server on which you want to perform a DNS
lookup. You can enter either the name, IPv4 address, or IPv6 address of the name server.
• Record Type: Select the resource record type from the drop-down list. You can select Any to query all the
resource record types or select one of the following from the drop-down list: A, AAAA, CAA, CNAME, DNAME,
MX, NAPTR, NS, PTR, SRV, TXT, AXFR. If the record type is Unknown, then directly enter the type of unknown
record. For example, for an unknown record of type RP, enter RP. The default is Any.
• Send Recursive Query: Select this to send recursive queries for the domain. This checkbox is selected by default.
• Domain Name to Query: Enter the domain name to query.
Click Perform Dig. The widget displays the status and output of the dig command.
Note that if you have installed RPZ license and enabled RPZ logging in the Grid, you can view RPZ syslog messages by
clicking View RPZ Syslog if the specified domain name matches the RPZ rule.
Note
If the Threat Protection license is not installed on any of the Grid members, Grid Manager does not display any
threat protection related information in this widget. Similarly, if the RPZ license is not installed on any of the Grid
members, Grid Manager does not display RPZ and DNS Threat Analytics related information in this widget and
if the Threat Analytics license is not installed on any of the Grid members, Grid Manager does not display DNS
Threat Analytics related information in this widget.
Warning
If the Detailed Status panel is open, the following actions take place:
Click the Configure icon again to hide the configuration panel after you complete the modification.
Note
When an HA Grid Master fails over, the new active node re-collects data from all the Grid members. Hence, it
might take a few seconds until the data is displayed in the Security dashboard. When an HA Grid member fails
over, the Grid Master stops collecting data from the HA member.
The Security Status for All Members widget displays the following information:
• Overall Status: The current overall security status of the members that support Infoblox Advanced DNS Protection
and Infoblox Threat Insight. This can be OK, Warning, Critical, or Unknown.
The security status for a member might be Unknown if NTP service is out of synchronization for the member. Hence, to
ensure that the correct data is displayed for the member, use NTP to synchronize the time of the member with that of the
Grid Master.
• Member: The name of the member. You can hover your mouse over the member name and view the Member
Status widget. For information about the Member Status widget, see Member Status (System Status).
• IPv4 Address: The IPv4 address of the member.
• IPv6 Address: The IPv6 address of the member.
• Threat Protection Status: The status of the threat protection service running on the member. This can be either
OK, Warning, Critical, NotSetup, or Unknown. You can hover your mouse over the threat protection status and
view the Threat Protection Status for Member widget. For information about the Threat Protection Status for
Member widget, see Threat Protection Status for Member.
• RPZ Status: The status of the RPZ service running on the member. This can be either OK, Warning, Critical,
NotSetup, or Unknown. You can hover your mouse over the RPZ status and view the
ResponsePolicyZone(RPZ)Statistics widget. For information about the Response Policy Zone (RPZ) Statistics
widget, see Response Policy Zone (RPZ) Status for Member.
• Analytics Status: The status of the DNS Threat Analytics service running on the member. This can be either OK,
Warning, Critical, NotSetup, or Unknown.
You can also do the following in this widget:
• Turn on auto-refresh. Click the Configure icon and select the AutoRefreshPeriod checkbox to turn on auto-
refresh. Specify the auto-refresh period in seconds. The default auto refresh period is 30 seconds.
Warning
If the Detailed Status panel is open, the following actions take place:
• Grid Manager auto refreshes at a rate of 30 seconds.
• Click the Action icon (shown as a gear in each row of the table) next to the overall status of each member, and
select ViewSyslog to view all the events logged in the syslog. Grid Manager displays the syslog messages in the
Syslog Preview window.
• Click the Export icon to export the data displayed in this widget.
• Click the Print icon to print the data displayed in this widget.
• Click Response Policy Zones link in the GoTo field at the top of the widget to view the RPZs configured on the
member. Grid Manager displays the Response Policy Zones tab in the DNS tab. To navigate back to the Security
dashboard, click Back to Security Dashboard at the top left corner of the navigation bar in the Response Policy
Zones tab.
• Click Threat Protection link in the Go To field at the top of the widget to view the threat protection rulesets
configured on the member. Grid Manager displays the Threat Protection Rules tab in the Security tab. To navigate
back to the Security dashboard, click Back to Security Dashboard at the top left corner of the navigation bar in the
Threat Protection Rules tab.
• Click Threat Analytics link in the Go To field at the top of the widget to view the whitelist domains configured on
the member. Grid Manager displays the Threat Analytics tab. To navigate back to the Security dashboard, click
Back to Security Dashboard at the top right corner of the panel in the Threat Analytics tab.
• Click Members link in the Go To field at the top of the widget to view the members configured in the Grid. Grid
Manager displays the Members tab in the Grid Manager tab. To navigate back to the Security dashboard, click
Back to Security Dashboard at the top left corner of the navigation bar in the Members tab.
Warning
If the Detailed Status panel is open, the following actions take place:
• Grid Manager auto refreshes at a rate of 30 seconds.
• Widgets that support user-specified auto refresh, refresh at the rate specified in the Auto
Refresh Period field.
Therefore, even if you set the session timeout to be to greater than the auto refresh rate, auto refresh
still takes place. The Grid Manager session does not time out because auto refresh takes precedence
over the session timeout. For more information about widgets, see Status Dashboard.
• Click the Total Events by Severity tab to view information about threat protection related events by the severity
level. For information, see Total Events by Severity.
• Click the Top 10 Grid Members tab to view information about the top 10 Grid members that have the most
number of threat protection events. For information, see Top 10 Grid Members.
• Click the Events Over Time tab to view information about the total event count for each type of event severity in
the given time frame. For information, see Events Over Time.
• Click the Top 10 Rules tab to view information about the top 10 threat protection rules with the most number of
hits. For information, see Top 10 Rules.
• Click the Top 10 Clients tab to view information about the top 10 clients that have the most number of threat
protections events. For information, see Top 10 Clients.
Top 10 Rules
The Top 10 Rules tab displays a horizontal bar chart that tracks the top threat protection rules that have the most number
of hits. Each severity level is represented with a different color. The report displays the top 10 rules in descending order.
If you have configured a reporting member in the Grid, the Go To History link is displayed in this tab. You can click Go To
History to view the Threat Protection Top Rules Logged report in the Reporting tab. To navigate back to the Security
dashboard from the Reporting tab, click Back to Security Dashboard at the top left corner of the navigation bar in the
Reporting tab.
Note
The data displayed in this widget may not be consistent with the data displayed in
the Threat Protection Top Rules Logged by Source report.
Warning
If the Detailed Status panel is open, the following actions take place:
• Grid Manager auto refreshes at a rate of 30 seconds.
• Widgets that support user-specified auto refresh, refresh at the rate specified in the Auto
Refresh Period field.
Therefore, even if you set the session timeout to be to greater than the auto refresh rate, auto refresh
still takes place. The Grid Manager session does not time out because auto refresh takes precedence
over the session timeout. For more information about widgets, see Status Dashboard.
Click the Configure icon again to hide the configuration panel after you complete the modification. You can do the
following in this widget:
• Click the Summary tab to view the statistics for the following resources in the format you selected:
Fields Description
Client IP Address Data is retrieved from the src field. Example: 10.36.0.251
Requested FQDN It is retrieved from the data between the rewrite and [A] via fields. Example:
w18.vg.
RPZ Entry It is retrieved from the data after the via in msg field. Example:
w18.vg.fireeye.com
You can export data displayed in this tab by clicking the Export icon. For more information, see Exporting Displayed
Data.
Trend
The Trend tab displays statistics of RPZ hits during the last 60 minutes for the Grid. You can use a stacked graph or a
line graph to view the hits. Each of the RPZ policy is represented with a different color. This tab displays the following
information:
• Client Hits: Total number of queries that triggered an RPZ policy. Note that this option is not displayed when you
choose Stacked Diagram, but displayed only when you choose Line Diagram.
• Passthru Hits: Total number of queries that triggered a Passthru RPZ rule. For more information about passthru
rules, see Managing Passthru Rules.
Health
The Health tab displays information of RPZ zones and their last updated date and time. This data is retrieved directly
from the database. Note that you cannot sort or filter values in this tab. You can export the data displayed in this tab by
clicking the Export icon. For more information, see Exporting Displayed Data.
Fields Description
Example: 10.36.0.251
Requested FQDN It is retrieved from the data between the rewrite and [A] via fields. Example:
w18.vg.
RPZ Entry It is retrieved from the data after the via in msg field. Example:
w18.vg.fireeye.com
Trend
The Trend tab displays statistics of RPZ hits on the selected member during the last 60 minutes. You can use a stacked
graph or a line graph to view the hits. DNS service generates RPZ statistics for the selected member. Each of the RPZ
policy is represented with a different color. This tab displays the following information:
• Client Hits: Total number of queries that triggered an RPZ policy. Note that this option is not displayed when you
choose Stacked Diagram, but displayed only when you choose Line Diagram.
• Passthru Hits: Total number of queries that triggered a Passthru RPZ rule. For more information about passthru
rules, see Managing Passthru Rules.
• Blocked Hits: Total number of queries that triggered a Block (No Data) or Block (No Such Domain) RPZ rule. For
more information, see Managing Block (No Data) Rules or Managing Block (No Such Domain) Rules respectively.
• Substituted Hits: Total number of queries that triggered a Substitute (Domain Name) or Substitute (Record) RPZ
rule. For more information, see Managing Substitute (Domain Name) Rules and Managing Substitute (Record)
Rules.
• Timestamp: The graph displays a 24 hours time window.
Note the following about this tab:
• The statistical data in DNS service will be reset when you stop and restart the DNS service or if you force an
active DNS service to restart regardless of its state. This results in loss of prior data.
• Using this graph, you can view the timestamp of statistics collection.
Health
The Health tab displays information of RPZ zones on the selected member and their last updated date and time. This
data is retrieved directly from the database. Note that you cannot sort or filter values in this tab. You can export the data
displayed in this tab by clicking the Export icon.
Warning
If the Detailed Status panel is open, the following actions take place:
• Grid Manager auto refreshes at a rate of 30 seconds.
• Widgets that support user-specified auto refresh, refresh at the rate specified in the Auto
Refresh Period field.
Therefore, even if you set the session timeout to be to greater than the auto refresh rate, auto refresh
still takes place. The Grid Manager session does not time out because auto refresh takes precedence
over the session timeout. For more information about widgets, see Status Dashboard.
• Click the Detections Over Time tab to view information about the detected DNS tunneling events in a given time
frame.
• Click the Top 10 Grid Members tab to view information about the top 10 Grid members with the most total counts
of detections by type.
• Click the Detections tab to view information about all the detected DNS tunneling events.
Detections
The Detections tab displays information about all the detected DNS tunneling events. This tab displays the following
information about each detection in table format:
• Client IP Address: The IP address of the client.
• Domain: The domain name of the client.
• Timestamp: The timestamp when the event occurred.
• Module: Displays the threat analytics module.
Warning
If the Detailed Status panel is open, the following actions take place:
• Grid Manager auto refreshes at a rate of 30 seconds.
• Widgets that support user-specified auto refresh, refresh at the rate specified in the Auto
Refresh Period field.
Therefore, even if you set the session timeout to be to greater than the auto refresh rate, auto refresh
still takes place. The Grid Manager session does not time out because auto refresh takes precedence
over the session timeout. For more information about widgets, see Status Dashboard.
Click the Configure icon again to hide the configuration panel after you complete the modification.
You can do the following in this widget:
• Click the Detections Over Time tab to view information about the DNS tunneling event count for the selected Grid
member in a given time frame. It displays a line graph that tracks the number of DNS tunneling event detections
in a given time frame. You can hover your mouse over the graph to view the coordinates of any point in the graph.
• Click the Detections tab to view information about all the detected DNS tunneling events. This tab displays the
following information in table format:
• Client IP Address: The IP address of the client.
• Domain: The domain name of the client.
• Timestamp: The timestamp when the event occurred.
• Module: Displays the threat analytics module. This tab displays only the last 15 detections.
Note
The Reporting Clustering Status dashboard is available only when you configure the reporting clustering and
you must also have the global read-only permissions for Grid Reporting Properties.
• Appliance Administration
• IP Address Management
• Configuring Super Hosts
• DNS
• DHCP
• Configuring Microsoft Windows Servers
• Monitoring
• Infoblox Reporting and Analytics
• Infoblox Infrastructure Security
• Infoblox Subscriber Services
• VLAN Management
Appliance Administration
This section provides information about configuring admin groups, roles, and accounts, and defining the appropriate
permissions. It explains how to configure and manage a Grid or an independent appliance, and set operational
parameters. It also describes the file distribution services (TFTP, FTP, and HTTP) and the bloxTools environment. It
includes the following chapters:
• Managing Administrators
• Deploying a Grid
• Deploying Independent Appliances
• Deploying Cloud Network Automation
• Managing Appliance Operations
• File Distribution Services
• bloxTools Environment
• RIR Registration Updates
Managing Administrators
This section describes the various tasks associated with setting up admin groups, admin roles, admin accounts, and
permissions. It contains the following sections:
When an admin connects to the appliance and logs in with a username and password, the appliance starts a two-step
process that includes both authentication and authorization. First, the appliance tries to authenticate the admin using the
username and password. Second, it determines the authorized privileges of the admin by identifying the group to which
the admin belongs. It grants access to the admin only when it successfully completes this process.
The NIOS appliance can authenticate users that are stored on its local database as well as users stored remotely on an
Active Directory domain controller, a RADIUS server, a TACACS+ server or an LDAP server. The group from which the
admin receives privileges and properties is stored locally.
The tasks involved in configuring administrator accounts locally and remotely are listed in Storing Admin Accounts
Locally and Remotely table
To store admin accounts • Configure communication settings with a • Configure communication settings with
remotely
RADIUS server, an Active Directory domain the NIOS appliance
controller, TACACS+ server, or LDAP server If you use admin groups:
If you use admin groups on the RADIUS server, Active
Directory domain controller, TACACS+ server, or LDAP server: • Import Infoblox VSAs (vendor-specific
attributes) (if RADIUS)
• Configure admin groups that match the • Define an admin group with the same
remote admin groups name as that on the NIOS appliance
• Set the privileges and properties for the • Define admin accounts and link them
groups to an admin group
If you do not use admin groups on the RADIUS server, Active If you do not use admin groups:
Directory domain controller, TACACS+ server, or LDAP server:
• Define admin accounts
• Assign an admin group as the default
The admin policy defines how the appliance authenticates the admin: with the local database, RADIUS, Active Directory,
TACACS+, or LDAP. You must add RADIUS, Active Directory, TACACS+, or LDAP as one of the authentication methods
in the admin policy to enable that authentication method for admins. See Defining the Authentication Policy for more
information about configuring the admin policy.
Note
Local passwords are stored in the database as part of the user object. Values for passwords are stored after
applying a random salt and hashed with SHA-128.
The following figure illustrates the relationship of local and remote admin accounts, admin policy, admin groups, and
permissions and properties.
Privileges and Properties Applied to Local and Remote Admin Accounts
To define admins who can perform specific core network service tasks, you can set up admin groups and assign them
permissions for those tasks. To control when and whether certain tasks should be performed, you can add an admin
group to an approval workflow and define the admins as submitters or approvers. A submitter is an admin whose tasks
require approvals before execution, and an approver is an admin who can approve the submitted tasks. When you add
submitter and approver groups to an approval workflow, you have control over who can perform which mission critical
tasks and whether and when the tasks should be executed. For more information about how to create and configure
approval workflows, see Configuring Approval Workflows.
Only superusers can create admin groups and define their administrative permissions. There are two ways to define the
permissions of an admin group. You can create an admin group and assign permissions directly to the group, or you can
create roles that contain permissions and assign the roles to an admin group.
You must create admin groups and assign them access to the cloud API and applicable permissions so they have
authority over delegated objects. When you assign permissions for objects that have not been delegated, these admin
groups or admin users assume applicable permissions to these un-delegated objects. For example, you can create an
admin group that can access a specific set of networks while another can access another set of networks. Note that you
cannot create a new admin group using the same name. For information about Cloud Network Automation, see
Deploying Cloud Network Automation.
Note that there must always be one superuser admin account, called "admin", stored in the local database to ensure that
at least one administrator can log in to the appliance in case the NIOS appliance loses connectivity to the remote admin
databases such as RADIUS servers, AD domain controllers, TACACS+ servers, LDAP servers, or OCSP responders.
NIOS comes with a default superuser admin group (admin-group). It also automatically creates a new admin group,
fireeye-group, when you add the first FireEye RPZ (Response Policy Zone). Infoblox recommends that you do not add
another admin group with the same name as the default or FireEye admin group. Note that the FireEye admin group is
read-only and you cannot assign permissions to it. For more information about FireEye RPZs, see About FireEye
Integrated RPZs.
When you install valid licenses and configure your Grid for Cloud Network Automation, NIOS enables the cloud-api-only
Note
When you assign cloud API access to an admin group, the group assumes full authority over all delegated
objects. You must however specifically assign object permissions to the admin group for the group to gain
authority over non-delegated objects. For information about how to assign object permissions,
see Defining Object Permissions.
4. Click Next and complete the following to define the dashboard template:
• Dashboard Template: From the drop-down list, select the dashboard template you want to assign to this
superuser group. When you apply a dashboard template to an admin group, the template applies to all users in
the group. The default is None, which means that users in this group can access all licensed tasks in the Tasks
Dashboard tab if they have the correct permissions to the task-related objects. Note that if you want to delete a
template, you must first unassign the template from an admin group, or select None, before you can delete it. For
more information about dashboard templates, see About Dashboards.
5. Click Next to add admin email addresses if you want the appliance to send approval workflow notifications to a list of
email addresses for the admin group. Complete the following in the Email Address table:
Click the Add icon and Grid Manager adds a row to the table. Enter the email address of the admin who should receive
workflow notifications. You can click the Add icon again to add more email addresses. You can also select an email
Note
When you configure an approval workflow and select Group Email Address(es) as the approver notification
addresses, the appliance sends workflow notifications to all email addresses you have added to this table. For
information, see Configuring Approval Workflows .
6. Optionally, click Next to add extensible attributes to the admin group. For information, see About Extensible
Attributes.
7. Save the configuration and click Restart if it appears at the top of the screen. You can do one of the following after
you create a superuser admin group:
• Add local admins to the superuser group. For information, see Creating Local Admins.
• Assign the superuser group to remote admins. For information, see About Remote Admins.
GUI: Select this to allow the admin group to use the Infoblox GUI, Grid Manager.
CLI: Select this to allow the admin group access to the Infoblox CLI. You can select all the commands that
you want the group to execute by selecting the command group from the drop-down list. You can then
select individual commands from the command group that the admin group can execute . For example, if
you want to grant access to the admin group to run all commands related to the Grid command group,
select Grid from the drop-down list and select all the commands. You can also select individual
commands from the Grid command group that you want the admin group to execute.
API: Select this to allow the admin group access to the Infoblox API. The following options are available
only if a Cloud Network Automation or Cloud Platform license is active in the Grid. You must first select
this option to enable the following options.
Notes
• When you assign cloud API access to an admin group, the group assumes full authority over all
delegated objects. You must however specifically assign object permissions to the admin group for the
group to gain authority over non-delegated objects. For information about how to assign object
permissions, see Defining Object Permissions.
• The GUI permission that you assign to the admin group is independent of the CLI permission that you
assign. That is, you have to assign each of these permissions separately to non-super users. You can
track actions and commands of non-super-users in the audit.log file.
• If you enable CLI commands for reporting users, they will not be able to login to the CLI unless they log
in to the Reporting tab in Grid Manager.
• SAML-only users will not be able to run CLI commands, because such users are created dynamically
and hence do have the password. However, users belonging to the saml_local group can run the set
series of commands.
• Cloud users will not be able to run CLI commands because they are delegated users.
4. Click Next and complete the following to define the dashboard template:
• DashboardTemplate: From the drop-down list, select the dashboard template you want to assign to this superuser
group. When you assign a dashboard template to an admin group, the template applies to all users in the group.
The default is None, which means that users in this group can perform all licensed tasks in the TasksDashboard
tab if they have the correct permissions to the task-related objects. Note that if you want to delete a template, you
must first unassign the template from an admin group, or select None, before you can delete it. For more
information about dashboard templates, see About Dashboards.
• Display Task flow Dashboards Only: Select this checkbox if you want to restrict this admin group to access only
the Tasks Dashboard in Grid Manager. Note that when you select this checkbox, users in this admin group have
access to the tasks you specified in the selected dashboard template, if applicable. They cannot perform any
other tasks or manage any core network services in Grid Manager the next time they log in to the system.
5. Click Next to add admin email addresses if you want the appliance to send approval workflow notifications to a list of
email addresses for the admin group. Complete the following in the Email Address table:
Click the Add icon and Grid Manager adds a row to the table. Enter the email address of the admin who should receive
workflow notifications. You can click the Add icon again to add more email addresses. You can also select an email
address and click the Delete icon to delete it. To modify an email address, click the Email Address column and modify the
existing address.
Note
When you configure an approval workflow and select Group Email Address(es) as the approver notification
addresses, the appliance sends workflow notifications to all email addresses you have added to this table. For
information, see Creating Approval Workflows.
6. Optionally, click Next to add or delete extensible attributes for this admin group. For information, see About
Extensible Attributes.
You can assign up to 21 roles to an admin group, and you can assign a role to more than one admin group. When you
make a change to a role, the appliance automatically applies the change to that role in all admin groups to which the role
is assigned.
Note
This group-based authentication is applicable for Grid-wide settings only. NIOS authenticates user credentials
only after it authenticates the Grid-wide settings.
• Any: Select this to allow any clients to access the GUI and API. This is selected by default.
• Named ACL: Select this and click Select Named ACL to select a named ACL that contains only IPv4 and
IPv6 addresses and networks. When you select this, the appliance allows GUI and API access for all
ACEs in the named ACL. You can click Clear to remove the selected named ACL.
• Set of ACEs: Select this to configure individual access control entries (ACEs). You can define ACEs for
selected admin groups from which users can log in to the application. Click the Add icon and select one of
the following from the drop-down list. Depending on the item you select, Grid Manager either adds a row
for the selected item or expands the panel so you can specify additional information about the item you
are adding.
• IPv4 Address and IPv6 Address: Select this to add an IPv4 address or an IPv6 address. The Type column
displays either IPv4 address or IPv6 address based on the item you select from the drop-down list. Click
the Value field and enter the IP address. The appliance allows this client to access the GUI and API and
restricts others.
• IPv4 Network and IPv6 Network: Select this to add an IPv4 network or IPv6 network. The Type column
displays either IPv4 address or IPv6 address based on the item you select from the drop-down list. Click
the Value field and enter the network. The appliance allows this network to access the GUI and API and
restricts others.
Note
NIOS displays an error on Save & Close, if the Never Unlock option is enabled for superusers.
Note
You cannot delete the cloud-api-only and splunk-reporting-group admin groups. These admin groups are
automatically created when you configure your Grid for Cloud Network Automation and Reporting and Analytics
respectively. For information about Cloud Network Automation and Reporting and Analytics,
see Deploying Cloud Network Automation and Infoblox Reporting and Analytics.
Warning
The password expiry settings are applicable only to local users.
To set the time duration for a password for each admin group:
1. Go to the Administration tab, Administrators tab -> Groups tab, and select the checkbox next to the group for
which you want to set the password time duration, and then click the Edit icon.
2. Click the Password tab.
3. Click the Override button if you want the time duration that specify here to override the time duration you set
when specifying admin passwords using Grid Properties Editor.
Note
The options in the screen are enabled only if you click the Override button. If you do not click Override,
the time duration you set when specifying admin passwords using Grid Properties Editor applies.
Note
• If you click the Override button and do not select the Password must expire checkbox, it means
that the password for the admin group will never expire.
• The time duration that you set here does not apply to the saml_group and splunk-reporting
groups.
Warning
Disabling multiple login sessions is possible only for local users.
To do this:
1. Go to the Administration tab, Administrators tab -> Groups tab, and select the checkbox next to the group for
which you want to disallow multiple logins and click the Edit icon.
2. Click the Security tab.
3. Click the Override button if you want the override the multiple login sessions setting that you specified for the
Grid.
Note
Before you disable multiple logins for a group in a NIOS system, ensure that all existing sessions (if
any) of members of that group in that NIOS system are logged out. If not, the existing sessions will
continue to remain active even after you disable multiple logins.
Warning
Disabling inactive users is possible only for local users.
To do this:
1. Go to the Administration tab, Administrators tab -> Groups tab, and select the checkbox next to the group for
which you want to disable users.
2. Click the Security tab.
3. Click the Override button if you want to override the disable setting that you specified for the Grid.
4. Select the Disable Inactive Users checkbox.
5. In the Disable account if user has not logged in for <time period> days field, specify the time period (in days) after
which users who have not logged in must be disabled. The range of days is from 2 to 9999. You can also specify
a reminder to be sent in the Remind <days> prior to expiration field. The range of days is from 1 to 30. The
number of days you specify in this field is the time from which users start getting daily email reminders that their
account will be disabled. NIOS sends the email reminder only if an email address has been configured for the
user.
6. Select the Allow user to reactivate account via serial console and Allow user to reactivate account via remote
console checkboxes if you want users to activate their account after it has been disabled. To reactivate using the
serial console, see Deploying a Single Independent Appliance. To reactivate using the remote console, type ssh
<user name>@<ip address>.
Note
Reactivating the account using the serial console or the remote console is possible only for superusers.
Permissions Description
Grid permissions Includes Grid DNS properties, Grid DHCP properties, all Grid members, Microsoft
servers that are managed by the Grid, network discovery, task scheduling, CSV imports,
and all dashboard tasks.
IPAM permissions Includes network views, IPv4 and IPv6 networks, and host records.
DHCP permissions Includes Grid DHCP properties, network views, IPv4 networks, host records, DHCP
ranges, DHCP fixed addresses/reservations, DHCP enabled host addresses, Mac filters,
shared networks, DHCP templates, lease history, and roaming hosts.
DNS permissions Includes Grid DNS properties, DNS views, DNS zones, Response Policy Zones, host
records, bulk hosts, all DNS resource records, all shared records, and adding a blank A/
AAAA record.
Administration permissions Includes all certificate authentication services, CA certificates and object change
tracking.
GLB (Global Load Balancer) permissions Includes all NIOS managed GLB objects.
Named ACL permissions Includes all named ACLs (access control lists).
NIOS applies permissions hierarchically in a parent-child structure. When you define permissions for a resource, all
objects within that resource inherit the same permissions. For example, when you grant an admin group read/write
permission for a network, the admin group automatically has read/write permission for objects in that network. To
override permissions set at a higher level, you define permissions at a more specific level. For example, you can override
the read/write network-level permission by setting read-only or deny permission for a fixed address or a DHCP-enabled
host address. To define permissions for a more specific level, see the following:
• Permissions for common tasks, as described in Administrative Permissions for Common Tasks.
• Permissions for the Grid and Grid members, as described in Administrative Permission for the Grid.
• Permissions for IPAM resources, such as IPv6 networks, as described in Administrative Permissions for IPAM
Resources.
• Permissions for DNS resources, such as DNS views and A records, as described in Administrative Permissions
for DNS Resources.
Global Permissions
Administration All Certificate Authentication For more information, see Administrative Permissions for Certificate Authentication Services
Permissions Services and CA Certificates.
All CA Certificates
Object Change Tracking For more information, see Administrative Permissions for Object Change Tracking.
Cloud Permissions All Tenants For more information, see Administrative Permissions for Cloud Objects.
Named ACL Named ACL For more information, see Administrative Permissions for Named ACLs.
Permissions
DHCP Permissions Grid DHCP Properties For more information, see Administrative Permissions for Common Tasks.
All Network Views For more information, see Administrative Permissions for Network Views.
All IPV4/IPv6 Networks For more information, see Administrative Permissions for IPv4 and IPv6 Networks and
Shared Networks.
All Hosts For more information, see Administrative Permissions for Hosts.
All DHCP MAC Filters For more information, see Administrative Permissions for MAC Address Filters.
All IPv4/IPv6 DHCP Fixed For more information, see Administrative Permissions for IPv4 or IPv6 Fixed Addresses and
Addresses/Reservations IPv4 Reservations.
All IPv4/IPv6 Host Addresses For more information, see Administrative Permissions for DHCP Resources.
All IPv4/IPv6 Ranges For more information, see Administrative Permissions for IPv4 and IPv6 DHCP Ranges.
All IPv4/IPv6 Shared For more information, see Administrative Permissions for IPv4 and IPv6 Networks and
Networks Shared Networks.
All IPv4/IPv6 DHCP For more information, see Administrative Permissions for IPv4 or IPv6 DHCP Templates.
Templates
All Microsoft Superscopes For more information, see Administrative Permissions for IPv4 or IPv6 DHCP Templates.
All Roaming Hosts For more information, see Administrative Permissions for Roaming Hosts.
DHCP IPv4/IPv6 Lease For more information, see Administrative Permissions for the IPv4 and IPv6 DHCP Lease
History Histories.
DNS Permissions DNS Properties For more information, see Administrative Permissions for Common Tasks.
Grid
All DNS Views For more information, see Administrative Permissions for Common Tasks.
All DNS Zones For more information, see Administrative Permissions for Common Tasks.
All Hosts For more information, see Administrative Permissions for Hosts.
All IPV4/IPV6 Host For more information, see Administrative Permissions for DNS Resources with Associated IP
Addresses addresses in Networks and Ranges.
All Resource Records (A, For more information, see Administrative Permissions for Common Tasks.
AAAA, CAA, CNAME,
DNAME, NAPTR, MX, PTR,
SRV, TXT, TLSA and
Bulkhost)
All Shared Records (A, For more information, see Administrative Permissions for Common Tasks.
AAAA, MX, SRV and TXT)
All Rulesets (BLACK List For more information, see Administrative Permissions for DHCP Resources.
Rulesets and NXDOMAIN
Rulesets)
All DNS64 Synthesis Groups For more information, see Administrative Permissions for DNS64 Synthesis Groups.
All Response Policy Zones For more information, see Administrative Permissions for Zones and License Requirements
and Admin Permissions.
All Response Policy Rules For more information, see Administrative Permissions for Zones and License Requirements
and Admin Permissions.
All DTC Objects (LBDN For more information, see Administrative Permissions for Zones and License Requirements
Records, LBDNs, Pools, and Admin Permissions.
Servers, Monitors,
Certificates, GeoIP and
Topologies)
Adding a blank A/AAAA For more information, see Administrative Permissions for Common Tasks.
record
Grid Permissions All Members For more information, see Administrative Permissions for Common Tasks.
Network Discovery For more information, see Administrative Permissions for Discovery.
Schedule Tasks For more information, see Administrative Permissions for Scheduling Tasks.
CSV Import For more information, see Administrative Permissions for Named ACLs.
All Microsoft Servers For more information, see Administrative Permissions for Microsoft Servers.
All Dashboard Tasks For more information, see Administrative Permissions for Dashboard Tasks.
All Kerberos keys For more information, see Configuring GSS-TSIG keys.
All Active Directory Domains For more information, see Managing Active Directory Sites.
IPAM Permissions All Network Views For more information, see Administrative Permissions for Common Tasks.
All IPv4 Networks For more information, see Administrative Permissions for IPv4 and IPv6 Networks and
Shared Networks.
All IPv6 Networks For more information, see Administrative Permissions for IPv4 and IPv6 Networks and
Shared Networks.
All Hosts For more information, see Administrative Permissions for Hosts.
All IPv4 Host Addresses For more information, see Administrative Permissions for DNS Resources with Associated IP
addresses in Networks and Ranges.
All IPv6 Host Addresses For more information, see Administrative Permissions for DNS Resources with Associated IP
addresses in Networks and Ranges.
Port Control For more information, see Administrative Permissions for Discovery.
SAML Permissions SAML Authentication For more information, see Administrative Permissions for SAML.
Services
Super Host Super Host Permissions For more information, see About Administrative Permissions for Super Hosts.
Permissions
Security Grid Security Permissions For more information, see Administrative Permissions.
Permissions
Reporting Grid Reporting Permissions For more information, see Administrative Permissions for Common Tasks.
Permissions
Reporting Dashboard For more information, see Administrative Permissions for Reporting.
Reporting Search For more information, see Administrative Permissions for Reporting.
VLAN Permissions VLAN views, VLAN ranges, For more information, see Administrative Permissions for VLAN Management.
and VLAN objects
Grid Member Member DNS or DHCP Properties Restart DNS or DHCP on Grid Member
Read/ • Modify member properties • Modify member DNS or • Restart member DNS or
Write
• Restart, reboot, and shutdown DHCP properties DHCP service
member • Restart member DNS • Assign and un-assign
• Modify member DNS and DHCP or DHCP service member to DNS or DHCP
properties • Assign and un-assign objects
• Restart member DNS and DHCP member to DNS or
services DHCP objects
• Assign and un-assign member to
DNS and DHCP objects
Read-only • View member DNS and DHCP • View member DNS or • N/A (You cannot define a
properties DHCP properties read-only permission)
Deny • Cannot modify member, DNS, and • Cannot modify • Cannot modify member,
DHCP properties member, DNS, and DNS, and DHCP
• Cannot restart related services DHCP properties properties
• Cannot assign member to DNS and • Cannot restart related • Cannot restart related
DHCP objects services services
• Cannot assign member • Cannot assign member to
to DNS and DHCP DNS and DHCP objects
objects
After you add permissions to an admin group or role for a specific Grid member, you can modify the member permissions
and resources. Note that when you modify the member permissions and resources, the appliance updates the
permissions of the admin group or role accordingly.
To modify Grid member permissions:
The appliance checks object permissions from the most to the least For each object, the appliance checks permissions in the order listed.
specific, as listed.
An admin group that is assigned multiple roles and permissions can have overlaps among the different permissions. As
stated earlier, the appliance uses the first permission it finds and ignores the others. For example, as shown in the below
Directly-Assigned Permissions and Roles table, if an admin group has read/write permission to all A records in the
test.com zone and a role assigned to it is denied permission to test.com, the appliance provides read/write access to A
records in the test.com zone, but denies access to the test.com zone and all its other resource records.
Directly-Assigned Permissions and Roles
Permission assigned to the admin group Read/Write to all A records in the test.com zone
You can check for overlapped permissions when you add permissions to roles and to admin groups, and when you
assign roles to an admin group. When you create a permission that overlaps with existing permissions, Grid Manager
displays a warning message and the SeeConflicts link on which you click to view the overlapped permissions. For
information, see Viewing Overlapping Permissions. You can also use the quick filter Overlaps to filter overlapped
permissions, the appliance lists permissions that overlap with other permissions. If you want to change the permission
the appliance uses, you must change the order in which the roles are listed or change the permissions that are directly
assigned to the admin group. For information, see Creating Limited-Access Admin Groups.
Managing Permissions
After you define permissions for an admin group and role, you can do the following:
• View the permissions, as described in Viewing Permissions.
• Modify the permissions, as described in Modifying Permissions.
• Delete the permission, as described in Deleting Permissions.
Viewing Permissions
Only superusers can view the permissions of all admin groups.
To view the permissions of an admin group or role:
1. From the Administration tab, select the Administrators tab -> Permissions tab.
2. For an admin group: Select an admin group in the Groups table.
or
For an admin role: Select an admin role in the Roles table.
Modifying Permissions
You can modify the permissions of user-defined admin roles and admin groups. You cannot modify the permissions of
system-defined admin roles. When you change the permissions of a role that has been assigned to multiple admin
groups, the appliance automatically applies the change to the role in all admin groups to which it is assigned.
To modify the existing permissions of a role or an admin group:
1. From the Administration tab, select the Administrators tab -> Permissions tab.
2. For an admin group: Select an admin group in the Groups table. or
3. For an admin role: Select an admin role in the Roles table.
4. In the Permissions table, select the resource that you want to modify, and then click the Edit icon.
5. In the Mange Global Permissions or Create Object permissions editor, select the new permission: Read/Write,
Read-Only or Deny for the resource.
6. Save the configuration and click Restart if it appears at the top of the screen.
Deleting Permissions
You can remove permissions from user-defined admin roles and admin groups. You cannot remove permissions from
system-defined admin roles. When you remove permissions from a role, they are removed from the role in all admin
groups to which the role is assigned. You can remove a permission from a group as long as it is not inherited from a role.
You cannot remove permissions that are inherited from a role.
To delete a permission:
1. From the Administration tab, select the Administrators tab -> Permissions tab.
2. For an admin group: Select an admin group in the Groups table.
or
For an admin role: Select an admin role in the Roles table.
3. In the Permissions table, select the resource that you want to modify, and then click the Delete icon.
4. In the Delete Permission Confirmation dialog box, click Yes.
Authenticating Administrators
The NIOS appliance supports the following authentication methods: local database, RADIUS, Active Directory, LDAP,
TACACS+, and SAML. The appliance can use any combination of these authentication methods. It authenticates admins
against its local database by default. Therefore, if you want to use local authentication only, you must configure the
admin groups and add the local admin accounts, as described in Creating Local Admins.
Note
If you are using remote authentication, you must always have at least one local admin in a local admin group to
ensure connectivity to the NIOS appliance in case the remote servers become unreachable.
Alternatively, you can override the time zone auto-detection feature and specify the time zone. To create an admin
account and add it to an admin group:
1. Log in as a superuser.
2. From the Administration tab, select the Administrators tab -> Admins tab, and then click the Add icon.
or
From the Administration tab, select the Administrators tab -> Groups tab -> admin_group, and then click the Add
icon.
3. In the Add Administrator wizard, complete the following:
• Authentication Type: The default is Local. When you select Local, NIOS authenticates admins against the
local database.
Local: The following fields are displayed when you select Local authentication type. Enter the following:
• Login: Enter a name for the administrator. This is the user name that the administrator uses to log
in to the appliance. This user name is stored in the NIOS local database.
• Password: Enter a password for the administrator. This is the password that the administrator uses
to log in to the appliance. This password is stored in the NIOS local database.
Note
In NIOS 8.5.2 or later, when you set up the account for a Grid Master or a standalone
vNIOS instance that is deployed on AWS, the minimum password length must be four
characters. The password must consist of at least one uppercase character, one
lowercase character, one numeric character, and one symbol character. Example:
Infoblox1!
If the symbol character is at the beginning of the password, then include the password
within quotes (''). Example: '@Infoblox123'
• Use AWS SSH authentication keys: To prevent CLI login failures after upgrading, you will need to
enable Use AWS SSH authentication keys for each user that needs CLI access to AWS appliances. When
you select Use AWS SSH authentication keys, NIOS allows you to access the CLI either by using a key
pair and entering a password, or only by using the key pair which means the password-only
authentication is blocked for the user. You can upload the SSH key by using the Manage SSH Public
Keys field. It is mandatory to upload a valid SSH public key if you select the Use AWS SSH authentication
keys option.
If you use the User data field in the AWS console to install a NIOS license, the Use AWS SSH
authentication key option is enabled by default. For more information about the User data field, see
the Initializing New Infoblox vNIOS for AWS Instances with the AWS User Data Field section in
the Installation Guide for vNIOS for AWS documentation.
Note
For a TE-V4025 appliance, if you use the User data field to install the TE-4025 license, the Use
AWS SSH authentication key option will not be enabled by default. Therefore, Infoblox
recommends that you first deploy the vNIOS instance without specifying the IB-4025 license,
and then install the license from the NIOS CLI.
• Authentication Method: You can choose Key pair or Key pair + Password methods from the Authentication
Method drop-down list. A server generates two distinct, but related keys: a public key that you upload and
a corresponding private key that is stored in the system. A Key pair is the combination of these two related
keys and is the default authentication method. If you select Key pair as the authentication method, then
a user can access the CLI with a valid key pair. If you select Key pair + Password as the authentication
method, the user must provide a password to access the CLI even after a successful key pair
authentication. For information on defining and managing passwords, see Managing Passwords.
• Manage SSH Public Keys: You need to upload a valid SSH public key file. The supported key types are
RSA, EDSA, and ED25519. TheKey TypeandKey Valuefields in theMANAGE SSH PUBLIC KEYS are
automatically updated once you upload a valid SSH key.
Note
From NIOS 8.5.2 onwards, the Use AWS SSH authentication keys, Authentication
Method, and Manage SSH Public Keys fields are not available for the Remote and SAML
Only authentication types. That is, you cannot use the CLI to access vNIOS for AWS if you are a
remote user or a SAML user.
• Remote: When you select Remote, NIOS authenticates admins based on the user credentials stored
remotely on authentication servers, such as RADIUS servers, AD domain controllers, LDAP servers, or
TACACS+ servers. The Login field is displayed when you select Remote authentication type. Enter a
name for the administrator that is stored in the database of the remote server. This is the user name that
the administrator uses to log in to the appliance.
• SAML Only: When you select SAML Only, NIOS authenticates admins based on the user credentials
stored in the IDP (Identity Provider). An admin can log in to NIOS only by clicking the SSO Login button
and if the user credentials exist in the IDP account.
• SAML/Local: When you select SAML/Local, NIOS authenticates admins based on the user credentials
stored in the IDP, when the SSO Login button is clicked or against the local database when the User
name and Password is supplied and the Login button is clicked. For SSO Login, the user name and
Note
You cannot configure the Remote authentication type for NIOS admin users who belong to the fireeye-
group admin groups.
Email Address: Enter the email address for this administrator. The appliance uses this email address to send scheduling
notifications.
• Admin Group: Click Select to specify an admin group. If there are multiple admin groups, Grid Manager displays
the Admin Group Selector dialog box from which you can select one. An admin can belong to only one admin
group at a time.
NIOS appliance creates a new group, fireeye-group, when you add the first FireEye zone. The FireEye admin group is
read-only and you cannot assign permissions to it. Select fireeye-group for the admin group and add users to this group.
For more information, see About FireEye Integrated RPZs.
You cannot add a NIOS admin user that uses the Remote authentication type to the fireeye-group admin group.
Managing Passwords
Superusers can define requirements for the passwords of local admins according to your organization's policies. In
addition to specifying the minimum password length, you can define rules that specify the character types that are
allowed in the password. You can also specify whether passwords expire, their duration, and when reminders are sent to
the users. Additionally, you can specify whether the history of used password needs to be stored, and you can require
admins to change their passwords when they first log in or after their passwords are reset.
You set the requirements at the Grid level, so they apply to all local admins who log in to the Grid. You can also set the
requirements at the standalone system level. The requirements that you define appear in the User Profile of all local
admins and when users are required to change their password.
If the Password must expire checkbox is enabled, you must set the Minimum password age to a
value less than the password expiration interval value. Superusers can override the Minimum
password age and reset the passwords of local admins.
• Force password change at next login: Select this checkbox to force all new users to change their
passwords when they log in for the first time, and to force existing users whose passwords were reset by
superusers or whose passwords were just reset to change their passwords.
The "force password change at next login" feature does not apply to admin users in the fireeye-group. These
users will not be prompted to change their passwords at the next login. Their original passwords continue to
work. For information about FireEye integrated RPZs, see About FireEye Integrated RPZs.
Note
If the Use AWS SSH authentication keys option was previously disabled and is
allowed when modifying an existing admin account, then password-only authentication is blocked.
If the Use AWS SSH authentication keys option was earlier enabled and is now disabled, then
password-only authentication is allowed.
Note
Infoblox strongly recommends that even if you are using remote authentication, you always have at least one
local admin in a local admin group to ensure connectivity to the appliance in case the remote servers become
unreachable. Also, when you delete an authentication server group, the appliance removes it from the system.
Deleted authentication server groups are not moved to the Recycle Bin. Once deleted, the authentication
server groups no longer exist in the system.
When remote authentication is successful, the appliance creates a remote admin user object in the NIOS database,
which stores user preferences such as time zone, table size, and active Dashboard widgets for the remote user. If the
remote user does not log in to the appliance for more than 180 days, the appliance removes the corresponding admin
user object from the database. Although the remote user can still log in to the appliance, user preferences are lost. The
Grid Master performs this clean up action once a day.
You can also authenticate users based on X.509 client certificates. You can configure NIOS to authenticate these admins
through the two-factor authentication method. For more information about two-factor authentication and how to configure
it, see Defining the Authentication Policy.
Authentication Protocols
When you configure the NIOS appliance to authenticate admins against a RADIUS server group, you must specify the
authentication protocol of each RADIUS server, which can be either PAP (Password Authentication Protocol) or CHAP
(Challenge Handshake Authentication Protocol).
PAP tries to establish the identity of a host using a two-way handshake. The client sends the user name and password in
clear text to the NIOS appliance. The appliance uses a shared secret to encrypt the password and sends it to the
RADIUS server in an Access-Request packet. The RADIUS server uses the shared secret to decrypt the password. If the
decrypted password matches a password in its database, the user is successfully authenticated and allowed to log in.
With CHAP, when the client tries to log in, it sends its user name and password to the NIOS appliance. The appliance
then creates an MD5 hash of the password together with a random number that the appliance generates. It then sends
the random number, user name, and hash to the RADIUS server in an Access-Request package. The RADIUS server
takes the password that matches the user name from its database and creates its own MD5 hash of the password and
random number that it received. If the hash that the RADIUS server generates matches the hash that it received from the
appliance, then the user is successfully authenticated and allowed to log in.
You can configure one of the following modes to send the authentication request to the RADIUS server:
• Ordered: In this mode, the authentication request is sent to the first server in the list. The authentication request is
sent to the next server only when the first server is out of service or unavailable.
• Round Robin: In this mode, the first authentication request is sent to a server chosen randomly in a group. If there
is no response from the server, continued attempts are performed sequentially until it selects the last server in the
list. Then it starts with the first server in the list and continues the selection process until all the servers have been
attempted.
Note
If you have two Infoblox appliances in an HA pair, enter both the members of the HA pair as separate access
appliances and use the LAN or MGMT IP address of both appliances (not the VIP address), if configured.
Depending on your particular RADIUS server, you can configure the following RADIUS server options to enable
communication with the NIOS appliance:
• Authentication Port
• Accounting Port
• Domain Name/IP Address of the NIOS appliance
• Shared Secret Password
• Vendor Types
To configure NIOS to authenticate administrators using Active Directory domain controller groups, you must first
configure user accounts on the domain controller.
Note
Do not create Microsoft user accounts with the following characters: "", +, ,, ;, <, =, >, \. Microsoft does not allow
creating users with these characters and such characters will be replaced by an underscore _.
Note
• Microsoft recommends that you create all non-default users and groups in different organizational units
to apply Group Policy Objects and prevent corruption or misuse of critical default accounts and groups.
• In Active Directory, objects are referred to by the DN (Distinguished Name), which contains CN
(Common Name), OU (Organizational Unit), and DC (Domain Component) that are delimited by
commas and indicate where the object resides in an AD hierarchy.
TACACS+ Authentication
TACACS+ Accounting
When you enable TACACS+ accounting, NIOS sends the TACACS+ accounting server a TACACS+ accounting event
with the same information that it sends to the Audit Log for any user command/event. NIOS sends an accounting start
packet when a user first logs in successfully using TACACS+ authentication, and it sends an accounting STOP packet
when a user logs out of the GUI or CLI or when a GUI or CLI session times out. If a product restarts or software failure
occurs, NIOS drops any outstanding accounting packets. Note that audit log entries that are greater than 3,600
characters are truncated in accounting events sent to TACAS+ servers.
Configuring LDAP
Do the following to configure NIOS to use one or more LDAP server groups to authenticate administrators:
Note
Mapping an extensible attribute to an LDAP attribute must be unique for a given LDAP server.
Attribute not defined in the LDAP directory for a given user is considered as null and is mapped
to the corresponding extensible attribute with a default value. The default value of extensible
attribute is Not Found. This default value is not configurable and they do not cause the
authentication to fail.
Note
You need super user permissions to perform SAML-related configurations.
Obtaining Metadata
This section explains how to obtain the metadata URL of the IDP. The procedures in this section may vary a little
depending on the type of IDP that you select. The procedure in this section uses Okta as an IDP example. If you are
using an IDP other than Okta, contact your IT administrator for the metadata URL.
To obtain the metadata URL of Okta:
1. Log in to your Okta account.
2. Go to My Applications and click the URL of your Grid Manager.
3. You can either copy the XML metadata for the Grid Manager into a file or use the URL of the metadata.
Note
If you select the Persist Auto Created User after logout checkbox and the session times out, you must manually
verify whether the user account exists in IDP or not. If the user account is deleted from IDP, then you must
manually delete the account in NIOS.
Note
Using a remote authentication service causes high memory utilization on discovery members. However, this
does not affect the operation of other processes.
Note
Authentication for both the admin authentication policy and OCSP validation must be successful on NIOS.
Note
The uploaded CA certificates must be the ones that issued the client certificates to be authenticated.
Otherwise, clients such as browsers, cannot establish a successful SSL/TLS client authenticated
HTTPS session to the appliance.
3. Configure a certificate authentication service and enable it, as described in Configuring Certificate Authentication
Services.
4. View certificate authentication services, as described in Viewing Certificate Authentication Services.
5. Modify certificate authentication services, as described in Modifying Certificate Authentication Services.
6. Delete certificate authentication services, as described in Deleting Certificate Authentication Services.
Note that once you save the certificate authentication service configuration, the appliance terminates administrative
sessions for all admin users. After you enable the certificate authentication service, you can verify whether two-factor
authentication is enabled. Go to the Administration -> Administrators -> Authentication Policy tab, Grid Manager displays
the "Two-Factor Authentication Enabled" banner in this tab.
Note
You can select the above
checkbox, Authentication Service and Service Account Credentials fields only when you
select Auto-match for Auto-populate username. You must not select the Username/
password request checkbox when you select the checkbox
for Enable remote lookup for user membership.
Note
You cannot save the OCSP configuration when you disable all OCSP responders, thus the
certificate authentication service is disabled and two-factor authentication is no longer in effect.
You cannot add OCSP responders when you select AIA only or Disabled from the drop-down list
for OCSP Check Type.
Click Add to save the configuration and add the responder to the table. You can add multiple OCSP
responders for failover purposes. You can use the up and down arrows to place the responders in the order
you desire. The appliance tries to connect with the first responder on the list. If the connection fails, it tries the
next responder on the list, and so on. Grid Manager displays the following for each responder:
• Responder: The FQDN or the IP address of the OCSP responder.
• Comment: Information you entered about the OCSP responder.
• Port: The port number on the OCSP responder to which the appliance sends authentication
requests.
• Disabled: Indicates whether the OCSP responder is disabled or not. Note that you must enable at
least one responder to enable the certificate authentication service.
You can also click Test to test the configuration. If the appliance connects to the responder using the
configuration you entered, it displays a message confirming the configuration is valid. If it is unable to connect
to the responder, the appliance displays a message indicating an error in the configuration.
• Response Timeout (s): Enter the time the appliance waits for a response from the specified OCSP
responder.
The default is 1 second. You can select the time unit from the drop-down list.
• Retries: Enter the number of times the appliance tries to connect to the responders after a failed attempt.
The default is 5.
• Recovery Interval: Enter the time the appliance waits to recover from the last failed attempt in connecting
to an OCSP responder. Select the time unit from the drop-down list. The default is 30 seconds. This is the
time interval that NIOS waits before it tries to contact the responder again since the last attempt when the
appliance could not connect with the responder or when the responder did not send a reply within the
configured response timeouts and retry attempts.
• Trust Model: Select Direct or Delegated from the drop-down list as the trust model for OCSP responses.
In a direct trust model, OCSP responses are signed with an explicitly trusted OCSP responder certificate.
You must upload the OCSP responder certificate if you select Direct. In a delegated trust model, OCSP
responses are signed with a trusted CA certificate. A server certificate is not required when you select
Delegated. The default is Direct.
6. Click Next to save the configuration and associate CA Certificates with the respective certificate authentication
service. You can associate multiple CA certificates with the service.
Note that enabling the certificate authentication service terminates administrative services for all users. Ensure that you
have uploaded the correct CA certificates before enabling the service. Your login names must also match the common
name used in the certificate. When you configure multiple OCSP responders, ensure that you place them in the correct
order because the status check for a client certificate is based on the OCSP reply sent by the first OCSP responder that
replies.
NIOS detects a valid certificate authentication service for a client's certificate by searching through the assigned CA
certificates for each group. NIOS matches issuer field in the client's certificate with the CA certificate to find the
appropriate match. Note that the subject in CA certificate must match the issuer in the client's certificate and
corresponding certificate authentication service.
Note the following about the certificate authentication service:
• You cannot assign the same CA certificate to the same group twice or to a different certificate authentication
service. However, different certificate authentication services can contain CA certificates with the same subject.
To distinguish such groups you can use Client Subject name to determine which certificate must match the CA
Notifying Administrators
You can notify individual administrators about system status through email, or notify a group of people using an alias
email address. If you have configured DNS resolution on your network, the E-mail relay configuration function is not
required. If you did not configure the settings on the DNS Resolver section, you must enter a static IP address of the
target system in the Relay Name/IP Address field. The appliance sends e-mail to administrators when certain events
occur. This functionality supports both IPv4 and IPv6 networks. Here is a list of events that trigger e-mail notifications:
• Changes to link status on ports and online/offline replication status
• Events that generate traps, except for upgrade failures (ibUpgradeFailure). For a list of events, see Infoblox MIBs.
The appliance attempts to send the email notification once after an event. It does not try to send the notification again, if
the first attempt fails. Infoblox recommends that you use the Test Email settings button to test the email settings and to
verify that the recipient received the notification.
You can define the email settings at the Grid and member levels.
Member Level
To define email settings for a member:
1. From the Grid tab, select the Grid Manager tab -> member checkbox, and then select the Edit icon.
2. In the Grid Member Properties editor, select the Email tab, and then click Override to override Grid-level settings.
3. Complete the email configuration as described in Grid Level.
For
Gri
d
an
d
Me
mb
ers
Re R
sta O
rt
ser
vic
es
for
the
ent
ire
Gri
d
Co R
nfi W
gur
e
Gri
d
DN
S
pro
per
ties
,
co
nfi
gur
e
me
mb
er
DN
S
pro
per
ties
,
ass
ign
me
mb
ers
to
DN
S
obj
ect
s,
an
d
res
tart
DN
S
ser
vic
e
on
me
mb
ers
Co R
nfi W
gur
e
Gri
d
DH
CP
pro
per
ties
,
co
nfi
gur
e
me
mb
er
DH
CP
pro
per
ties
,
ass
ign
me
mb
ers
to
DH
CP
obj
ect
s,
an
d
res
tart
DH
CP
ser
vic
e
on
me
mb
ers
Co R
nfi W
gur
ea
Gri
d
me
mb
er
Re R
sta W
rt
ser
vic
es
on
a
Gri
d
me
mb
er
Co R
nfi W
gur
e
me
mb
er
DN
S
pro
per
ties
,
ass
ign
me
mb
er
to
DN
S
obj
ect
s,
an
d
res
tart
DN
S
ser
vic
e
on
me
mb
er
Co R
nfi W
gur
e
me
mb
er
DH
CP
pro
per
ties
,
ass
ign
me
mb
er
to
DH
CP
obj
ect
s,
an
d
res
tart
DH
CP
ser
vic
e
on
me
mb
er
Re R
sta W
rt
me
mb
er
DN
S
ser
vic
e
Re R
sta W
rt
me
mb
er
DH
CP
ser
vic
e
Initi R R
ate W W
an
d
co
ntr
ol
net
wo
rk
dis
cov
ery
on
all
net
wo
rks
Sc R R R
he W W W
duli
ng
tas
ks
for
all
su
pp
ort
ed
obj
ect
s
For
DN
S
res
our
ces
Cr R
eat W
e,
mo
dify
,
an
d
del
ete
DN
S
vie
ws
Vie R
w O
an
d
se
arc
h
for
DN
S
vie
ws
Cr R R
eat W W
e,
mo
dify
,
an
d
del
ete
DN
S
zo
ne
s
wit
h
ass
ign
ed
me
mb
ers
Vie R R
w O O
an
d
se
arc
h
for
DN
S
zo
ne
s
wit
h
ass
ign
ed
me
mb
ers
Cr R R
eat W W
e,
mo
dify
,
an
d
del
ete
all
res
our
ce
rec
ord
s
Cr R
eat W
e
an
d
mo
dify
bla
nk
A/
AA
AA
rec
ord
s
an
d
sh
are
d
A/
AA
AA
rec
ord
s.
Vie R R
w O O
an
d
se
arc
h
for
all
res
our
ce
rec
ord
s
As R
sig W
n
me
mb
er
to
DN
S
obj
ect
s
For
DH
CP
Re
so
urc
es
Cr R R R
eat W W W
e,
mo
dify
,
an
d
del
ete
net
wo
rk
vie
ws
an
d
the
ir
ass
oci
ate
d
DN
S
vie
ws
Vie R R
w O O
net
wo
rk
pro
per
ties
an
d
sta
tisti
cs
Cr R R
eat W W
e,
mo
dify
,
an
d
del
ete
net
wo
rks
wit
h
ass
ign
ed
me
mb
ers
Cr R
eat W
e,
mo
dify
,
an
d
del
ete
net
wo
rks
wit
ho
ut
ass
ign
ed
me
mb
ers
Cr R R R
eat W W W
e,
mo
dify
,
an
d
del
ete
DH
CP
ran
ge
s in
a
sp
ecif
ic
net
wo
rk
wit
h
ass
ign
ed
me
mb
ers
Cr R R
eat W W
e,
mo
dify
,
an
d
del
ete
fixe
d
ad
dre
sse
s in
a
sp
ecif
ic
net
wo
rk
wit
ho
ut
ass
ign
ed
me
mb
ers
As R
sig W
n
me
mb
er
to
DH
CP
obj
ect
s
Note
Only superusers can modify DNS and DHCP Grid properties.
The following sections describe the types of permissions that you can set with Grid permissions:
• Administrative Permissions for Grid Members
• Administrative Permissions for Network Discovery
• Administrative Permissions for Scheduling Tasks
• Administrative Permissions for Microsoft Servers
Tasks
Assign member to RW RW
networks
Assign member to RW
DHCP ranges
Configure member RW
properties
Add a member to a RW
Match Members list of a
DNS view
Tasks
Tasks
Tasks
To schedule tasks for specific resources, admins must have Read/Write permission to scheduling tasks, plus the required
permissions to the supported resources. For information about permissions for specific resources, see the following:
• Grid members—See Administrative Permission for the Grid.
• DNS resources—See Administrative Permissions for DNS Resources.
• DHCP resources—See Administrative Permissions for DHCP Resources.
Note that the appliance deletes all pending scheduled tasks when superusers disable task scheduling at the Grid level.
The appliance deletes an admin's scheduled tasks when superusers do the following:
• Set the scheduling permission of admin groups and roles to "Deny"
• Delete or disable an admin group or an admin role
• Delete or disable local admins
• Delete the scheduling permission from any admin group or admin role that contains users with pending
scheduled tasks
• Change the admin group of a limited-access admin
Tasks
Remove a Microsoft RW
server as the primary or
secondary server of a
zone
Remove a network RW RW
served by a Microsoft
server
Tasks
Remove a Microsoft RW
server from the Grid
Create, modify, and delete DNS zones, subzones, and resource records RW RW
in a specific DNS view
Note
Object permissions are not applicable to Response Policy Zone rules.
• Each resource record type in a zone—For example, you can define permissions for all A records and for all PTR
records in a zone. if you do not define permissions for resource records, they inherit the permissions of the zone
in which they reside.
For information on setting permissions for zones and resource records, see Applying Permissions and Managing
Overlaps.
The following table lists the tasks admins can perform and the required permissions for zones.
DNS Zone Permissions
Create, modify, and delete resource records for a specified type, such as all A RW
records or all PTR records
A Records • Admins can add, modify, and delete A, • When you enable new permissions, you
AAAA Records AAAA, PTR records and DNS hosts that can define the following permissions for
have associated IP addresses in a the admins to add, modify, and delete A,
PTR Records
network or range when they have read/ AAAA, PTR records and DNS hosts that
DNS Hosts write permission for the respective zone have associated IP addresses in a
or a higher level DNS parent object (even network container, network, or range:
if they have deny or read-only permission • Read/write permission for the
for the network to which the DNS specific records in the zone or a
resources belong). higher level DNS parent object.
and
• Read/write permission for the
records in the specified network
container, network, or range to
which the resources belong.
DHCP-enabled Hosts • Admins can add, modify, and delete • When you enable new permissions and
DHCP-enabled host addresses when they you want to allow the admin to add,
have read/write permission for hosts in modify, and delete DHCP-enabled hosts
the specified zone and read/write that fall within a specific address range,
permission for the network to which the IP define read/write permission for hosts in
addresses belong. (This behavior stays that specified range. Note that if the
the same in NIOS 6.10.4.) admin has read/write permission for the
network, they can add, modify, and
delete hosts that do not fall within a
specific address range.
Fixed Addresses/ • Admins can add, modify, and delete fixed • When you enable new permissions and
Reservations
addresses and reservations in an address you want to allow the admin to add,
range when they have read/write modify, and delete fixed addresses and
permission for DHCP fixed addresses for reservations in a specific address range,
the network to which the range belongs. define read/write permission for fixed
addresses or reservations in that
specified range. Note that if the admin
has read/write permission for the
network, they can add, modify, and
delete fixed addresses and reservations
that do not fall within a specific address
range.
• Fixed addresses appear in their
respective network containers, networks,
and ranges regardless of whether new
permissions are enabled.
Note
You cannot assign permissions for zones that are auto-created.
3. In the editor, click the Permissions tab, and select the supported permission from the Permissions drop-down list
for the admin group or role.
4. Select a resource from the drop-down list in the Resources column.
5. Save the configuration.
Permission Examples
The following table lists examples for configuring new permissions for fixed addresses (or reservations) in network
10.1.2.0/24 and range 10.1.2.1-10.1.2.10.
Add, modify, or delete No Read/write for "Fixed Yes Read/write permission at the range level is
fixed address 10.1.2.5 addresses in sufficient for creating a fixed address that
10.1.2.1-10.1.2.10 Range" falls within the range.
Add, modify, or delete Read/write for Deny for "Fixed addresses in Yes Since fixed address 10.1.2.100 does not
fixed address "Fixed addresses in 10.1.2.1-10.1.2.10 Range" belong to the 10.1.2.1-10.1.2.10 range,
10.1.2.100 10.1.2.0/24 read/write permission for "Fixed
Network" addresses in 10.1.2.0/24 Network" is
sufficient for the operation.
Action Permission for DNS Permission for Permission for range Action Comment
zone corpxyz.com network 10.1.2.1-10.1.2.10 Allowed?
10.1.2.0/24 (Yes/No)
Add, modify, or Read/write permission for No Read/write for "A Yes Since 10.1.2.8 falls within the
delete an A corpxyz.com Records in 10.1.2.1-10.1.2.10 range, read/
record with IP 10.1.2.1-10.1.2.10 write permission for "A Records
address in 10.1.2.1-1 0.1.2.10 Range"
10.1.2.8 and read/write for corpxyz.com
are both required.
Add, modify, or Read/write permission for Read-only Yes for A Admins can add, modify, and
delete an A corpxyz.com permission for record delete A records because they
record with IP network Read/write for "A have read/write permissions for
address 10.1.2.0/24 Records in No for the zone and range; but they
10.1.2.8, and 10.1.2.1-10.1.2.10 network cannot modify or delete
modify or delete Range networks because they have
a network read-only permission for
network 10.1.2.0/24.
Add, modify or Yes if the host is a DNS host. Read/write No Yes Host address 10.1.2.22 is within
delete DHCP- permission for the 10.1.2.0 network but outside
enabled host N/A if the host is a DHCP host. "IPv4 Hosts in of the 10.1.2.1- 10.1.2.10 range,
address 10.1.2.0 network" so read/write permission for
10.1.2.22 "IPv4 Hosts in 10.1.2.0 network"
is sufficient.
Add, modify, or Yes if the host is a DNS host. Read-only Read/write for "Hosts Yes for A Admins can add, modify, and
delete DHCP- permission for in 10.1.2.1-10.1.2.10 record delete DHCP-enabled hosts
enabled host N/A if the host is a DHCP host. network Range because they have read/write
address 10.1.2.0/24 No for permissions for "Hosts in
10.1.2.8, and network 10.1.2.1010.1.2.10 range"; but
modify or delete they cannot modify or delete
a network networks because they have
read-only permission for
network 10.1.2.0/24.
The following table list an example for permissions required to configure PTR records that have associated IP addresses
in a network:
Action Permission for DNS Permission for Permission for rev Action Comment
zone corpxyz.com network erse zone Allowed?
10.1.2.0/24 0.0.10.in- (Yes/No)
addr.arpa
Add, modify, or delete a Read/write permission for No Yes Yes Read/write permission for
PTR record with IP corpxyz.com “PTR Records in
address 5.0.0.10. Note: corpxyz.com and 0.0.10.in-
You can also add, addr.arpa” is required.
modify, or delete PTR
records in the IPv6
reverse-mapping zone.
Tasks All DNS Specific DNS All Network Specific All IPv4 or All IPv4 or
Views View Views Network View IPv6 Networks IPv6 Shared
Networks
Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks
Limited-access admin groups can access IPv4 and IPv6 networks, including shared networks, only if their administrative
permissions are defined. Permissions for a network apply to all its DHCP ranges and fixed addresses. To override
network-level permissions, you must define permissions for specific DHCP ranges and fixed addresses. For example,
you can grant an admin group read-only permission to a network, read/write permission to its DHCP ranges, and read-
only permission to its fixed addresses.
You can grant read-only or read/write permission, or deny access to networks, as follows:
• All IPv4 or IPv6 networks—Global permission that applies to all IPv4 or all IPv6 networks in the database.
• All IPv4 or IPv6 shared networks—Global permission that applies to all IPv4 or all IPv6 shared networks in the
database.
• A specific IPv4 or IPv6 network—Network permissions apply to its properties and to all DHCP ranges, fixed
addresses and hosts in the network, if they do not have permissions defined. This overrides global permissions.
• All IPv4 or IPv6 DHCP ranges in a network—If you do not define permissions for DHCP ranges, they inherit the
permissions of the network in which they reside.
• All IPv4 or IPv6 fixed addresses in a network—If you do not define permissions for fixed addresses, they inherit
the permissions of the network in which they reside.
To define permissions for a specific IPv4 or IPv6 network and its DHCP ranges and fixed addresses, see Applying
Permissions and Managing Overlaps.
The following table lists the tasks admins can perform and the required permissions for IPv4 and IPv6 networks.
Network Permissions
Tasks Grid All IPv4 or Specific All IPv4 or Specific All IPv4 All IPv4 or IPv4 or
Member(s) IPv6 IPv4 or IPv6 DNS Zone or IPv6 IPv6 Fixed IPv6
Networks IPv6 Shared DHCP Addresses Network
Network Networks Ranges Template
Administrative Permissions for IPv4 or IPv6 Fixed Addresses and IPv4 Reservations
IPv4 and IPv6 fixed addresses and IPv4 reservations inherit the permissions of the networks in which they reside. You
can override network-level permissions by defining permissions for fixed addresses.
You can grant read-only or read-write permission, or deny access to fixed addresses, as follows:
• All IPv4 fixed addresses/reservations—Global permission that applies to all IPv4 fixed addresses and
reservations in the database.
• All IPv6 fixed addresses—Global permission that applies to all IPv6 fixed addresses in the database.
• All IPv4 fixed addresses/reservations in a network— Permissions at this level override global permissions. If you
do not define permissions for fixed addresses and reservations, they inherit the permissions of the network in
which they reside.
• All IPv6 fixed addresses in a network— Permissions at this level override global permissions. If you do not define
permissions for IPv6 fixed addresses, they inherit the permissions of the network in which they reside.
• A single IPv4 fixed address/reservation—Overrides global and network-level permissions.
• A single IPv6 fixed address—Overrides global and network-level permissions.
For information on setting permissions for fixed addresses, see Applying Permissions and Managing Overlaps.
The following table lists the tasks admins can perform and the required permissions for IPv4 and IPv6 fixed addresses.
Tasks Specific IPv4 or IPv6 All IPv4 or IPv6 fixed Specific IPv4 or IPv6 Fixed
Network Addresses/ IPv4 Address/ IPv4 Reservation
Reservations
Tasks Specific IPv4 or IPv6 Network All IPv4 or IPv6 DHCP enabled
host Addresses
Create, modify, and delete IPv4 or IPv6 DHCP enabled host addresses in RW
a specified network
Modify and delete a specific IPv4 or IPv6 DHCP enabled host address RW
View and search for all IPv4 or IPv6 DHCP enabled host addresses RO
View and search for IPv4 or IPv6 DHCP enabled host addresses in a RO
specified network
Tasks Grid Member(s) Specific IPv4 or All DHCP Specific IPv4 or MAC Address
IPv6 Network IPv4 or IPv6 IPv6 DHCP Filter
Ranges Range
Tasks IPv4 or IPv6 DHCP All IPv4 or IPv6 All IPv4 or IPv6 All IPv4 or IPv6 Fixed
Templates Networks DHCP Ranges Addresses/ IPv4
Reservations
View templates RO
Tasks Grid DHCP Properties Specific IPv4 or IPv6 All Roaming Host
Roaming Host
Tasks All MAC Address Filters Specific MAC Address Specific IPv4 DHCP
Filter Ranges
Administrative Permissions for the IPv4 and IPv6 DHCP Lease Histories
A limited-access admin group can view and export the IPv4 and IPv6 DHCP lease histories if it has read-only permission
to the IPv4 and IPv6 DHCP lease history. Permissions to the IPv4 and IPv6 DHCP lease histories are different from the
network permissions. Therefore, an admin group can access the IPv4 and IPv6 DHCP lease histories, regardless of its
network permissions. Note that only superusers can import a DHCP lease history file.
To define permissions for the IPv4 and IPv6 DHCP lease histories:
1. For an admin group: From the Administration tab, select the Administrators tab -> Permissions tab ->
admin_group in the Groups table, and then click the Add icon -> Global Permissions from the Create New
Permission area or select Add -> Global Permissions from the Toolbar.
or
For an admin role: From the Administration tab, select the Administrators tab -> Permissions tab -> admin_role in
the Roles table, and then click Add icon -> Global Permissions from the Create New Permission area or select
Add -> Global Permissions from the Toolbar.
2. Complete the following in the Manage Global Permissions dialog box:
• Permission Type: Select DHCP Permissions from the drop-down list.
• In the table, select Read/Write, Read-only, or Deny for All IPv4 DHCP Lease History and All IPv6 DHCP
Lease History.
3. Save the configuration and click Restart if it appears at the top of the screen.
Tasks All Dashboard Add Networks Add Add Fixed Add Add TXT Add MX
Tasks Hosts Addresses CNAME Record Record
Record
Tasks Grid Member(s) All Load Balancer All Load Balancers All Load Balancer
Objects Groups
Tasks Grid Member(s) All Named DNS Views Related DNS File Distribution
ACLs objects
Clone a Threat Protection profile from an existing profile (This also clones all settings for RW
the ruleset from an old profile.)
Update the profile settings (name, comment, events per second, disable multiple TCP RW
DNS request, list of members)
Change the ruleset that is assigned to a profile (This internally merges all customizations RW
for an old ruleset to a new ruleset.)
Change the rule parameters for rules in the profile (action, log severity, events per RW
second etc.)
Delete a profile RW
Tasks Grid Threat Analytics RPZ Zones Grid Members DNS Views
Properties
For information about SAML authentication, see Authenticating Admins Using SAML.
Deploying a Grid
To deploy a Grid, it is important to understand what a Grid is, how to create a Grid Master and add members, and how to
manage the Grid. This section explains in detail about a grid and covers the topics:
• About Grids
• About HA Pairs
• Creating a Grid Master
• Adding Grid Members
• Configuring an IPv6-only Grid
• Auto-Provisioning NIOS Appliances
• Pre-Provisioning NIOS and vNIOS Appliances
• Configuring a Grid
• Managing a Grid
• Grid Bandwidth Considerations
• Automatic Software Version Coordination
• NAT Groups
About Grids
A Grid is a group of two or more NIOS appliances that share sections of a common, distributed, built-in database and
which you configure and monitor through a single, secure point of access: the Grid Master. A Grid can include Infoblox
appliances and vNIOS appliances. A vNIOS appliance is a non-Infoblox hardware platform running the vNIOS software
package. For supported vNIOS platforms, see vNIOS Appliances.
Infoblox appliances support both IPv4 and IPv6 networks and you can configure a Grid in one of the following modes:
• IPv4-only: An IPv4-only Grid uses IPv4 as the Grid communication protocol and it includes an IPv4 Grid Master
and the Grid members, which can be either IPv4 or dual mode (IPv4 and IPv6) independent and HA appliances.
Note that when you add a dual mode HA member to an IPv4-only Grid, the communication protocol between the
two nodes of an HA pair must be IPv4.
• IPv6-only: An IPv6-only Grid uses IPv6 as the Grid communication protocol and it includes an IPv6 Grid Master
and the Grid members, which can be either IPv6 or dual mode (IPv4 and IPv6) independent and HA appliances.
Note that when you add a dual mode HA member to an IPv6-only Grid, the communication protocol between the
two nodes of an HA pair must be IPv6.
Note
Infoblox appliances support IPv4 and IPv6 networking configurations in most deployments cited in this chapter.
You can set the LAN1 port to an IPv6 address and use that address to access Grid Manager. All HA (high
availability) operations can be applied across IPv6. Topics in this and following chapters generally use IPv4
examples. Also note that the LAN2, MGMT, and VLAN ports also support IPv6. DNS services are fully
supported in IPv6 for the LAN1, LAN2, MGMT, and VLAN ports. DHCP services are fully supported in IPv6 for
the LAN1 and LAN2 ports. Examples throughout this chapter use IPv4 addressing. Interfaces on NIOS
appliances support both IPv4 and IPv6 transports and intra-Grid communication is based on the type of IP
address used by the Grid member to join the Grid.
Grid Configuration VRRP Protocol for Grid Communication Grid Connection via Additional IPv4 Additional IPv6
HA Pair Protocol MGMT Addresses Addresses
Dual mode Grid Master IPv4 or IPv6 IPv4 or IPv6 NA Yes Yes
Dual mode Grid member IPv4 or IPv6 IPv4 or IPv6 IPv4 or IPv6 Yes Yes
Note
Infoblox recommends that appliances with disk sizes below 250 GB must not be configured as Grid Masters.
You can also add supported Reporting platforms as a logging and reporting devices in your Grid. Infoblox provides a few
Infoblox platforms that you can use as the logging and reporting device. For information about the supported appliances,
see Configuring Reporting Clustering. Infoblox reporting solution supports both IPv4 and IPv6 networks and you can
configure a reporting member in either IPv4, IPv6, or in dual mode (IPv4 and IPv6) network environment. An IPv4-only
Grid uses IPv4 as the Grid communication protocol, so you can add an IPv4 or dual mode reporting member to an IPv4-
only Grid. An IPv6-only Grid uses IPv6 as the Grid communication protocol, so you can add an IPv6 or dual mode
reporting member to an IPv6-only Grid. However, a dual mode Grid can use either IPv4 or IPv6 as the Grid
communication protocol, so you can add an IPv4, IPv6, or a dual mode reporting member to a dual mode Grid. The
reporting appliance collects data from members in the Grid and stores the data in the database. It then uses the data to
generate predefined and user-defined reports that you can access through Grid Manager. These reports provide useful
information about the IPAM, DNS, DHCP, and system activities and usage in your Grid. For more information about
reporting, see Infoblox Reporting and Analytics.
Instead of manually provisioning IP addresses and DNS name spaces for network devices and interfaces, you can add
Cloud Platform Appliances to leverage DNS and DHCP features of the Grid to manage your CMPs (Cloud Management
Platforms). For information about the Infoblox Cloud Network Automation solution and supported Grid configurations, see
Deploying Cloud Network Automation.
The Grid Master can be either an HA master or a single master; that is, an HA (high availability) pair or a single
appliance. Similarly, a Grid member can be either a single member or an HA member. You can add single appliances and
HA pairs to a Grid, forming single members and HA members respectively. A single Grid member can be either an
Infoblox appliance or a vNIOS appliance. An HA Grid member can be a pair of Infoblox appliances or vNIOS appliances.
For information, see vNIOS Appliances.
The Grid Master communicates with every Grid member in a hub-and-spoke configuration. Intra-Grid communication is
based on the type of IP address used by the Grid member to join the Grid Master. An IPv4-only Grid Master uses IPv4
and an IPv6-only Grid Master uses IPv6 for intra-Grid communication. However, a dual mode Grid Master uses either
IPv4 or IPv6 depending on the IP address type used by the Grid member to join the Grid Master. For an HA member, the
Grid Master communicates with the active node, which in turn communicates with the passive node, as shown in the
following figure.
Grid Communications to an HA Member
By default, Grid communications use the UDP transport with a source and destination port of 1194. This port number is
configurable. For a port change to take effect, one of the following must occur: the HA master fails over, the single master
reboots, or the Grid restarts services.
After adding an appliance or HA pair to a Grid, you no longer access the Infoblox GUI on that appliance. Instead, you
access the GUI running on the Grid Master. Although you can create multiple administrator accounts to manage different
services on various Grid members, all administrative access is through the Grid Master. So even if someone has
administrative privileges to a single Grid member, that administrator must access the GUI running on the Grid Master to
manage that member.
You can access the Infoblox GUI through an HTTPS connection to one of the following IP addresses and ports on the
Grid Master:
• The VIP address, which links to the HA port on the active node of an HA Grid Master
• The IP address of the LAN1 port on a single Grid Master
• The IP address of the MGMT port (if enabled) of the active node of an HA or single Grid Master. See Using the
MGMT Port.
Grid Communications
The Grid Master synchronizes data among all Grid members through encrypted VPN tunnels. The default source and
destination UDP port number for VPN tunnels is 1194. You can continue using the default port number or change it. For
example, if you have multiple Grids, you might want each Grid to use a different port so that you can set different firewall
rules for each. Whatever port number you choose to use for the VPN tunnels in a Grid, all the tunnels in that Grid use
that single port number.
Before an appliance or HA pair forms a tunnel with the master, they first authenticate each other using the Challenge-
Response Authentication Mechanism (CRAM). The source and destination port number for this traffic is 2114. During the
CRAM handshake, the master tells the appliance or HA pair what port number to use when building the subsequent VPN
tunnel.
VPN Tunnels within a Grid
Master Grids
A Master Grid provides centralized management of multiple Grids. When a Grid is managed by a Master Grid, the Master
Grid icon appears on the left side of the top panel of Multi-Grid Manager. Assuming you have permission, you can click
this icon to access Multi-Grid Manager. In addition, the Toolbar provides several functions for joining the Master Grid,
editing its properties and leaving the Master Grid. For more information about the Master Grid and these functions, refer
to the Multi-Grid Manager Administrator Guide.
About HA Pairs
You can configure two appliances as an HA (high availability) pair to provide hardware redundancy for core network
services and Infoblox Advanced DNS Protection. For more information, see About Infoblox Advanced DNS Protection. An
HA pair can be a Grid Master, a Grid Master candidate, a Grid member, or an independent appliance. An HA pair can
also comprise a physical appliance and a virtual appliance, two physical appliances, or two virtual appliances. The two
Note
HA Grid Master and HA Grid Master Candidate configurations are not supported when Threat Protection
licenses are installed on the appliance.
When you configure an HA pair using the IB-4030-10GE (Rev-1 or Rev-2) appliance for DNS cache acceleration, the
passive node does not operate with a pre-loaded cache or hot cache during a failover; it builds up the DNS cache over
time. For more information about HA and other limitations for the IB-4030-10GE appliances, refer to the Infoblox DNS
Cache Acceleration Application Guide. For Infoblox , only the active node in an HA pair handles DNS traffic. The passive
node is in a standby mode ready to take over if a failover occurs.
The appliance uses the following components in the HA functionality:
• bloxSYNC: An Infoblox proprietary mechanism for secure, real-time synchronization of the database that
maintains the data, system configuration, and protocol service configuration between the two nodes. With
bloxSYNC, the nodes continuously synchronize changes of their configurations and states. When a failover
occurs, the passive node can quickly take over services. For information, see About HA Failover.
• VRRP (Virtual Router Redundancy Protocol): An industry-standard, MAC-level HA failover mechanism. VRRP
utilizes the concept of an active and passive node that share a single VIP (virtual IP) address. When the active
node that owns the VIP becomes unavailable, the passive node takes over the VIP and provides network core
services. For information about VRRP, refer to RFC3768,Virtual Router Redundancy Protocol (VRRP) and VRRP
Advertisements.
Using bloxSYNC and VRRP combined, if the active node fails or is taken offline for maintenance purposes, the passive
node assumes the VIP and continues to respond to requests and services with minimal interruption. You can deploy an
HA pair as a Grid Master, a Grid member, or an independent HA. To deploy an independent HA pair, see Deploying an
Independent HA Pair. To deploy an HA Grid Master, see Creating a Grid Master.
Tip
• Infoblox uses VRRP advertisements for the active and passive HA design. Therefore, all HA pairs must
be located in the same location connected to the highly available switching infrastructure. Any other
deployment is not supported without a written agreement with Infoblox. Contact Infoblox Technical
Support for more information about other deployment support.
• You can enable ARP on the passive node of an HA pair and monitor its status externally. To enable ARP
on the passive node of an HA pair, see Enabling ARP on the Passive Node of an HA Pair.
In HA, each node must configure two addresses: the VRRP public address on the LAN1 interface and the VRRP HA
address on the HA interface. An HA pair consists of a set of five IP addresses, all of which must belong to the same
subnet. Each device in an HA pair joins the multicast address on both the HA and public interfaces.
HA Pair
When you deploy a vNIOS HA pair, ensure that the port connection allows for more than one MAC address per vNIC. For
example, if you deploy a vNIOS HA pair in VMware vSphere, the port-profile to which the vNIOS HA and LAN ports
connect should allow for more than one MAC address per vNIC. You can do this by changing the security settings of the
port-group to accept "MAC address changes" and "Forged transmits," as illustrated in the following figure.
About HA Failover
Note
For a vNIOS HA pair, you must configure both LAN1 and HA interfaces to operate. When there is a notification
about failure in any one of the port, make sure that both of these ports are working. If one of the port is down
and another port is still working, the HA pair believes its peer is active. But, there will be connectivity issues as
one of the port is down. An HA failover occurs on vNIOS appliances only when both of these ports are down.
For details about configuring these virtual NICs, refer to the Infoblox Installation Guide vNIOS for VMware.
Warning
Enabling ARP on the passive node of an HA interface might affect VRRP on the local net
work and could cause the firewall to send false alerts
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
For the Grid having an HA Grid Master and the Enable ARP on HA Passive Node? option enabled, if you try to
restore from the HA Grid Master to a single node Grid Master the Grid breaks the configuration and if you try to
recover the configuration the system becomes unusable. However, you can recover the configuration by
resetting the database.
VRRP Advertisements
VRRP advertisements are periodic announcements of the availability of the HA node linked to the VIP. The two nodes in
an HA pair include a VRID (virtual router ID) in all VRRP advertisements and use it to recognize VRRP advertisements
intended for themselves. Only another appliance on the same subnet configured to use the same VRID responds to the
announcements. The active node in an HA pair sends advertisements as multicast datagrams every second. It sends
them from its HA port using the source IP address of the HA port (not from the VIP address) and the source MAC
address 00:00:5e:00:01:vrrp_id. The last two hexadecimal numbers in the source MAC address indicate the VRID
number for this HA pair. For example, if the VRID number is 143, then the source MAC address is 00:00:5e:00:01:8f (8f
in hexadecimal notation = 143 in decimal notation).
The destination MAC and IP addresses for all VRRP advertisements are 00:00:5e:00:01:12 and 224.0.0.18
(00:00:5e:00:02:12 and FF02::12 for IPv6 only configurations). Because a VRRP advertisement is a multicast datagram
that can only be sent within the immediate logical broadcast domain, the nodes in an HA pair must be in the same subnet
together.
As illustrated in the figure below, when you configure an HA pair, only the appliance configured to listen for VRRP
advertisements with the same VRID number processes the datagrams, while all other appliances ignore them. The
passive node in an Infoblox HA pair listens for these on its HA port and the active node listens on its LAN1 or LAN1
(VLAN) port. If the passive node does not receive three consecutive advertisements or if it receives an advertisement
with the priority set to 0 (which occurs when you manually perform a forced failover or request the active node to restart,
reboot, or shut down), it changes to the active state and assumes ownership of the VIP address and virtual MAC
address.
If both nodes go offline, the one that comes online first becomes the active node. If they come online simultaneously, or if
they enter a dual-active state—that is, a condition arises in which both appliances assume an active role and send VRRP
advertisements, possibly because of network issues—then the appliance with the numerically higher VRRP priority
becomes the active node. The priority is based on system status and events.
If both nodes have the same priority, then the appliance whose HA port has a numerically higher IP address becomes the
active node. For example, if the IP address of the HA port on Node 1 is 10.1.1.80 and the IP address of the HA port on
Node 2 is 10.1.1.20, then Node 1 becomes the active node.
For more information about VRRP, see RFC 3768, Virtual Router Redundancy Protocol (VRRP).
Note
For a dual mode (IPv4 and IPv6) HA Master or HA member, you can set either IPv4 or IPv6 for VRRP
advertisements.
After the initial transmission of its database, Node 1 continues to send Node 2 real-time database updates through the
VPN tunnel.
Node 1 maintains the synchronization of the database throughout the Grid—which, at this point, has no other members—
sends VRRP advertisements indicating its physical and network health, and—if configured to do so— provides network
services. Node 2 maintains a state of readiness to assume the mastership in the event of a failover. You can see the flow
of HA and Grid-related traffic from ports on the active node to ports on the passive node in the Traffic and Ports that an
HA Grid Master Uses figure. This illustration also shows the ports that you can use for management traffic and network
service.
Note
For information about enabling and using the MGMT port, SSH, and the Infoblox GUI,
see Using the MGMT Port, Restricting GUI/API Access, and Logging on to the NIOS UI.
The member and master key exchange occurs when an appliance joins a Grid, during master promotion, and when a
member reconnects to a Grid after becoming disconnected. At all other times, Grid-related communications occur
through encrypted VPN tunnels.
Note
If VLAN tagging is enabled on an Infoblox HA appliance, you must enable trunking at the port level.
• EtherChannel: Disable.
• IGMP Snooping: Disable.
• DHCP Snooping: Disable or Enable Trust Interface.
Note
You must disable DHCP Snooping to successfully run DHCP services on the Grid. For more information
about DHCP services, see About Infoblox DHCP Services.
Note
By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission type (full
or half duplex) on the physical links between its LAN1 or LAN1 (VLAN), HA, and MGMT ports and the Ethernet
ports on the connecting switch. If the two appliances fail to auto-negotiate the optimal settings,
see Modifying Ethernet Port Settings for steps you can take to resolve the problem.
Note
For details about using the LCD and console, refer to the installation guide that shipped with your
product.
4. Similarly, configure the LAN1 port on the other appliance so that it is in the same subnet as the first appliance.
5. Connect your management system to the network so that it can reach the IP addresses of the LAN1 ports on both
appliances.
HA Master – Node 1
1. On your management system, open a browser window, and connect to https://ip_addr, where ip_addr is the IP
address of the LAN1 port on Node 1. IPv4 and IPv6 values are valid, based on the LAN1 port configuration.
2. Log in using the default username and password: admin and infoblox. For detailed information about logging in to
the GUI, see Logging on to the NIOS UI.
3. Read the Infoblox End-User License Agreement (EULA), and then click I Accept.
Note that if you want to view the privacy policy of Infoblox, then on the EULA screen, click Infoblox Privacy Policy.
Grid Manager displays the policy on a new browser tab.
4. Read the Data Collection and Opt-Out Notice and choose whether to enable (opt in) or disable (opt out) the
Infoblox BloxConnect feature.
By default, the feature is enabled. If you want to disable it, select To Opt-Out of BloxConnect, please click
here. The Data Collection and Opt-Out Notice screen is displayed only when you log in to Grid Manager for the
first time. For more information, see Configuring BloxConnect.
5. Click OK. The Grid Setup wizard appears.
6. On the first screen, select Configure a Grid Master and click Next.
7. On the next screen, specify the Grid properties and click Next:
• Grid Name: Enter a text string that the two appliances use to authenticate each other when establishing a
VPN tunnel between them. The default Grid name is Infoblox.
• Shared Secret: Enter a text string that both appliances use as a shared secret to authenticate each other
when establishing a VPN tunnel between them. The default shared secret is test.
• Confirm Shared Secret: Enter the shared secret again.
• Hostname: Enter a valid domain name for the appliance.
• Type of Network Connectivity: Select the type of network connectivity from the drop-down list:
• IPv4 and IPv6: Select this to configure a dual mode HA Master.
• IPv4: Select this to configure an IPv4 HA Master.
• IPv6: Select this to configure an IPv6 HA Master.
• Is the Grid Master an HA pair?: Select Yes.
Note
• Infoblox recommends that you back up the configuration after you convert a Grid to a
different mode.
• Restoring the old backup by performing a forced restore, may prevent the Grid members
from rejoining the Grid Master after the restore.
8. On the next screen, specify the network properties and click Next:
• Virtual Router ID: Enter the VRID (virtual router ID). This must be a unique VRID number—from 1 to 255
—for this subnet.
• Ports and Addresses: This table lists the network interfaces based on the type of network connectivity of
the HA Master.
For IPv4 HA Master, specify the network information for VIP (IPv4), Node1 HA (IPv4), Node2 HA (IPv4),
Node1 LAN1 (IPv4), and Node2 LAN1 (IPv4) interfaces.
For IPv6 HA Master, specify the network information for VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1
(IPv6) interfaces.
For a dual mode HA Master, if you select IPv4 in the Send HA and Grid Communication over field, specify
the network information for the following interfaces: VIP (IPv4), Node1 HA (IPv4), Node1 LAN1 (IPv4),
Node2 HA (IPv4), Node2 LAN1 (IPv4), VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6)
interfaces.
For a dual mode HA Master, if you select IPv6 in the Send HA and Grid Communication over field, specify
the network information for the following interfaces: VIP (IPv4), Node1 LAN1 (IPv4), Node2 LAN1 (IPv4),
VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
Enter correct information for the following by clicking the field:
• Interface: Displays the name of the interface. You cannot modify this.
• Address: Type the IPv4 or IPv6 address depending on the type of interface.
• Subnet Mask (IPv4) or Prefix Length (IPv6): Specify an appropriate subnet mask for IPv4 address
or prefix length for IPv6 address. The prefix length ranges from 2 to 127.
• Gateway: Type the IPv4 or IPv6 address of the default gateway depending on the type of
interface. For the IPv6 interface, you can also type Automatic to enable the appliance to acquire
the IPv6 address of the default gateway and the link MTU from router advertisements.
Note
You can now define a link-local address as the default IPv6 gateway and isolate the LAN
segment so that the local router can provide global addressing and access to the
network and Internet. This is supported for both LAN1, LAN2, and VLAN interfaces, as
well as LAN1, LAN2, VLAN in the failover mode. However, the link-local address does
not support the following:
• IPv6 link local gateway for the MGMT interface.
• IPv6 link local is not supported for addresses. It supported only for gateways.
• VLAN Tag: For a VLAN, enter the VLAN tag or ID. You can enter a number from 1 to 4094. Ensure
that you configure the corresponding switch accordingly.
• Port Settings: From the drop-down list, choose the connection speed that you want the port to use.
You can also choose the duplex setting. Choose Full for concurrent bidirectional data transmission
or Half for data transmission in one direction at a time. Select Automatic to instruct the NIOS
appliance to negotiate the optimum port connection type (full or half duplex) and speed with the
connecting switch automatically. This is the default setting. You cannot configure port settings for
vNIOS appliances.
9. Optionally, enter a new password and click Next. The password must be a single string (no spaces) that is at
least four characters long.
10. Select the time zone of the Grid Master and indicate whether the Grid Master synchronizes its time with an NTP
(Network Time Protocol) server.
Note
The Grid Setup Wizard provides options such as not changing the default password and manually
entering the time and date. However, changing the password and using an NTP server improves
security and accuracy (respectively), and so these choices are presented here.
Record and retain this information in a safe place. If you forget the shared secret, you need to contact
Infoblox Technical Support for help. When you add an appliance to the Grid, you must configure it with
the same Grid name, shared secret, and VPN port number that you configure on the Grid Master.
12. Close the management window. The configuration for Node 1 is complete.
HA Master – Node 2
1. On your management system, open a new browser window, and connect to https://ip_addr, where ip_addr is the
IP address of the LAN1 port on Node 2. IPv4 or IPv6 values are valid.
When you enter an IPv6 address, enclose the address in square brackets (as in https://[ip_addr] or https://
[2001:db8::256:ABCD:EF12:34:1].
2. Log in using the default username and password admin and infoblox.
3. Read the Infoblox End-User License Agreement (EULA), and then click I Accept.
Note that if you want to view the privacy policy of Infoblox, then on the EULA screen, click Infoblox Privacy Policy.
Grid Manager displays the policy on a new browser tab.
4. Read the Data Collection and Opt-Out Notice and choose whether to enable (opt in) or disable (opt out) the
Infoblox BloxConnect feature.
By default, the feature is enabled. If you want to disable it, select To Opt-Out of BloxConnect, please click
here. The Data Collection and Opt-Out Notice screen is displayed only when you log in to Grid Manager for the
first time. For more information, see Configuring BloxConnect.
5. Click OK. The Grid Setup wizard appears.
6. On the first screen, select Join Existing Grid and click Next.
7. On the next screen, specify the Grid properties and click Next.
• Grid Name: Enter a text string that the two appliances use to authenticate each other when establishing a
VPN tunnel between them. This must match the Grid name you entered for Node 1.
• Grid Master's IP Address: Enter the same VIP you entered for Node 1.
• Shared Secret: Enter a text string that both appliances use as a shared secret to authenticate each other
when establishing a VPN tunnel between them. This must match your entry in Node 1.
8. On the next screen verify the IP address settings of the member and click Next.
The last screen displays the settings you specified in the previous panels of the wizard.
9. Verify that the information is correct and click Finish.
The setup of the HA master is complete. From now on, when you make an HTTPS connection to the HA pair, use
the VIP address.
The communication protocol for all the services in a dual mode (IPv4 and IPv6) HA Master is the same protocol as the
one used for VRRP advertisements. For example, if you select IPv4 in the Send HA and Grid Communication over field
in step 2 of the Grid Setup wizard, then IPv4 is set as the communication protocol for all the services. However, you can
override the communication protocol for all the services in a dual mode HA Master. For information, see Changing the
Communication Protocol for a Dual Mode Appliance.
Setting up an appliance as a single Grid Master is very easy. If the appliance has the DNSone package with the Grid
upgrade, it is already a Grid Master. You simply need to define the network settings for its LAN1 port. The various
procedures for defining the network settings for the LAN1 port of a single independent appliance apply here as well.
Therefore, you can use any of the following procedures to define the network settings for the LAN1 port of the appliance
that you want to make a single Grid Master:
• LCD: See Method 1 – Using the LCD. (LCD configuration does not support IPv6 address entry.)
• Console port: See – Method 2 – Using the CLI.
You can also use the NIOS Grid Setup Wizard to create a single Grid Master. In addition to providing a simple method
accompanied by helpful information, the setup wizard allows you to change the admin password and configure time
settings for the appliance.
Note
Note
You can now define a link-local address as the default IPv6 gateway and isolate the LAN
segment, so the local router can provide global addressing and access to the network
and Internet. For information about the link-local address limitations, see the Gateway
field description in the HA Master – Node 1 section.
• VLAN Tag: For a VLAN, enter the VLAN tag or ID. You can enter a number from 1 to 4094. Ensure
that you configure the corresponding switch accordingly.
• Port Settings: From the drop-down list, choose the connection speed that you want the port to use.
You can also choose the duplex setting. Choose Full for concurrent bidirectional data transmission
or Half for data transmission in one direction at a time. Select Automatic to instruct the NIOS
appliance to negotiate the optimum port connection type (full or half duplex) and speed with the
connecting switch automatically. This is the default setting. You cannot configure port settings for
vNIOS appliances.
12. Optionally, enter a new password and click Next. The password must be a single alphanumeric string (no spaces)
that is at least four characters long. The password is case-sensitive.
13. Select the time zone of the Grid Master and indicate whether the Grid Master synchronizes its time with an NTP
(Network Time Protocol) server, and then click Next.
• If you choose to enable NTP, click the Add icon and enter the IP address of an NTP server. Entries may
be an IPv4 or IPv6 address. You can enter IP addresses for multiple NTP servers.
• If you choose to disable NTP, set the date and time for the appliance.
14. The last screen displays the settings you specified in the previous panels of the wizard. Verify that the information
is correct and click Finish. The application restarts after you click Finish.
Note
The Grid Setup wizard provides options such as not changing the default password and manually entering the
time and date. However, changing the password and using an NTP server improves security and accuracy
(respectively), and so these choices are presented here.
Record and retain this information in a safe place. If you forget the shared secret, you need to contact Infoblox
Technical Support for help. When you add an appliance to the Grid, you must configure it with the same Grid
name, shared secret, and VPN port number that you configure on the Grid Master.
The setup of the single master is complete. From now on, when you make an HTTPS connection to the appliance, use its
new IP address.
In a dual mode Grid Master, the communication protocol for all the services is set to IPv4, by default. You can change the
default communication protocol for the services. For information, see Changing the Communication Protocol for a Dual
Mode Appliance.
Note
You may provision a Port Reservation for the new Grid Member. When doing so, you select the device to which
you expect the new Grid Member to connect; In the context of a Grid member, this device type is usually an
Ethernet Switch or Switch-Router. The Add Grid Member Wizard provides a step in which you define the port
reservation settings, as described in the following section Adding a Single Member. The process also can be
applied when defining an HA pair, as described in the
sections Creating an HA Grid Master and Adding an HA Member.
You can add single appliances and HA pairs to a Grid, forming single members and HA members, respectively. A single
Grid member can be either an Infoblox appliance or a vNIOS appliance. You can configure Grid members in either IPv4,
IPv6, or dual mode (IPv4 and IPv6). For information about which vNIOS appliance supports configuration as an HA Grid
member, see vNIOS Appliances.
You can also define an HA member on the Grid Master and then add two individual NIOS appliances to the Grid as Node
1 and Node 2 to complete the HA member you defined on the master.
New members inherit all settings that you create at the Grid level unless you override them at the member level. You can
also define port reservations for the network infrastructure devices to which the Grid members will connect.
The process for adding either a single appliance or HA pair to a Grid involves the following steps:
1. Adding and configuring Grid members on the Grid Master. In addition to defining the network and appliance
settings for a member, you can also configure service settings before you join the member or HA pair to the Grid.
2. Reserving a port on a switch or switch-router for connectivity to the Grid member.
3. Joining the appliance or HA pair to the Grid. This includes defining the VIP or IP address of the Grid Master, the
Grid name, and the shared secret on the single appliance or HA pair. If an appliance or HA pair cannot join the
Grid because of MTU (maximum transmission unit) limitations on its network link, you can reduce the MTU that
the master uses when communicating with it. See Setting the MTU for VPN Tunnels. If the Grid Master is behind
a NAT device and there are members on both sides of that NAT device, you must create a NAT group, as
described in NAT Groups.
In a large-scale deployment of Grids across multiple sites, consider remotely provisioning your Grid members before
joining them to the Grid. For more information about this feature, see Auto-Provisioning NIOS Appliances.
In situations where you want to define certain configurations on an offline Grid member and associate DNS and DHCP
data to the member before deploying it, you can use the pre-provisioning feature to accomplish this. For more
information, see Pre-Provisioning NIOS and vNIOS Appliances.
Note
Infoblox recommends that you back up the configuration after you convert a Grid to a different mode.
Restoring the old backup by performing a forced restore, may prevent the Grid members from rejoining
the Grid Master after the restore.
Adding an HA Member
The basic steps necessary to add an HA member are as follows:
1. Define the network settings of the HA pair on the Grid Master.
Note
The procedure for adding an HA pair to a Grid when it uses the MGMT port of the active node for Grid
communications differs slightly from that described below. See Grid Communications.
Note
Infoblox recommends that you back up the configuration after you convert a Grid to a
different mode.
Restoring the old backup by performing a forced restore, may prevent the Grid members
from rejoining the Grid Master after the restore.
• Required Ports and Addresses: This table lists the network interfaces based on the type of network connectivity.
For IPv4 HA member, specify the network information for VIP (IPv4), Node1 HA (IPv4), Node2 HA (IPv4), Node1
LAN1 (IPv4), and Node2 LAN1 (IPv4) interfaces. For IPv6 HA member, specify the network information for VIP
(IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
For a dual mode HA member, if you select IPv4 in the Send HA and Grid Communication over field, specify the
network information for the following interfaces: VIP (IPv4), Node1 HA (IPv4), Node1 LAN1 (IPv4), Node2 HA
(IPv4), Node2 LAN1 (IPv4), VIP (IPv6), Node1 LAN1 (IPv6), and Node2 LAN1 (IPv6) interfaces.
For a dual mode HA member, if you select IPv6 in the Send HA and Grid Communication over field, specify the
network information for the following interfaces: VIP (IPv4), Node1 LAN1 (IPv4), Node2 LAN1 (IPv4), VIP (IPv6),
Note
When the system operates in HA mode, should the IPv6–addressed VIP value be deleted, the IPv6
address of the HA port will also be deleted.
5. Optionally, define extensible attributes. For information, see Using Extensible Attributes .
6. Do one of the following:
• Click Save & Edit to add the HA member to the Grid and launch the editor. You can configure additional
properties, such as the MTU size, or add the member to a NAT group.
• Click Save & New to add the HA member to the Grid and launch the wizard again to add another member.
• Click Save & Close to add the HA member to the Grid and close the wizard.
The communication protocol for all the services in a dual mode (IPv4 and IPv6) HA member is the same protocol as the
one that is used for VRRP advertisements. For example, if you select IPv4 in the Send HA and Grid Communication over
field in step 2 of the Add Grid Member wizard, then IPv4 is set as the communication protocol for all the services.
However, you can override the communication protocol for all the services in a dual mode HA member. For information,
see Changing the Communication Protocol for a Dual Mode Appliance.
Note
You can use the "Group Results" function for the following services: DNS, DHCP, TFTP, FTP, HTTP,
NTP, bloxTools, Captive Portal, and Reporting services.
or
From the Data Management tab, select the DHCP, File Distribution, or DNS tab -> Members/Servers tab.
2. Complete the following to group members with the same extensible attribute value:
• Group Results: Select this checkbox to enable the appliance to group members by extensible attributes.
• Group By: From the drop-down list, select the first extensible attribute that you want the appliance to use
for filtering members.
Grid Manager displays data per group of members configured with the same extensible attribute value.
To add additional Group By filter, click the + icon, and then select a value from the drop-down list. You can apply up to 10
Group By filters. You can also delete a filter by clicking the - icon.
When you enable reporting service on the Grid and configure multi-site cluster, you can group reporting members by
reporting site extensible attributes. For information about reporting clusters, see Configuring Reporting Clusters.
Grid Manager displays the following information for the specified extensible attribute:
• <Selected extensible attribute>: Displays the selected extensible attribute value.
Note
In an HA pair, when one of the appliances is in the Working status and the other appliance has a status
other than Working, Inactive, and Unknown, then the overall status of HA members is Warning. When
you use filters and the group by extensible attribute feature, filters take precedence over the group by
function.
When you drill-down to the member level, Grid Manager displays the members in the group.
Note
• You can add additional IPv4 and IPv6 addresses for LAN2 and MGMT ports for the Grid
services, in the Additional Ports and Addresses table. But for an IPv6-only Grid, you can
configure IPv6 address for the VLAN port.
• Legacy Data Connector virtual machines are not supported on IPv6-only Grids.
5. Add IPv6 single members and HA members to the Grid. For information, see Adding Grid Members.
Note
To add a discovery member to an IPv6-only grid, add the member first and then install its discovery
license. If the system displays the "Cannot configure IPv6-only settings on member because it has a
discovery license installed." in the Grid Member Properties Editor dialog box of the discovery member,
disregard the error message.
6. You can use the Grid Setup Wizard or access the Join Grid dialog box to join appliances to a Grid. See Joining
Appliances to the Grid.
You can also configure IPv6 address for the MGMT interface of the appliance and join the Grid through the MGMT
interface.
Note
Infoblox recommends that you back up the configuration after you convert a Grid to IPv6-only mode.
Restoring the old backup by performing a forced restore, may prevent the Grid members from rejoining
the Grid Master after the restore.
The process of transforming an IPv4-only or dual mode Grid to an IPv6-only Grid involves the following steps:
1. Convert the Grid Master into dual mode (IPv4 and IPv6) if it is in IPv4 mode, as follows:
• Login to the Grid Master, from the Grid tab -> Grid Manager tab -> Members tab -> select the Grid Master and
click the Edit icon.
• In the Grid Member Properties editor, select the Network tab -> Basic tab.
• In the Type of Network Connectivity field, select IPv4 and IPv6 from the drop-down list and enter the network
information for LAN1 (IPv6) address in the Ports and Addresses table.
For HA Master, select IPv4 in the Send HA and Grid Communication Over field, and enter the network information
for VIP (IPv6), Node1 LAN1 (IPv6), Node2 LAN1 (IPv6) in the Ports and Addresses table.
• Save the configuration and click Restart if it appears at the top of the screen.
• Similarly, convert all the Grid members into dual mode (IPv4 and IPv6) if it is in IPv4 mode. All the members will
rejoin the Grid using IPv4.
• Force each Grid member to rejoin the Grid using IPv6, as follows:
• From the Grid tab, select the Grid Manager tab -> Members tab -> member checkbox -> Edit icon.
• In the Grid Member Properties editor, select the Network tab -> Basic tab.
• In the Always Force or Prefer this Communications Protocol field, select IPv6 from the drop-down list, and
also select IPv6 in the Send HA and Grid Communication over field if the member is an HA pair.
This setting will force the Grid member to rejoin the Grid using IPv6 and it uses IPv6 for all the services.
• Save the configuration and click Restart if it appears at the top of the screen.
• Configure each Grid member to provide DNS service using IPv6, as follows:
• From the Data Management tab, select the DNS tab -> Members tab -> member checkbox -> Edit icon.
• In the Member DNS Properties editor, select the General tab -> Basic tab.
• Enable the IPv6 checkbox for the desired interface (LAN1, LAN2, or MGMT) under DNS Interfaces.
• Ensure that the primary and secondary servers are configured with an IPv6 address for each zone, before
disabling the IPv4 checkbox for LAN1, LAN2, or MGMT interface.
• Save the configuration and click Restart if it appears at the top of the screen.
Note
• Configure each Grid member to provide DHCP service using IPv6, as follows:
• From the Data Management tab, select the DHCP tab -> Members tab -> member checkbox -> Edit icon.
• In the Member DHCP Properties editor, select the General tab -> Basic tab.
• Disable the IPv4 checkbox for LAN1 and LAN2 interface under DHCP Interfaces.
• Enable the IPv6 checkbox for the desired interface (LAN1 or LAN2) under DHCP Interfaces.
If IPv6 network is not configured, you can create an IPv6 network. For information, see Managing IPv6
Networks.
• Save the configuration and click Restart if it appears at the top of the screen.
• Enable each Grid member and the Grid Master to use IPv6 for all the services, as follows:
• From the Grid tab, select the Grid Manager tab -> Members tab -> member checkbox -> Edit icon.
• In the Grid Member Properties editor, select the Network tab -> Basic tab, and select Customized Settings
and specify the following:
• Always Force this Communication Protocol for: Select IPv6 from the drop-down list for the Grid
and reporting service.
• Always Prefer this Communication Protocol for: Select IPv6 from the drop-down list as the
preferred communication protocol for the listed services which has two types of resolution (A and
AAAA records). The appliance uses the preferred protocol first for the service.
• Save the configuration and click Restart if it appears at the top of the screen.
• When all the services are functioning using IPv6, you can remove the IPv4 addresses from all the Grid members
by converting the Grid member from dual mode (IPv4 and IPv6) to IPv6 mode, as follows.
• From the Grid tab, select the Grid Manager tab -> Members tab -> member checkbox -> Edit icon.
• In the Grid Member Properties editor, select the Network tab -> Basic tab.
• In the Type of Network Connectivity field, select IPv6 from the drop-down list.
• Save the configuration and click Restart if it appears at the top of the screen.
• Similarly, you can convert the Grid Master from dual mode (IPv4 and IPv6) to IPv6 mode after converting all the
Grid members to IPv6 mode.
Note
Remove the IPv4 addresses from the Grid Master only after you remove the IPv4 addresses from all the
Grid members.
Note
• Auto-provisioning supports only IPv4 addressing and not IPv6 addressing.
• Auto-provisioning supports only physical appliances. You cannot auto-provision a hybrid HA setup of a
physical and virtual appliance.
When you upgrade or downgrade the appliance to a release that includes this feature, auto-provisioning is disabled for
the appliance.
Note
When auto-provisioning is disabled for an appliance and the network address is not preserved, auto-
provisioning will be re-enabled and a DHCP lease request is sent to the DHCP server if you reset the appliance
using the CLI command reset all auto_provision or reset the database using the CLI command reset
database auto_provision. However, if the static IP address for an appliance is set and network settings are
preserved, auto-provisioning will be re-enabled for the appliance but the lease address will not be requested if
you reset the database using the CLI command reset database auto_provision.
Note
You must have the Enterprise and vNIOS licenses pre-provisioned in order for a vNIOS appliance to join the
Grid. For a cloud virtual appliance, include the Cloud Platform license.
To pre-provision an offline Grid member and join it to the Grid at a later time, complete the following:
1. Add a new single member or HA member to the Grid, as described in Adding a Single Member or Adding an HA
Member.
2. Pre-provision the offline member, as described in Configuring Pre-Provisioned Members.
3. Configure services to use the pre-provisioned member.
4. Obtain permanent licenses you have specified for pre-provisioning and use the set license CLI command to
install the licenses on the member. For more information about CLI commands, refer to the Infoblox CLI Guide.
5. Join the pre-provisioned member to the Grid, as described in Joining Appliances to the Grid. For guidelines about
joining pre-provisioned members, see Guidelines for joining Pre-Provisioned Members.
Note
After you save the configuration, you can no longer modify the hardware model for the member. You
also cannot disable any provisional licenses, though you can add new ones. To disable provisional
licenses, you must first remove the pre-provisioned member and then configure a new one.
Note
Before you join the member to the Grid, use the CLI command set license to add corresponding permanent
licenses that you have specified for pre-provisioning. For information about CLI commands, refer to the Infoblox
CLI Guide{_}. You can also allocate pre-purchased licenses from the pool. For information, see You can use the
following OpenStack cloud-init template to configure an IB-V815 as a Grid Master
NIOS supports the following provisional licenses: Cloud Platform, DHCP, DNS, DNS Traffic Control, Enterprise (formerly
Grid), FireEye, Microsoft Management, RPZ (Response Policy Zone), and vNIOS.
After you configure the offline member, you can select the pre-provisioned member from the corresponding wizards and
editors based on the required license(s). The following table lists the wizards and editors from which you can select a
pre-provisioned member when required pre-provisioned licenses are enabled:
Wizards and editors from which you can select a pre-provisioned member Required
license(s)
Note
If you configure a DHCP Failover using an online member and a pre-provisioned member, assign it to a range,
and start DHCP service, no addresses will be served because the initial synchronization does not happen due
to the pre-provisioned offline member. NIOS logs the following message in the syslog:
2013-12-24T08:37:23+00:00 daemon (none) dhcpd[8790]: info DHCPDISCOVER from
cb:86:a8:45:6c:5c via 10.120.21.236: not responding (recovering)
Configuring a Grid
You can configure an IPv4-only, IPv6-only, or a dual mode (IPv4 and IPv6) Grid, but the configuration example uses IPv4
addresses. In this example, you configure seven NIOS appliances in a Grid serving internal DHCP and DNS for an
enterprise with the domain name corpxyz.com. There are four sites: HQ and three branch offices. A hub-and-spoke VPN
tunnel system connects the sites, with HQ at the hub. The distribution and roles of the NIOS appliances at the four sites
are as follows:
• HQ site (four appliances in two HA pairs):
• HA Grid Master: Hidden primary DNS server
• HA member: Secondary DNS server and DHCP server for HQ
• Site 1 (two appliances in an HA pair): HA member, secondary DNS server and DHCP server for Site 1
• Site 2 (one appliance): Single member, secondary DNS server and DHCP server for Site 2
Note
When adding an Infoblox appliance to an existing Grid, you must first check whether the Grid is running the
minimum required software release of the appliance. For information, refer to the
document, Minimum Required Release Software for Hardware Platforms, that was shipped with your product.
To create a Grid, you first create a Grid Master and then add members. The process involves these three steps:
1. Configuring two appliances at HQ as the Grid Master. For more details, see Create the Grid Master.
2. Logging in to the Grid Master and defining the members that you want to add to the Grid; that is, you configure
Grid member settings on the Grid Master in anticipation of later joining those appliances to the Grid. For more
details, see Define Members on the Grid Master.
3. Logging in to the individual appliances and configuring them so that they can reach the Grid Master over the
network and join the Grid. For more details, see Join Appliances to the Grid.
After creating the Grid and adding members, you use the Data Import Wizard to import DHCP and DNS data from legacy
servers. For more details, see Import DHCP Data and Import DNS Data.
Finally, you transition DHCP and DNS service from the legacy servers to the Infoblox Grid members. For more details,
see Enable DHCP and Switch Service to the Grid.
Network Diagram
Note
When connecting the nodes of an HA pair to a power source, connect each node to a different power
source if possible. If one power source fails, the other might still be operative.
2. At Site 2, connect an Ethernet cable from the LAN1 port on the single appliance to a switch, connect the
appliance to a power source, and turn on the power for that appliance.
Note
IPv6 addressing is fully supported on Infoblox Grid Masters, HA pairs and standalone HA pairs, and appliances.
Examples in the sections of this chapter use IPv4.
Configure two appliances at HQ to be the two nodes that make up the HA pair forming the Grid Master.
Note
Depending on the network connection speed and the amount of data that the master needs to synchronize with
the member, the process can take from several seconds to several minutes to complete.
HQ Site – HA Member
1. From the Grid tab, select the Grid Manager -> Members tab.
2. Expand the Toolbar and click Add -> Add Grid Member.
3. In the Add Grid Member wizard, complete the following and click Next:
• Member Type: Select Infoblox.
• Host Name: Enter ns2.corpxyz.com.
• Comment: Enter HQ Site - ns2.corpxyz.com.
4. Enter the following information about the member that you are adding to the Grid and click Save & Close:
• Type of Network Connectivity: Select IPv4 from the drop-down list.
Interface Address Subnet Mask (IPv4) or Prefix Length Gateway Port Settings
(IPv6)
Site 1 – HA Member
1. From the Grid tab, select the Grid Manager tab -> Members tab.
2. Expand the Toolbar and click Add -> Add Grid Member.
3. In the Add Grid Member wizard, enter the following and click Next:
• Member Type: Select Infoblox.
• Host Name: Enter ns3.site1.corpxyz.com
• Comment: Enter Site 1 - ns3.site1.corpxyz.com
4. Specify the following information about the member that you are adding to the Grid and click Save & Close:
• Type of Network Connectivity: Select IPv4 from the drop-down list.
• High Availability Pair: Select this option.
• Virtual Router ID: Enter 111.
• Required Ports and Addresses:
Interface Address Subnet Mask (IPv4) or Prefix Length Gateway Port Settings
(IPv6)
The Infoblox application restarts. After restarting, the appliance contacts the Grid Master and joins the Grid as Node 1.
After the application restarts, the appliance contacts the Grid Master and joins the Grid as Node 2, completing the HA
member configuration for the HQ site.
• IP Address: 10.1.1.6
• Netmask: 255.255.255.0
• Gateway: 10.1.1.1
• Grid Master VIP: 10.0.1.10
After the application restarts, the appliance contacts the Grid Master and joins the Grid as Node 2, completing the HA
member configuration for Site 1.
To check the status of all the Grid members, log in to the Grid Master at 10.0.1.10, and from the Grid tab, select the Grid
Manager tab -> Members tab, select 10.0.1.10 and click the Detailed Status icon. Check that the status indicators are all
green in the Detailed Status panel. As an appliance joins a Grid, it passes through the following phases: Offline,
Connecting (Downloading Release from Master), Synchronizing, and Running.
Note
Depending on the network connection speed and the amount of data that the master needs to synchronize with
the member, the process of joining a Grid can take from several seconds to several minutes to complete.
Legacy Server
1. Log in to the legacy name server at 10.0.1.5 and save the named.conf file, which contains all the DNS settings
that you want to import into the Infoblox name server, to a local directory on your management system.
2. On the legacy server, enable zone transfers to the NIOS appliance.
Note
When all DNS servers are members in the same Grid, the members use database replication to
synchronize all their data—including DNS zone data. You can change the default behavior so that Grid
members use zone transfers instead. In this example, Grid members use database replication.
Note
Only superusers can import A, AAAA, shared A, and shared AAAA records with a blank name. Limited-access
users must have read/write permission to Adding a blank A/AAAA record to import A, AAAA, shared A, and
shared AAAA records with a blank name, otherwise, the import operation might fail. You can assign global
permission for specific admin groups and roles to allow to import A, AAAA, shared A, and shared AAAA records
with a blank name. For more information, see Administrative Permissions for Adding Blank A or AAAA Records.
Tip: You can use SHIFT+click to select multiple contiguous rows and CTRL+click to select multiple noncontiguous
rows.
5. Right-click the selected rows, and then select Set Import Options.
6. In the Set Import Options dialog box, enter the following, and then click Apply:
• Set Zone Type: No change
Note
If the wizard is unable to import a zone, an error message with an explanation appears in the log.
3. To close the Data Import Wizard, click Exit. This closes the Data Import Wizard Log as well.
Note
When importing data through the wizard rather than entering it through the GUI, the Restart Services
icon does not change to indicate you must restart service for the appliance to apply the new data. Still,
restarting service on the Grid Master is necessary for the imported configuration and data to take effect.
2. To remove A records for the legacy servers, from the Data Management tab, select DNS tab -> Zones tab ->
corpxyz.com.
3. Expand the Records section, select the following A records in the corpxyz.com zone, and then click the Delete
icon:
1. ns1 (for 10.0.1.5)
2. ns2 (for 10.0.2.5)
3. ns3.site1.corpxyz (for 10.1.1.5)
4. ns4.site3.corpxyz (for 10.2.1.5)
• Remove the respective A records for legacy servers from the site1.corpxyz and site3.corpxyz subzones.
Note
If you do not see the imported DNS configuration file, ensure that you enabled DNS and restarted the
services.
• Scroll through the DNS configuration log to check that each imported zone has an allow-update statement like the
following one for the 10.1.10.in-addr.arpa reverse-mapping zone:
zone "10.1.10.in-addr.arpa" in {
…
allow-update { key DHCP_UPDATER; 10.0.2.10; 10.1.1.10; 10.2.1.10; };
…
};
Note
Start the DNS service, as described in Starting and Stopping the DNS Service. The Grid members are
ready to serve DHCP and DNS, and send DDNS updates.
Managing a Grid
After you configure a Grid Master and add members, you might need to perform the following tasks:
Note
If read-only API access is enabled for a Grid Master Candidate, then selecting
the Enable GUI Redirect from Member checkbox for the Grid Master Candidate does not
redirect the Infoblox GUI from the Grid Master Candidate to the Grid Master. For more
information about enabling read-only API access on a Grid Master Candidate,
see Enabling Read-only API Access on the Grid Master Candidate.
• Enable GUI/API Access via both MGMT and LAN1/VIP: Select this checkbox to allow access to the Infoblox GUI
and API using both the MGMT and LAN1 ports for standalone appliances and MGMT and VIP ports for an HA
pair. This feature is valid only if you have enabled the MGMT port. For information about enabling the MGMT port,
see Appliance Management.
Note
The appliance uses the MGMT port only to redirect the Infoblox GUI from a Grid member to the Grid
Master even after you enable the Enable GUI/API Access via both MGMT and LAN1/VIP feature.
• Show Restart Banner: Select this checkbox to enable the appliance to display the Restart Banner at the top of
Grid Manager whenever the appliance notifies you that a service restart is required.
• Require Name: Select this checkbox to prompt the administrator to input the username before performing the
service restart. When you select this checkbox, the appliance displays the Confirm Restart Services dialog box.
Enter the username in the Name field and click Restart Services. For information about restarting service, see
Restarting Services.
• Save the configuration.
Note
You must have Read/Write permission to all the child objects in order to delete a parent object. Recursive
deletion is applicable to all zone types except stub and forward-mapping zones.
The appliance puts all deleted objects in the Recycle Bin, if enabled. You can restore the objects if necessary. When you
restore a parent object from the Recycle Bin, all its contents, if any, are re-parented to the restored parent object. For
information about the Recycle Bin, see Using the Recycle Bin.
To configure the group of users to perform recursive deletions:
1. From the Grid tab, select the Grid Manager tab.
2. Expand the Toolbar and select Grid Properties -> Edit.
3. In the Grid Properties editor, select the General tab -> Advanced tab.
4. Under Present the option of recursive deletion of networks or zones to, select one of the following:
• All Users: Select this to allow all users, including superusers and limited-access users, to choose whether
they want to delete the parent object and its contents or the parent object only when they delete a network
container/network or a zone. This is selected by default.
• Superuser: Select this to allow only superusers to choose whether they want to delete the parent object
and its contents or the parent object only when they delete a network container/network or a zone.
• Nobody: When you select this, users can only delete the parent object (network container or zone). All
child objects, if any, are re-parented.
5. Save the configuration.
Testing the Connection of the Master Candidate with the Grid Members
Before promoting a Grid Master Candidate, you can check whether the Grid Master Candidate is connected to the rest of
the Grid members by scheduling a test promotion. You can do this either by using Grid Manager or by using the NIOS
CLI. For information about scheduling a test promotion using the NIOS CLI, see show test_promote_master and set
test_promote_master.
The connection of the Grid Master Candidate to the rest of the Grid members is checked by sending specifically crafted
test packets from the Grid Master Candidate and checking whether the Grid members are able to receive these packets.
To test the connection of the Grid Master Candidate with the Grid members, complete the following:
1. From the Grid tab -> Grid Manager tab, expand the Toolbar, and then click GMC Promote Test.
2. In the GMC Promote Test editor, complete the following:
a. Click the Schedule icon at the top of the wizard, and in the Schedule Change panel, complete one of the
following:
• To run the test promotion immediately, select Now.
• To schedule the test promotion to run later, select Later, and then enter a date, a time, and select
the time zone.
b. From the Select GMC drop-down list, select the Grid Master Candidate that you want to promote to Grid
Master.
c. In the Timeout (secs) field, set the timeout for the packet to be received in seconds. That is, if the packet
is not received by the Grid members within this timeout, the connection is deemed to have failed.
d. Select the Continuous Testing checkbox if you want the Grid Master Candidate to send packets to the
selected Grid members on a continual basis. The maximum period of time for which packets can be sent
is 120 seconds.
e. In the Members table, select the Grid members to which the Grid Master Candidate must establish a
connection.
3. Click Start to start the test promotion. You can click Stop at any time to stop the test promotion.
4. Click GMC Promotion Test Results to view the status of the test promotion.
set promote_master.
Notes
• During a Grid Master promotion, ensure that you do not designate a Grid member as a Grid Master
Candidate or promote a Master Candidate. In addition, wait up to two hours since the last promotion to
perform another Grid Master promotion. Otherwise, you might experience unnecessary member
reboots. Whenever possible, separate any operations that require product restarts by at least an hour.
• When a Grid Master Candidate is selected as a subscribing member, then after Grid Master Candidate
promotion, the subscription still takes place through the previous Grid Master Candidate member which
is new a Grid member.
Note
Note that when you promote the Master Candidate to a Grid Master, the IP address will change
accordingly. If you have configured a FireEye appliance, then any changes in the Grid Master IP
address, FireEye zone name, associated network view or the DNS view will affect the Server URL that
is generated for a FireEye appliance. The FireEye appliance will not be able to send alerts to the
updated URL when there is a change in the IP address. You must update the URL in the FireEye
appliance to send alerts to the NIOS appliance. For more information, see ConfiguringFireEye RPZs.
Note
When you upgrade the Grid Master Candidate to NIOS 7.1 and later, read-only API access is disabled. But
when you upgrade the Grid Master Candidate from NIOS 7.1 to a later release with read-only API access
enabled, then this setting is retained after the upgrade is completed.
The appliance logs all API logins in the audit log and syslog. You can view the audit log and syslog of the Grid Master
Candidate under the Administration -> Logs tab.
To enable read-only API access on the Grid Master Candidate:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_Master_Candidate checkbox, and then
click the Edit icon.
• In the Grid Member Properties editor, select the General tab -> Basic tab, and then do the following:
Read Only API access: This field is displayed only when the Grid member is designated as a Master Candidate.
Select this checkbox to enable read-only API access on the Grid Master Candidate. Enabling this checkbox will
only allow read-only API access and not write API access. Note that if you enable this checkbox, you cannot
access the GUI using the IP address of the Grid Master Candidate.
• Save the configuration.
Note
A Grid Master replicates data to single members and to the active node of HA members. The active node then
replicates the data to the passive node in the HA pair.
At a minimum, there must be 256 Kbps (kilobits per second) bandwidth between the Grid Master and each member, with
a maximum round-trip delay of 500 milliseconds. For ongoing database updates, the amount of data sent or received is
15 Kb for every DDNS update, and 10 Kb for every DHCP lease -offer/renew. The baseline amount for heartbeat and
other maintenance traffic for each member is 2 Kbps. Measure the peak DNS and DHCP traffic you see in your network
to determine the bandwidth needed between the Grid Master and its members for this activity.
For example, you might decide to place your Grid members in the locations shown in the below figure.
Grid Deployment
40 DHCP leases/minute/60 secs = 0.666 DHCP leases/sec * 10 Kb = 6.7 Kbps * 6 members = 40.2 Kbps
Another component is the upgrade process. See Upgrading NIOS Software for more information.
Bandwidth requirements, database size, and update rate determine the maximum size of the Grid you can deploy. Based
on the various factors discussed above, you can determine the amount of bandwidth your Grid needs. If your calculations
exceed the available bandwidth, then you might need to modify your deployment strategy, perhaps by splitting one large
Grid into two or more smaller ones.
Note
This calculation does not take into account existing traffic other than DNS and DHCP services, so factor and
adjust accordingly.
Note
The Grid Master checks the software version every time an appliance or HA pair joins the Grid. The
software version check occurs during the initial join operation and when a member goes offline and then
rejoins the Grid.
When a single appliance attempts to join the Grid for the first time, the following series of events takes place:
1. The appliance establishes an encrypted VPN tunnel with the Grid Master.
2. The master detects that the software version on the appliance is different from that in the rest of the Grid. For
example, the appliance is running NIOS 6.10.0 software but the rest of the Grid is running NIOS 7.3.200 software.
3. The appliance downloads the NIOS 7.3.200 software from the Grid Master.
4. After the upgrade is complete, the NIOS application automatically restarts.
NAT Groups
Note
Infoblox NAT and NAT groups do not support NAT IPv6 operation.
NAT groups are necessary if the Grid Master is behind a NAT appliance and there are members on both sides of that
NAT appliance. Any members on the same side as the master go into the same NAT group as the master and use their
interface addresses for Grid communications with each other. Grid members on the other side of that NAT appliance do
not go in the same NAT group as the master and use the master's NAT address for Grid communications. These other
members outside the NAT appliance can—but do not always need to be—in a different NAT group. To see when NAT
groups become necessary for Grid communications, compare the figure NAT without NAT Groups below with the figures
Grid Master in NAT Group and Grid Master and Master Candidate in NAT Groups.
NAT without NAT Groups
Note
Infoblox appliances support IPv4 and IPv6 networking configurations in most deployments cited in this chapter.
You can set the LAN1 port to an IPv6 address and use that address to access the NIOS UI and the NIOS Setup
Wizard. All HA operations can be applied across IPv6. You can also set a dual mode appliance by configuring
both IPv4 and IPv6 address for the LAN1 port. Topics in this and following chapters generally use IPv4
examples. Also note that LAN2 and the MGMT port also support IPv6. DNS services are fully supported in IPv6
for the LAN1, LAN2, MGMT and VLAN ports. DHCP services are fully supported in IPv6 for the LAN1 and
LAN2 ports. Example networks throughout this chapter use IPv4 addressing.
You can deploy the NIOS appliance as a Grid member in an Infoblox Grid or independently as a standalone deployment.
NIOS appliances support both IPv4 and IPv6 networks and you can deploy them in either IPv4, IPv6, or dual mode (IPv4
and IPv6). Grids offer many advantages for large organizations while independent deployments can be sufficient for
smaller sites. For example, if your ISP hosts one name server to respond to external DNS queries, you can deploy a
single independent NIOS appliance as the other name server, as shown in the below figure.
Single Independent Appliance as a DNS Server
After you configure the network settings on a single independent appliance, you can migrate data from legacy DNS and
DHCP servers to the NIOS appliance. Several tools and methods are available for migrating data and configuration
settings. For a list of the available options, see Infoblox Tools for Migrating Bulk Data.
Note
LCD does not support IPv6 addressing.
1. Connect the power cable from the NIOS appliance to a power source and turn on the power.
At startup, the Infoblox logo appears in the LCD on the front panel of the appliance. Then the LCD scrolls
repeatedly through a series of display screens.
2. To change the network settings for the LAN1 port, press one of the navigation buttons.
The LCD immediately goes into the input mode, in which you can enter the IP address, netmask, and gateway for
the LAN1 port.
3. Use the navigation buttons to enter an IP address, netmask, and gateway address for the LAN1 port.
4. Cable the LAN1 port of the NIOS appliance to a network as described in the installation guide that shipped with
your product.
Console Connection
Note
In the following example, the variable ip_addr1 is the IP address of the LAN1 port and ip_addr2 is the IP
address of the gateway for the subnet on which you set the ip_addr1 address. Infoblox appliances
support IPv4 and IPv6 networking configurations in all deployments cited in this chapter. You can set the
LAN1 port to an IPv6 address and use that address to access the NIOS UI.
You can configure an IPv4 address for the LAN1 port as follows:
NOTICE: All HA configuration is performed from the GUI. This interface is used only to
configure a standalone node or to join a Grid.
To avoid configuring IPv6 network settings, you can press N at the command line.
You can configure an IPv6 address for the LAN1 port as follows:
Infoblox > set network
NOTICE: All HA configuration is performed from the GUI. This interface is used only to
configure a standalone node or to join a grid.
Enter IP address : 2620:010A:6000:2400:0000:0000:0000:6508
Enter IPv6 Prefix Length: 64
Note that you can configure network settings using the Startup wizard any time after you have configured the appliance.
To start the wizard, from Grid Manager, select the System tab, and then click System Properties -> Startup Wizard from
the Toolbar.
To make an HTTPS session to the appliance, you must be able to reach its IP address from the management system.
Note
If you have already set the IP address of the LAN1 port through the LCD or CLI so that you can reach it over
the network—and you have already cabled the appliance to the network—you can skip the first step.
1. If you have not changed the default IP address (192.168.1.2/24) of the LAN1 port through the LCD or CLI—and
the subnet to which you connect the appliance is not 192.168.1.0/24—put your management system in the
192.168.1.0/24 subnet and connect an Ethernet cable between the management system and the appliance.
2. Open an Internet browser window and enter https://<IP_address_of_the_appliance> to make an HTTPS
connection. For information about supported browsers, see Supported Browsers.
Several certificate warnings may appear during the login process, because the preloaded certificate is self-signed
and has the host name www.infoblox.com, which may not match the destination IP address you entered in step 1.
To stop the warning messages from occurring each time you log in to Grid Manager, you can generate a new self-
signed certificate or import a third-party certificate with a common name that matches the FQDN (fully qualified
domain name) of the appliance. For information, see Managing Certificates.
3. Enter the default username and password (admin and infoblox) on the Grid Manager login page, and then click
Login or press ENTER. For information, see Logging on to the NIOS UI.
4. Read the Infoblox End-User License Agreement (EULA), and then click I Accept.
Note that if you want to view the privacy policy of Infoblox, then on the EULA screen, click Infoblox Privacy Policy.
Grid Manager displays the policy on a new browser tab.
5. Read about the Infoblox Customer Experience Improvement Program and choose whether to participate (opt in)
or not participate (opt out) in the program. By default, participation is enabled. If you want to opt out of the
program, select To Opt-Out of the alert program, please click here. For more information about the
program, see Configuring the Customer Experience Improvement Program.
6. Click OK. The Grid Setup wizard appears.
7. In the first screen of the NIOS Setup wizard, complete the following:
8. Type of Network Connectivity: Select the type of network connectivity for the appliance from the drop-down list:
• IPv4 and IPv6: Select this to configure a dual mode appliance.
• IPv4: Select this to configure an IPv4 appliance.
• IPv6: Select this to configure an IPv6 appliance.
9. Are you configuring an HA pair or a standalone appliance?: Select Configuring a standalone appliance. To
configure an independent HA pair, see Deploying an Independent HA Pair.
10. Click Next and complete the following to configure network settings:
• Host Name: Enter a valid domain name for the appliance.
• Ports and Addresses: This table lists the network interfaces based on the type of network connectivity of
the appliance. For an IPv4 appliance, specify the network information for LAN1 (IPv4) interface and for an
IPv6 appliance, specify the network information for LAN1 (IPv6) interface. For a dual mode appliance,
specify the network information for both LAN1 (IPv4) and LAN1 (IPv6) interfaces.
Enter correct information for the following by clicking the field:
• Interface: Displays the name of the interface. You cannot modify this.
To change the communication protocol for a dual mode independent appliance, complete the following:
1. From the System tab, select the System Manager tab -> click System Properties from the Toolbar, and select Edit
from the drop-down list.
2. In the System Properties editor, select the Network tab -> Basic tab, and then complete the following:
• Communication Protocol Settings and Preferences: Select either IPv4 or IPv6 from the drop-down list.
This setting will force the appliance to use the specified protocol for the reporting services and this is the
preferred protocol for services with two types of resolution (A and AAAA records).
• Customized Settings: Select this and perform the following:
• Always use this Communications Protocol for: Select either IPv4 or IPv6 from the drop-down list.
This setting will force the appliance to use the specified communication protocol for reporting
services.
The primary and secondary servers answer queries for the following public-facing servers in the DMZ:
• www.corpxyz.com
• mail.corpxyz.com
• ftp.corpxyz.com
When you create the corpxyz.com zone on the NIOS appliance, you import zone data from the legacy DNS server at
10.1.5.3.
Example 1 Network Diagram
In this example, you change the IP address/netmask of the LAN1 port to 10.1.5.2/24, and the gateway to 10.1.5.1.
LCD
The NIOS appliance has an LCD and navigation buttons on its front panel.
At startup, the Infoblox logo appears in the LCD on the front panel of the appliance. Then the LCD scrolls repeatedly
through a series of display screens.
1. To change the network settings from the default, press one of the navigation buttons.
The LCD immediately goes into input mode, in which you can enter the IP address, netmask, and gateway for the
LAN1 port.
2. Use the navigation buttons to enter the following information:
• IP Address: 10.1.5.2
• Netmask: 255.255.255.0
• Gateway: 10.1.5.1
• For a Single Zone — To set the allow-transfer statement in the named.conf file for the corpxyz.com zone:
zone "corpxyz.com" in { type master;
allow-transfer {10.1.5.2;};
notify yes;
};
2. After editing the named.conf file, restart DNS service on the appliance for the change to take effect.
Infoblox host records are data models that represent IP devices within the Infoblox semantic database. The NIOS
appliance uses a host object to define A, PTR, and CNAME resource records in a single object, as well as a DHCP fixed
address if you include a MAC address in the host object definition. The host object prevents costly errors because you
only maintain a single object for multiple DNS records and a DHCP fixed address. Therefore, it is advantageous to use
host records instead of separate A, PTR, and CNAME records.
Note
If you only have forward-mapping zones on your legacy servers and you want to add reverse-mapping zones,
automatically convert A records to host records in the imported forward-mapping zones, and create reverse
host records in corresponding reverse-mapping zones, create the reverse-mapping zones on the NIOS
appliance and then import the forward-mapping zones data. The NIOS appliance automatically converts the
imported A records to host records in the forward-mapping zones and creates reverse host records in the
reverse-mapping zones.
You also have the option of using the Data Import Wizard for loading DNS and DHCP data. For large data sets, this
option is an efficient approach. To download the Data Import Wizard, visit www.infoblox.com/import/.
In this example, when you create the corpxyz.com forward-mapping zone, you import zone data for the existing
corpxyz.com zone from the legacy server at 10.1.5.3. When you create the 1.1.1.0/24 reverse-mapping zone, you also
import the reverse-mapping zone records from the legacy server. After the appliance has both the forward- and reverse-
mapping zone data, it converts the A and PTR records to Infoblox host records.
Note
To import zone data, you must first create a zone and save it.
Designating the New Primary on the Secondary Name Server (at the ISP Site)
In this example, the external secondary name server is maintained by an ISP, so you must contact your ISP administrator
to change the IP address of the primary (or master) name server. (If you have administrative access to the secondary
name server, you can make this change yourself.)
Because a firewall performing NAT exists between the secondary and primary name servers, specify the NAT address
1.1.1.2 for the primary name server instead of 10.1.5.2.
For example, enter the following commands on a Juniper firewall running ScreenOS 4.x or later:
set address dmz ns1 10.1.5.2/32
set address untrust ntp_server 10.120.3.10/32 set interface ethernet1 mip 1.1.1.2 host 10.1.5.2
set policy from dmz to untrust ns1 any dns permit
set policy from untrust to dmz any mip(1.1.1.2) dns permit set policy from dmz to untrust ns1
ntp_server ntp permit
At this point, the new DNS server can take over DNS service from the legacy server. You can remove the legacy server
and unset any firewall policies permitting traffic to and from 10.1.5.3.
Note
By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission type (full
or half duplex) on the physical links between its LAN1, HA, and MGMT ports and the Ethernet ports on the
connecting switch. If the two appliances fail to auto-negotiate the optimal settings,
see Modifying Ethernet Port Settings for steps you can take to resolve the problem.
Configuring Node 1
1. Open an Internet browser window and enter https://* *<the IP address of the appliance> to make an HTTPS
connection to the first node. For information about supported browsers, see Supported Browsers.
Several certificate warnings may appear during the login process because the preloaded certificate is self-signed
and has the hostname www.infoblox.com, which may not match the destination IP address that you entered in
step 1. To stop the warning messages from occurring each time you log in to Grid Manager, you can generate a
new self-signed certificate or import a third-party certificate with a common name that matches the FQDN (fully
qualified domain name) of the appliance. For information, see Creating a Login Banner.
2. Enter the default username and password (admin and infoblox) on the Grid Manager login page, and then click
Login or press ENTER. For information, see Logging on to the NIOS UI.
3. Read the Infoblox End-User License Agreement, and then click I Accept to proceed.
4. Read about the Infoblox Customer Experience Improvement Program and choose whether to participate (opt in)
or not participate (opt out) in the program. By default, participation is enabled. If you want to opt out of the
Configuring Node 2
1. Open an Internet browser window and enter https://* *<the IP address of the appliance> to make an HTTPS
connection to the second node. For information about supported browsers, see Supported Browsers.
Several certificate warnings may appear during the login process because the preloaded certificate is self-signed
and has the host name www.infoblox.com, which may not match the destination IP address you entered in step 1.
To stop the warning messages from occurring each time you log in to Grid Manager, you can generate a new self-
signed certificate or import a third-party certificate with a common name that matches the FQDN (fully qualified
domain name) of the appliance. For more information, see Creating a Login Banner.
2. Enter the default username and password (admin and infoblox) on the Grid Manager login screen, and then click
Login or press ENTER. For more information, see Logging on to the NIOS UI.
3. Read the Infoblox End-User License Agreement, and then click I Accept to proceed.
4. Read about the Infoblox Customer Experience Improvement Program and choose whether to participate (opt in)
or not participate (opt out) in the program. By default, participation is enabled. If you want to opt out of the
program, select To Opt-Out of the alert program, please click here. For more information about the program, see
Configuring the Customer Experience Improvement Program.
5. Click OK. Grid Manager may take a few seconds to load your user profile.
6. In the first screen of the NIOS Setup wizard, complete the following:
• Type of Network Connectivity: Select the type of network connectivity from the drop-down list:
• IPv4 and IPv6: Select this to configure a dual mode HA pair.
• IPv4: Select this to configure an IPv4 HA pair.
• IPv6: Select this to configure an IPv6 HA pair.
• Select Configuring an HA pair to configure an independent HA pair and click No to configure the first node
of an HA pair
7. Click Next and complete the following to configure network settings:
• HA Virtual IP address: Enter the VIP (virtual IP) address and its netmask.
• HA Pair Name: Enter a name for the HA pair. The default name is Infoblox. Ensure that you use the same
name as the first node.
• Shared Secret: Enter a text string that both nodes use as a shared secret to authenticate each other when
establishing a VPN tunnel. The default shared secret is a test. This must be the same shared secret that
you entered on the first appliance.
• Show Password: Click this to display the shared secret. Clear it to conceal the shared secret.
8. Click Next, and then complete the following to set properties for the second appliance:
• IP Address: Enter the IPv4 or IPv6 address of the appliance.
• Subnet Mask: Enter the subnet mask of the appliance.
Or
Prefix Length: Enter the prefix length if you have entered the IPv6 address in the IP Address field. The
prefix length ranges from 2 to 127.
• Gateway: Enter the IP address of the gateway of the subnet of the interface.
9. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
10. Click Finish.
The setup of the HA pair is complete. When you next make an HTTPS connection to the HA pair, use the VIP address.
The communication protocol for all the services in a dual mode (IPv4 and IPv6) HA appliance is the same protocol as the
one used for VRRP advertisements. For example, if you select IPv4 in the Send HA and Grid Communication Over field
on the first screen of the NIOS Setup wizard, then IPv4 is set as the communication protocol for all the services.
However, you can override the communication protocol for all the services in a dual mode HA pair. For information, see
Changing the Communication Protocol for a Dual Mode Independent Appliance.
The HA pair consists of two appliances (nodes). The IP addresses of the VIP (virtual IP) address of the HA pair and the
HA and LAN1 ports on each node are as follows:
HA Pair IP Addresses
VIP 10.1.4.10 (the address that the active node of the HA pair uses)
Node 1 Node 2
The virtual router ID number for the HA pair is 150. The ID number must be unique for this network segment. When you
create the corpxyz.com zone on the HA pair, you import DNS data from the legacy server at 10.1.4.11.
Node 1
Using the LCD or console port on one of the appliances, enter the following information:
• IP Address: 10.1.4.6 (for the LAN1 port)
• Netmask: 255.255.255.0
• Gateway: 10.1.4.1
Node 2
Using the LCD or console port on the other appliance, enter the following information:
• IP Address: 10.1.4.8 (for the LAN1 port)
• Netmask: 255.255.255.0
• Gateway: 10.1.4.1
After you confirm your network settings, the Infoblox GUI application automatically restarts.
Node 1
1. Open an Internet browser window and enter https://10.1.4.6.
2. Accept the certificate when prompted. Several certificate warnings may appear during the login process. This is
normal because the preloaded certificate is self-signed and has the hostname www.infoblox.com, which does not
match the destination IP address you entered in step 1. To stop the warning messages from occurring each time
you log in to Grid Manager, you can generate a new self-signed certificate or import a third-party certificate with a
common name that matches the FQDN (fully-qualified domain name) of the appliance. This is a very simple
process. For information about certificates, see Creating a Login Banner.
3. Enter the default username and password (admin and infoblox) on the Grid Manager login page, and then click
Login or press Enter. For information, see Logging on to the NIOS UI.
4. Read the Infoblox End-User License Agreement, and then click I Accept to proceed.
5. Read about the Infoblox Customer Experience Improvement Program and choose whether to participate (opt in)
or not participate (opt out) in the program. By default, participation is enabled. If you want to opt out of the
program, select To Opt-Out of the alert program, please click here. For more information about the program, see
Configuring the Customer Experience Improvement Program.
6. Click OK. Grid Manager may take a few seconds to load your user profile.
7. In the first screen of the NIOS Setup wizard, complete the following:
• Type of Network Connectivity: Select IPv4 as the communication protocol from the drop-down list.
• Select Configuring an HA pair and click Yes to configure the first appliance.
• Send HA and Grid Communication over: Select IPv4 from the drop-down list for VRRP advertisements.
8. In the NIOS Startup wizard, select Configuring an HA pair. Click Yes to configure the first appliance.
9. Click Next and complete the following to configure network settings:
• Host Name: Enter ns3.corpxyz.com.
• HA Pair Name: Use the default name Infoblox.
• Shared Secret: Enter 37eeT1d.
10. Click Next and complete the following to set properties for the first node:
• Virtual Router ID: Enter 150.
• Required Ports and Addresses: In the table, click the empty fields and enter the following information for
each corresponding interface in the table:
• VIP (IPv4): 10.1.4.10
• Node 1 HA (IPv4): 10.1.4.7
Note
Some fields are prepopulated by Grid Manager based on the existing configuration of the
appliance. All fields are required.
11. Click Next and complete the following to set admin password:
• Would you like to set admin password?: Click No.
12. Click Next and complete the following to configure time settings:
• Time Zone: Select UMT – 8:00 Pacific Time (US and Canada), Tijuana from the drop-down list.
• Would you like to enable NTP?: Select Yes to synchronize the time with external NTP servers, and then
click the Add icon. Grid Manager adds a row to the NTP Server table. Click the row and enter 10.120.3.10
in the NTP Server field.
13. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
14. Click Finish.
Node 2
1. From the System tab, select the System Manager tab, and then click System Properties -> Setup Wizard from the
Toolbar.
2. In the first screen of the NIOS Setup wizard, complete the following:
• Type of Network Connectivity: Select IPv4 as the communication protocol from the drop-down list.
• Select Configuring an HA pair and click Yes for configuring node 2 of the HA pair.
3. In the NIOS Startup wizard, select Configuring an HA pair to configure an independent HA pair. Click No for
configuring node 2 of the HA pair.
4. Click Next, and then complete the following to configure network settings:
• HA Virtual IP address: Enter 10.1.4.10.
• HA Pair Name: Use the default name Infoblox.
• Shared Secret: Enter 37eeT1d.
• Show Password: Click this to display the shared secret.
5. Click Next, and then complete the following to set properties for the second appliance:
• IP Address: Enter 10.1.4.8.
• Subnet Mask: Enter 255.255.255.0.
• Gateway: Enter 10.1.4.1.
6. Click Next to view the summary of the configuration. Review the information and verify that it is correct. You can
change the information you entered by clicking Previous to go back to a previous step.
7. Click Finish.
The setup of the HA pair is complete. From now on, when you make an HTTPS connection to the HA pair, use the VIP
address 10.1.4.10.
Networks
You can create all the subnetworks individually (which in this example are 10.1.1.0/24, 10.1.2.0/24, 10.1.4.0/24, and
10.1.5.0/24), or you can create a parent network (10.1.0.0/16) that encompasses all the subnetworks and then use the
Infoblox split network feature to create the individual subnetworks automatically. The split network feature accomplishes
this by using the IP addresses that exist in the forward-mapping zones to determine which subnets it needs to create.
This example uses the split network feature. For information about creating networks, see Configuring IPv4 Networks.
1. From the Data Management tab, select the IPAM tab, and then click Add -> Add IPv4 Network from the Toolbar.
2. In the Add Network wizard, complete the following:
• Address: 10.1.0.0
• Netmask: Use the netmask slider to select the /16 (255.255.0.0) netmask.
• Click Next to select a server. Click the Add icon. Grid Manager displays ns3.corpxyz.com in the table.
• Click Save & Close.
• On the IPAM tab, select the 10.1.0.0/16 checkbox, and then select Split from the Toolbar.
• In the Split Network dialog box, complete the following:
• Subnetworks: Move the slider to 24.
• Immediately Add: Select Only networks with ranges and fixed addresses.
• Automatically create reverse-mapping zones: Select this checkbox.
• Click OK.
The appliance creates the following 24-bit subnets for the imported Infoblox hosts:
• 10.1.1.0/24
• 10.1.2.0/24
• 10.1.4.0/24
• 10.1.5.0/24
• From the IPAM tab, select the 10.1.1.0/24 checkbox, and then click the Edit icon.
• In the DHCP Network editor, enter information on the following tabs:
• General: Comment: MGT
• Server Assignment: Add ns3.corpxyz.com as a server
• Click Save & Close.
• To modify the other networks, repeat steps #8 – 10 for each network and use the following information:
• 10.1.2.0/24 Network:
• Comment: Dev
• Server Assignment: ns3.corpxyz.com
• 10.1.4.0/24 Network:
• Comment: Server
DHCP Ranges
1. On the Data Management tab, select the DHCP tab -> Networks tab -> 10.1.1.0/24, and then click Add -> DHCP
Range from the Toolbar.
2. In the Add Range wizard, complete the following:
Start: 10.1.1.10
End: 10.1.1.50
3. Click Next, and then select Server. Grid Manager displays ns3.corpxyz.com as the assigned member.
4. Click Save & Close.
5. In the Networks tab, click 10.1.2.0/24, and then click Add -> DHCP Range from the Toolbar.
6. In the Add Range wizard, complete the following:
Start: 10.1.2.10
End: 10.1.2.50
7. Click Next, and then select Server. Grid Manager displays ns3.corpxyz.com as the assigned member.
8. Click Save & Close.
Infoblox Hosts
Defining both a MAC and IP address for an Infoblox host definition creates a DHCP host entry—like a fixed address—
that you can manage through the host object. To add a MAC address to each host record that the appliance created
when you imported forward—and reverse—mapping zone records:
1. On the Data Management tab, select the IPAM tab -> 10.1.1.0/24 -> 10.1.1.2.
2. In the Related Objects tab, select the checkbox of the host record, and then click the Edit icon.
3. In the Host Record editor, click the MAC Address field, and then enter the following:
• MAC Address: 00:00:00:aa:aa:aa
4. Click Save & Close.
5. Follow steps 1 – 4 to modify hosts with the following information:
• printer2
• IP Address: 10.1.2.2
• MAC Address: 00:00:00:bb:bb:bb
• storage1
• IP Address: 10.1.4.2
• MAC Address: 00:00:00:dd:dd:dd
• storage2
• IP Address: 10.1.4.3
• MAC Address: 00:00:00:ee:ee:ee
• proxymail
• IP Address: 10.1.4.4
• AC Address: 00:00:00:ff:ff:ff
• proxyweb
• IP Address: 10.1.4.5
• MAC Address: 00:00:00:11:11:11
• www
• IP Address: 10.1.5.5
• MAC Address: 00:00:00:55:55:55
• mail
• IP Address: 10.1.5.6
• MAC Address: 00:00:00:66:66:66
• ftp
• IP Address: 10.1.5.7
• MAC Address: 00:00:00:77:77:77
2. After editing the named.conf file, restart DNS service for the change to take effect.
Firewall
For example, enter the following commands on a Juniper firewall running ScreenOS 4.x or later:
DNS Forwarding
set interface ethernet1 mip 1.1.1.8 host 10.1.4.10
NTP
set policy from dmz to untrust ns1 ntp_server ntp permit
Router
For example, enter the following commands on a Cisco router running IOS for release 12.x or later:
ip helper-address 10.1.4.10
Note
To minimize the chance of duplicate IP address assignments during the transition from the legacy DHCP server
to the appliance, shorten all lease times to a one-hour length in advance of the DHCP server switch. Then,
when you take the legacy DHCP server offline, the DHCP clients quickly move to the new server when their
lease renewal efforts fail, and they broadcast DHCPDISCOVER messages. To determine how far in advance
By changing the lease length this far in advance, you can be sure that all DHCP leases will be one-hour leases
at the time of the switch-over. If the longest lease length is longer—such as five days—and you want to avoid
the increased amount of traffic caused by more frequent lease renewals over a six-day period, you can also
employ a stepped approach: Six days before the switch-over, change the lease lengths to one-day leases.
Then two days before the switch-over, change them to one-hour leases.
1. Open an Internet browser window, enter https://10.1.4.10, and then log in to the appliance using the username
admin and password SnD34n534.
2. From the Data Management tab, select the DHCP tab, and then click Start from the Toolbar.
3. In the Start Member DHCP Service dialog box, click Yes. The HA pair is ready to provide DHCP service to the
network.
4. Take the legacy DHCP server at 10.1.4.11 offline.
When the DHCP clients are unable to renew their leases from the legacy DHCP server, they broadcast
DHCPDISCOVER messages to which the new DHCP server responds.
Logs
The following list has some useful information:
• Logs, as described in Monitoring the Appliance.
• Audit Log – Contains administrator-initiated events.
• System Log – Contains events related to hardware and software operations.
• DNS statistics, as described in Configuring DNS Services.
• DNS Configuration – Contains DNS server settings for the Infoblox DNS server.
• Zone Statistics – Contains the results of all DNS queries per zone.
• DHCP information, as described in Configuring DHCP Properties.
• DHCP Configuration – Contains DHCP server settings and network, DHCP range, and host settings for
the Infoblox DHCP server.
Independent HA Pair
1. Make an HTTPS connection to the VIP address of the HA pair, log in, and check the status of both nodes.
2. From the Dashboard, check the appliance status in the SystemStatus widget. For information, see Member
Status (System Status).
• If the Status icon is green, both nodes have connectivity with each other and are operating properly.
• If the Status icon is yellow, the two nodes are in the process of forming an HA pair.
• If the Status icon is red, the passive node is offline or there is a problem. To determine what it is, look at the
system log file by selecting the Administration tab -> Logs tab -> Syslog. You can also gather information from the
System tab -> SystemManager tab.
Related topic
Cloud Network Automation
Note
Unlike standard WAPI requests, all cloud API related events are logged to the NIOS syslog instead of the NIOS
audit log.
Licensing Requirements
To enable Cloud Network Automation, you must install valid licenses on the Grid Master and Cloud Platform Appliance
members. Depending on your deployment scenarios, you can take advantage of Elastic Scaling to automatically deploy
virtual cloud appliances, either inside or outside your CMP.
The following valid licenses are part of the Cloud Network Automation solution:
• Cloud Network Automation license on the Grid Master and Grid Master Candidate
• Cloud Platform license on the Cloud Platform AppliancesThe license you install on the Grid Master enables the
Cloud user interface functions in Grid Manager and Tenant permissions.
The license you install on the Cloud Platform Appliance enables the cloud API service on the Cloud Platform Appliance.
Note that it is possible to use the Cloud Network Automation solution only with the Cloud Network Automation license or
with one or more Cloud Platform Appliances. In the case when only the Cloud Network Automation license is installed on
the Grid Master, all cloud API requests are sent to the Grid Master instead of to individual Grid members. Creation of
cloud objects through cloud API requests is visible in the Cloud tab of Grid Manager on the Grid Master.
When Cloud Platform Appliances are used without the Cloud Network Automation license, cloud API requests are sent
either to the Cloud Platform Appliances or to the Grid Master. However, the Cloud tab in Grid Manager is not available on
the Grid Master for viewing cloud objects created through cloud API requests.
You can also use the CLI command set temp_license to generate and install temporary licenses. This provides licensed
features and functionality for the interim, while you wait for your permanent licenses to arrive. For information about how
to install a temporary license, see Adding Temporary Licenses. Note that the temporary license is only effective on the
Grid Master, not the Grid Master Candidate.
For an HA pair, ensure that you use the same appliance models for both nodes and install the Cloud Platform license on
both nodes as well. For information about supported models, see Supported Cloud Platform Appliance Models. If a
Licensing Configurations
Depending on your Grid configuration and how you want to deploy Cloud Network Automation, Infoblox supports the
following licensing configurations. For information about cloud licenses and how to install them, see Licensing
Requirements.
• In an Infoblox Grid, the Grid Master has the Cloud Network Automation license installed and the Cloud Platform
Appliance has the Cloud Platform license installed: The Grid Master can process both regular RESTful API and
cloud API requests and the Cloud Platform Appliance can process cloud API requests. With the Cloud Platform
license installed, cloud API requests can be proxied among the Grid Master and Cloud Network Appliances based
on the delegation authority of the referenced objects. You can also manage the cloud API service and cloud
objects through the Cloud tab in Grid Manager
• In an Infoblox Grid, the Grid Master does not have the Cloud Network Automation license installed but the Cloud
Platform Appliance has the Cloud Platform license installed: The Grid Master can process both regular RESTful
API and cloud API requests and the Cloud Platform Appliance can process cloud API requests. With the Cloud
Platform license installed, cloud API requests can be proxied among the Grid Master and Cloud Network
Appliances based on the authority delegation of the referenced objects. Without the Cloud Network Automation
license however, only objects whose authority has been delegated to Cloud Platform Appliances can be managed
through Grid Manager. You will not have visibility of cloud objects, such as tenant information, through Grid
Manager because the Cloud user interface function (the Cloud tab) is not available without the Cloud Network
Automation license. You may manage cloud objects and their respective data through cloud API requests.
• In an Infoblox Grid with other Grid members but without Cloud Platform Appliances, the Grid Master has the
Cloud Network Automation license installed: The Grid Master can process both regular RESTful API and cloud
API requests. You can also manage cloud objects through the Cloud tab in Grid Manager.
• Standalone Grid Master with the Cloud Network Automation license installed: The appliance can process both
regular RESTful API and cloud API requests. You can also manage the cloud API service and cloud objects
through the Cloud tab in Grid Manager.
• Standalone Grid Master without the Cloud Network Automation license installed: The appliance can process only
regular RESTful API requests, but not cloud API requests. You cannot manage the cloud API service nor cloud
objects through Grid Manager because the Cloud user interface function (the Cloud tab) is not available.
Administrative Permissions
You must define admin users and their permissions in the admin group and assign specific roles to it before you can use
these admin users to send cloud API requests. You can also define object permissions to specific admin groups or admin
users so they can manage specific objects through cloud API requests. For more information, see About Admin Accounts
and About Admin Groups.
Note
When you deploy Cloud Network Automation, the cloud-api-only is created automatically. You cannot delete this
admin group.
Depending on where a cloud API request is sent and whether the scope of delegation for an object is explicit or implicit,
permissions configured for the admin user and object may or may not apply. In addition, depending on the objects
referenced in cloud API requests, specific restrictions may apply. For supported objects and their restrictions, see
Supported Cloud API Objects.
For cloud API requests, admin permissions are applied based on the delegation status of the objects referenced in the
requests. If an object is not delegated (owned by the Grid Master) and the cloud API request is sent directly to the Grid
Master or proxied to the Grid Master, all applicable admin and object permissions apply. On the other hand, if authority
for an object referenced in a cloud API request is explicitly delegated to a Cloud Platform Appliance and the request is
sent to this appliance, the admin user has full permission for this object within the scope of delegation. In this case,
specific permissions configured for the admin user and the referenced object are ignored. For more information about
admin and object permissions, see About Administrative Permissions.
It is important to note that once you delegate authority of an object to the Cloud Platform Appliance, specific admin and
object permissions are not enforced. Therefore, if you do not want certain objects to be created or modified through a
cloud API request, do not delegate the authority of these objects and their parent objects to a Cloud Platform Appliance.
For example, if you do not want host records to be created through cloud API requests, do not delegate the authority of
the relevant networks, zones, or both to the Cloud Platform Appliance. On the other hand, if you want the ability to restrict
permissions for specific objects referenced in cloud API updates, you can create different admin groups or admin users
Configuration Example
If you want to restrict the creation and modification of records for networks 10.10.10.0/24 and 10.10.20.0/24 through
cloud API updates, do the following:
1. Create two admin users APIUser1 and APIUser2 in an admin group.
2. Delegate the authority of network 10.10.10.0/24 to Cloud Platform Appliance 1 (CP1) and 10.10.20.0/24 to Cloud
Platform Appliance 2 (CP2).
3. On CPI, add APIUser1 and on CP2, add APIUser2 to the list of administrators that can send cloud API requests,
as described in Configuring Grid and Member Cloud API Properties.
Now when you use APIUser1 to send cloud API requests, you can add and modify records for network 10.10.10.0/24, but
you cannot do so for network 10.10.20.0/24. Conversely, you can add and modify records for network 10.10.20.0/24 only
when you use APIUser2.
Note
When you deploy Cloud Network Automation, the cloud-api-only is created automatically. You cannot delete this
admin group.
Depending on where a cloud API request is sent and whether the scope of delegation for an object is explicit or implicit,
permissions configured for the admin user and object may or may not apply. In addition, depending on the objects
referenced in cloud API requests, specific restrictions may apply. For supported objects and their restrictions, see
Supported Cloud API Objects.
For cloud API requests, admin permissions are applied based on the delegation status of the objects referenced in the
requests. If an object is not delegated (owned by the Grid Master) and the cloud API request is sent directly to the Grid
Master or proxied to the Grid Master, all applicable admin and object permissions apply. On the other hand, if authority
for an object referenced in a cloud API request is explicitly delegated to a Cloud Platform Appliance and the request is
sent to this appliance, the admin user has full permission for this object within the scope of delegation. In this case,
specific permissions configured for the admin user and the referenced object are ignored. For more information about
admin and object permissions, see About Administrative Permissions.
It is important to note that once you delegate authority of an object to the Cloud Platform Appliance, specific admin and
object permissions are not enforced. Therefore, if you do not want certain objects to be created or modified through a
cloud API request, do not delegate the authority of these objects and their parent objects to a Cloud Platform Appliance.
For example, if you do not want host records to be created through cloud API requests, do not delegate the authority of
the relevant networks, zones, or both to the Cloud Platform Appliance. On the other hand, if you want the ability to restrict
permissions for specific objects referenced in cloud API updates, you can create different admin groups or admin users
that are authorized to make cloud API updates on respective Cloud Platform Appliances. The following example
illustrates this capability.
Configuration Example
If you want to restrict the creation and modification of records for networks 10.10.10.0/24 and 10.10.20.0/24 through
cloud API updates, do the following:
1. Create two admin users APIUser1 and APIUser2 in an admin group.
2. Delegate the authority of network 10.10.10.0/24 to Cloud Platform Appliance 1 (CP1) and 10.10.20.0/24 to Cloud
Platform Appliance 2 (CP2).
Note
Cloud Platform Appliances do not support auto-provisioning. Pre-provisioning is supported for DNS and DHCP
data. For information about pre-provisioning Cloud Platform Appliances, see Pre-
Provisioning NIOS and vNIOS Appliances.
vNIOS Appliance Storage (GB) # of CPU Cores Virtual CPU Core Frequency Memory Allocation
Note
For the cloud API service to function properly, configure your networks and firewalls accordingly to allow port
443 HTTPS connectivity between the cloud adapter and Cloud Platform Appliance, between the cloud adapter
and the Grid Master (if applicable), between the Grid Master and Cloud Platform members, and between each
Cloud Platform member.
If you are using the AWS API Proxy to send API requests, ensure that you understand how to set up and configure the
proxy. For detailed information, refer to the Infoblox Installation Guide for vNIOS for AWS.
When implementing Cloud Network Automation in AWS, you can use Elastic Scaling to allocate and deallocate dynamic
licenses and automatically spin up vNIOS Grid members and join them to the Grid. You can purchase and install NIOS
feature licenses in advance and store them in a license pool container on the Grid Master. You can then decide when
and how to automatically provision and configure vNIOS for AWS cloud virtual appliances. When you remove a vNIOS
cloud appliance, the licenses on this appliance are released and returned to the license pool and are available for the
next deployment.
Authentication and All cloud API requests are authenticated based on the Define admin user accounts that can be used to
categorization authentication sources. Once authenticated, the requests are send cloud API requests.
categorized as either a cloud API request or not. All
requests that specify user identity as users defined in admin For information, see Managing Admin Groups
groups with cloud API access are Managing Admin Groups and Admin Roles.
and Admin Roles categorized as cloud API requests.
Authorization All cloud API requests are subject to authorization based on Define ACLs on the Grid Master or Cloud
the ACLs (Access Control Lists) defined for the Grid or Cloud Platform Appliance.
Platform Appliance. You can control which admin accounts For information, see Configuring Grid and
can be used to send API requests. The ACLs can contain Member Cloud API Properties.
admin users in admin groups with cloud API access or
remote authenticated users.
Proxying Requests If a Cloud Platform Appliance is not authoritative for a cloud Ensure that HTTPS connectivity between each
API request, it proxies the request either to the authoritative Cloud Platform member and between each
Cloud Platform Appliance or to the Grid Master for Cloud Platform member and the Grid Master is
processing. Similarly, if an object has been delegated and functioning properly for proxying.
the API request is made to the Grid Master, the Grid Master For information, see Proxying Cloud API
proxies that request to the authoritative Cloud Platform Requests.
Appliance.
Validation NIOS performs a final validation on the cloud API request Define admin permissions for admin groups with
based on permissions configured for the admin users and cloud API access.
restrictions for the applicable objects. If the request is For information, see About Admin Groups.
processed within the scope of an explicit delegation, the
admin user is considered to have full permissions within the
scope, and any permission defined for admin groups with
cloud API access is ignored. Otherwise, the request is
subject to validation for all permissions defined for admin
groups with cloud API access.
Note
NIOS does not process cloud API requests that contain unsupported object types or any combination of
supported object types with unsupported methods and functions. Although you can use all the fields in a
supported object type, some restrictions may apply to supported values for some of these fields. For
restrictions, see the Comments field in the below Supported Cloud API Objects for Cloud API Service table for
the corresponding object.
Note
The cloud API service does not support scheduling and workflow approval requests. Objects deleted through a
cloud API request are not stored in the Recycle Bin, except for DNS zones and network views. For information
about the Recycle Bin, see Using the Recycle Bin .
Supported Object Cloud API Object Allowed Operations in cloud Authority Delegation and Required Extensible
Type API Requests Restrictions Attributes in cloud API
Requests (for creations
only)
Network View networkview Read, Create, Modify, Delete See Network Views for information Tenant ID
about authority delegation.
Cloud API Owned
CMP Type
IPv4 Network networkcontainer Read, Create, Modify, Delete Split network, join networks, and Tenant ID
Container RIR related operations are not
Function: supported. See IPv4 andIPv6 Cloud API Owned
next_available_network Networks and Network Containers CMP Type
for information about authority
delegation.
IPv6 Network ipv6networkcontai Read, Create, Modify, Delete Split network, join networks, and Tenant ID
Container ner RIR related operations are not
Function: supported. See IPv4 andIPv6 Cloud API Owned
next_available_network Networks and Network Containers CMP Type
for information about authority
delegation.
IPv4 Network network Read, Create, Modify, Delete Split network, join networks, and Tenant ID
RIR related operations are not
Function: next_available_ip supported. See IPv4 andIPv6 Cloud API Owned
Networks and Network Containers CMP Type
for information about authority
delegation.
IPv6 Network ipv6network Read, Create, Modify, Delete Split network, join networks, and Tenant ID
RIR related operations are not
Function: next_available_ip supported. See IPv4 andIPv6 Cloud API Owned
Networks and Network Containers CMP Type
for information about authority
delegation.
IPv4 DHCP Range range Read, Create, Modify, Delete See DHCP Ranges for information Tenant ID
about authority delegation.
Function: next_available_ip Cloud API Owned
CMP Type
IPv6 DHCP Range ipv6range Read, Create, Modify, Delete See DHCP Ranges for information Tenant ID
about authority delegation.
Function: next_available_ip Cloud API Owned
CMP Type
IPv4 Fixed Address fixedaddress Read, Create, Modify, Delete See IPv4 and IPv6 Fixed Tenant ID
(Reservation) Addresses for information about
Function: next_available_ip authority delegation. Cloud API Owned
IPv6 Fixed Address ipv6fixedaddress Read, Create, Modify, Delete See IPv4 and IPv6 Fixed Tenant ID
(Reservation) Addresses for information about
Function: next_available_ip authority delegation. Cloud API Owned
DNS View view Read, Modify See DNS Views for information Tenant ID
about authority delegation.
Cloud API Owned
CMP Type
DNS Zone zone_auth Read, Create, Modify, Delete See DNS Zones for information Tenant ID
about authority delegation.
Cloud API Owned
CMP Type
Host Record record:host Read, Create, Modify, Delete See Host Records for information Tenant ID
about authority delegation.
You can also create and delete Cloud API Owned
through Grid Manager. All
required Cloud EAs are CMP Type
automatically populated in the
GUI.
Resource Record record:a Read, Create, Modify, Delete See DNS Resource Records for Tenant ID
information about authority
Function: next_available_ip delegation. Cloud API Owned
CMP Type
record:aaaa Read, Create, Modify, Delete
Function: next_available_ip
Function: next_available_ip
Grid Member member Read only API requests calling for service N/A
restarts on a Grid member can be
Function: restartservices processed by the Cloud Platform
Appliance only if the member
requested is also the Cloud
Platform Appliance processing the
request.
Grid grid Read only All cloud API requests calling for N/A
service restarts are proxied to the
Function: restartservices Grid Master.
Extensible Attribute extensibleattribute Read only You can use cloud attributes as N/A
def source objects to obtain the next
available IP address or network.
When doing so, you must also
include the respective network
view for the object.
Note
Only cloud API requests can be proxied.
To ensure that the proxying mechanism functions properly, configure your systems to allow for the following
communication:
• Allow all HTTPS connectivity among the Cloud Platform Appliances as well as to the Grid Master based on your
organization's firewall requirements.
• Ensure that you use the VIP or the MGMT address if it is enabled (including that for the Grid Master) as the
destination IP for the HTTPS connectivity. Note that this is a per member setting.
• Grant appropriate permissions to admin groups with cloud API access to ensure that tasks for objects outside of
the delegation function properly on the Grid Master.
Adding a network within the delegated network view in the above example:
curl -H "Content-Type: application/json" -k1 -u cloud:infoblox -X POST https://10.0.0.2/wapi/
v2.0/network -d '{ "network": "20.0.0.0/24","network_view":"netwview1","extattrs": { "Tenant
ID":{"value": "1011"} ,"Cloud API Owned":{"value":"True"},"CMP Type":{"value":"vCO/vCAC"}}}'
Adding an A Record:
curl -H "Content-Type: application/json" -k1 -u cloud:infoblox -X POST https://10.0.0.2/wapi/
v2.0/record:a -d '{"name": "corp200.com", "ipv4addr":"20.0.0.2","view":
"default.netview1","extattrs": {"Tenant ID":{"value": "1011"} , "CMP Type":{"value":"vCO/
vCAC"},"Cloud API Owned": {"value":"True"},"VM ID":{"value":"12"}}}'
Adding a zone:
curl -H "Content-Type: application/json" -k1 -u cloud:infoblox -X POST https://10.0.0.2/wapi/
v2.0/zone_auth -d '{ "fqdn":"test.com","grid_primary": [{"name": "infoblox.localdomain",
"stealth": false},{"name": "corpxyz.com", "stealth": false}],"view":
"default.netview1","extattrs": { "Tenant ID":{"value": "1011"} , "CMP Type":{"value":"vCO/
cCAC"} ,"Cloud API Owned":{"value":"True"}}}'
Adding an MX Record:
curl -H "Content-Type: application/json" -k1 -u cloud:infoblox -X POST https://10.0.0.2/wapi/
v2.0/record:mx -d '{ "mail_exchanger": "abc.com","name":"def.corpxyz.com", "preference":
10,"view":"default.netview1","extattrs": { "Tenant ID":{"value": "1011"} , "CMP Type":
{"value":"vCO/vCAC"}, "Cloud API Owned":{"value":"False"},"VM ID":{"value":"230"}}}
Creating a Member:
curl -H "Content-Type: application/json" -k1 -u cloud:cloud -X POST https://10.40.240.88/wapi/
v2.2/member -d '{"platform": "VNIOS", "host_name": "test1.com", "vip_setting": {"address":
"1.1.1.1", "gateway": "1.1.0.2", "subnet_mask": "255.255.0.0"}}'
Getting a Member:
Undelegating a Network:
curl -H "Content-Type: application/json" -k1 -u cloud:cloud -X PUT https://10.40.240.88/wapi/
v2.2/network/ZG5zLm5ldHdvcmskMjEuMC4wLjAvOC8w:21.0.0.0/8/ default -d '{"cloud_info":
{"delegated_member": null }}'
Deleting a Member:
curl -H "Content-Type: application/json" -k1 -u cloud:cloud -X DELETE https://10.40.240.88/
wapi/v2.2/member/b25lLnZpcnR1YWxfbm9kZSQ3:test1.com
Creating Token for the Pre-Provisioned Member (note that only superuser can create a token; you must configure
superusers admin groups with cloud API access):
curl -H "Content-Type: application/json" -k1 -u cloud:cloud -X POST https://10.40.240.88/wapi/
v2.2/member/b25lLnZpcnR1YWxfbm9kZSQ3:test1.com?_function=create_token
Reading Token for the Pre-Provisioned Member (note that only superuser can create a token; you must configure
superusers admin groups with cloud API access):
curl -H "Content-Type: application/json" -k1 -u cloud:cloud -X POST https://10.40.240.88/wapi/
v2.2/member/b25lLnZpcnR1YWxfbm9kZSQ3:test1.com?_function=read_token
Note
You can delegate authority only to Cloud Platform Appliances, but not to other Grid members.
Objects that are in queue for scheduled executions or approvals are locked and cannot be delegated. Authority
delegation and reclaiming of authority are subject to approval and can be scheduled.
Network Views
Consider the authority delegation guidelines mentioned in the table below when you create, modify, or delete a network
view. See Sample Cloud API Requests for a sample cloud API request.
For information about how to create network views from the Grid Master, see Adding Network Views.
• You can delegate authority for • You can delete a network view • When you create a network
a network view to only one from the Grid Master only if it has view through a cloud API
Cloud Platform Appliance. not been delegated to any Cloud request, you must include the
• When you create a new Platform Appliance. following extensible attributes
network view, authority is • When you create a network view in the cloud API request:
automatically delegated to the on the Grid Master, it is shared Tenant ID, Cloud API Owned,
Cloud Platform Appliance that among all Grid members in the and CMP Type.
processes the request. Grid.
• To balance network views • You can delegate a network view
among multiple Cloud Platform from the Grid Master to a Cloud
Appliances in the Grid, ensure Platform Appliance only if the child
that you configure your cloud objects within the network view are
adapter accordingly. delegated to the same Cloud
• If you want to share a network Platform Appliance.
view among different Cloud • When you reclaim authority for a
Platform members, you must network view, any DNS zones in
manually provision it and its the network view remain assigned
child objects and delegate to their name servers, including the
them to the respective Cloud Cloud Platform Appliance that has
Platform members. lost authority over the network
view. In other words, the DNS zone
remains under the authority of that
Cloud Platform Appliance.
• You can delegate authority for a • You cannot create, modify, or • When you create a network or
network or network container to delete a network or network network container through a
only one Cloud Platform Appliance, container on the Grid Master if cloud API request, you must
but you can delegate authority of the object has been delegated include the following extensible
multiple networks and network to a Cloud Platform Appliance. attributes in the request: Tenant
containers to the same Cloud • You can create a network or ID, Cloud API Owned, and CMP
Platform Appliance. network container and Type.
• When you create a new network or delegate it to a Cloud Platform • If a network is explicitly
network container through a cloud Appliance using a network delegated (not through
API request, authority is template. inheritance), you can convert a
automatically delegated to the • You can delegate a network or network to a network container
primary Cloud Platform Appliance network container to a Cloud only if the size of the network
that processes the request. Platform Appliance only if the remains the same; the network
• When you create a network using a child objects within the delegation is transferred to the
network template, you must network or network container network container.
provide the name of the template are delegated to the same • The Cloud Platform Appliance
and reference it in the cloud API Cloud Platform Appliance. does not support split network,
request. • You cannot perform a john networks, and RIR related
• Delegation for a network or recursive deletion of a network operations.
network container (except for container if one of the child
unmanaged networks) can be done objects in the container has
through explicit delegation or been delegated.
inheritance from the parent object. • DHCP utilization usage for a
• You cannot delete networks and network or network container
network containers using cloud API is only updated on the Grid
requests if they have already been Master.
explicitly delegated. You must first • Discovered IP addresses that
un-delegate them before deleting are within a delegated network
them. are created on the Grid Master
• Networks and network containers and replicated to the Cloud
associated with a DNS zone Platform Appliance that is
cannot be delegated. relevant to the IP addresses.
• You can delegate a network or
network container if all the
following are true:
• It has not been delegated to
a Cloud Platform Appliance.
• It is not part of a network or
network container that has
been delegated to a Cloud
Platform Appliance.
• It does not contain any
networks or DHCP ranges
that are delegated to a
different Cloud Platform
Appliance.
• It does not belong to a
delegated network view.
• All discovery related attributes for a
network or network container return
the default values.
DHCP Ranges
Consider the authority delegation guidelines mentioned in the table below when you create, modify, or delete a DHCP
range. See Sample Cloud API Requests for a sample cloud API request.
For information about how to create IPv4 and IPv6 ranges, see Adding IPv4 Address Ranges and Modifying IPv6
Address Ranges.
For information about how to create IPv4 and IPv6 ranges using range templates, see Adding IPv4 Range Templates
and Adding IPv6 Range Templates.
Authority Delegation for DHCP Ranges
• You can delegate authority for a DHCP range to • You cannot create, modify, • When you create a
only one Cloud Platform Appliance, but you can or delete a DHCP range DHCP range through
delegate authority for multiple DHCP ranges to the on the Grid Master if it has a cloud API request,
same Cloud Platform Appliance. been delegated to a Cloud you must include the
• When you create a new DHCP range, authority is Platform Appliance. following extensible
automatically delegated to the Cloud Platform • You can create a DHCP attributes in the
Appliance that processes the request or to the Grid range and delegate it to a request: Tenant ID,
Master if the Grid Master processes the request. Cloud Platform Appliance Cloud API Owned,
• When you create a DHCP range using a range using a range template. and CMP Type.
template, you must know the name of the template • You can increase the size
and reference it in the cloud API request. of a DHCP range that has
• You can delegate authority for reserved ranges in been explicitly delegated
a Microsoft synchronized network if: to a Cloud Platform
• It is not included in any exclusions. Appliance. The increased
• It does not conflict with another reserved size is available for use by
range. the Cloud Platform
You can manage these range addresses through a Appliance after replication.
cloud adapter, such as the IPAM Plug-In for
VMware.
• Delegation for a DHCP range can be done through
explicit delegation or inheritance from the parent
object. You cannot override inherited delegation.
• Note that you cannot delete DHCP ranges using
cloud API requests if they have already been
explicitly delegated. You must first un-delegate
them before deleting them. However, if the
delegation is inherited, you can delete the objects
through a cloud API request.
• You can delegate a DHCP range to a Cloud
Platform Appliance if all the following are true:
• It has not been delegated to a Cloud
Platform Appliance.
• It is not part of a delegated network or
network container in the same network
view.
• It does not belong to a delegated network
view.
• It is a reserved range or a range that has
been assigned to a DHCP member that is
the same Cloud Platform Appliance to
which you want to delegate the range.
• You cannot delegate a DHCP range that has been
assigned to a failover association, nor can you
assign a DHCP range that has been delegated to
a failover association.
• Authority is delegated from the start address to the
end address, including exclusions. Note that the
exclusions can be used only to restrict IP
addresses generated by the next available IP
feature.
• All discovery related attributes for a DHCP range
return the default values.
DNS Views
Consider the following authority delegation guidelines when you create, modify, or delete a DNS view:
• You cannot explicitly delegate authority for a DNS view. The Cloud Platform Appliance automatically gains
authority over any DNS view that exists in the network view whose authority is delegated to that appliance.
• You cannot create or delete a DNS view from the Cloud Platform Appliance.
• Through a cloud API request, you can update DNS views defined in a network view that has been delegated to
the Cloud Platform Appliance.
• You cannot create, modify, or delete a DNS view in network views that have been delegated to a Cloud Platform
Appliance through a standard API request.
• You cannot delete a DNS view as long as it contains at least one DNS zone that has been delegated to a Cloud
Platform Appliance.
DNS Zones
Consider the following authority delegation guidelines mentioned in the table below when you create, modify, or delete a
DNS zone. See Sample Cloud API Requests for a sample cloud API request.
For information about how to create DNS zones, see Configuring Authoritative Zones.
• The Grid primary of a DNS zone • You cannot create, modify, • Only authority for authoritative
automatically gains authority for the or delete a DNS zone in a forward-mapping and reverse-
zone if the primary is a Cloud network view whose mapping zones can be
Platform Appliance. When there are authority has been delegated. You cannot delegate
multiple primaries configured for the delegated to a Cloud authority for forward zones, stub
zone, multiple delegations to these Platform Appliance. zones, and delegated zones
primaries are allowed as long as • You cannot assign a Cloud even though they may exist in a
they are Cloud Platform Appliances. Platform Appliance as the delegated network view.
• You cannot assign both a Microsoft Grid primary for a zone that • When you create a DNS zone
server and a Grid member as is locked or disabled. using a cloud API request, you
primaries at the same time, although • You can modify extensible must include the following
you can assign a Microsoft server as attributes of any DNS zone extensible attributes in the
the Grid primary and a Cloud whose authority has been request: Tenant ID, Cloud API
Platform Appliance as the Grid delegated from the Grid Owned, and CMP Type.
secondary. This allows the Microsoft Master.
server to serve changes sent from
the cloud adapter.
• All resource records in a DNS zone
inherit authority delegation from the
zone. However, you cannot modify
the NS record through a cloud API
request.
• You can modify all the fields for a
zone whose authority has been
explicitly delegated.
• The cloud member to which authority
for a network view is delegated
automatically gains authority for
authoritative zones defined in that
network view. This Cloud Platform
Appliance is the only cloud member
that can be the Grid primary for the
zones defined in this network view.
The Grid Master does not have
authority for any zone in this network
view unless it is assigned as a Grid
primary.
• The Cloud Platform Appliance can
create, modify, and delete a DNS
zone in any DNS view defined in a
network view whose authority has
been delegated to that cloud
member.
• The Cloud Platform Appliance that is
authoritative for a DNS zone can
perform changes to the assigned
Grid primaries, Grid secondaries,
and external servers assigned to the
zone as long as the Cloud Platform
Appliance remains a Grid primary.
But it cannot create, modify, or
delete the NS record.
• Authority delegation for resource • You cannot create, modify, or • When you create a resource
records (A, AAAA, CNAME, PTR, delete a resource record if it is record through a cloud API
MX, SRV, TXT, and NAPTR) is in a network view whose request, you must include the
inherited from their parent zones. authority has been delegated following extensible attributes in
You can delegate authority for to a Cloud Platform Appliance. the request: Tenant ID, Cloud
these records by delegating API Owned, and CMP Type.
authority for their respective parent
zones.
• All resource records in a DNS zone
inherit authority delegation from
their parent zones. However, you
cannot modify the NS record
through a cloud API request.
• If the Cloud Platform Appliance is a
Grid primary for a zone, requests
that include a supported record is
processed locally by the Cloud
Platform Appliance. Otherwise, the
request is proxied to the Cloud
Platform Appliance that is assigned
as the only Grid primary for the
zone.
• If the DNS resource records belong
to a zone that is served only by
Cloud Platform Appliances,
authority for these records are
considered delegated. You must
create, modify, or delete these
records on one of these Cloud
Platform Appliances.
Host Records
Consider the following authority delegation guidelines mentioned in the table below when you create, modify, or delete a
host record. See Sample Cloud API Requests for a sample cloud API request.
Authority Delegation for Host Records
• Authority delegation for a host record • IP addresses defined in the • When you create a host record
is inherited from both the DNS and host record that is enabled through a cloud API request,
DHCP portions of the record. For DHCP follow the same rules you must include the following
DNS, you can delegate authority for for a fixed address. See extensible attributes in the
all DNS zones for which the host IPv4and IPv6 Fixed request: Tenant ID, Cloud API
record is defined. For DHCP, you can Addresses for more Owned, and CMP Type.
delegate authority for the parent information.
network view, network container, • Names or aliases defined in
network, or DHCP range defined for the host record follow the
the host record. same rules set for resource
• You can create, modify, or delete a records. See DNS
host record or a host IP address Resource Records for more
whose authority is delegated to a information.
Cloud Platform Appliance through
Grid Manager. Note that when you
create a host record, you must enable
it for DNS within the delegated
network view. Otherwise, you will not
be able to save the host record.
• The Cloud Platform Appliance can
process a cloud API request that
includes a host record only if it has
gained authority for both DNS and
DHCP portions of the host record, as
follows:
• All IP addresses enabled for
DHCP within one or more
delegation scopes are
delegated to the same Cloud
Platform Appliance.
• All DNS records defined for
one or more DNS zones have
the same Cloud Platform
Appliance assigned as the
Grid primary.
Application Type String Indicates the application type, such as Web, DB, or CRM.
Cloud API Owned List [True, False] This is read-only. Defines whether an object was created
by the cloud adapter.
Cloud Region String A region name for an VPC object. Example: us-west-1.
CMP Type String This is read-only. Defines the type of CMP, such as
VMware or OpenStack.
Is External List [True, False] This is read-only. Limited to the object type Network and
Network Container.
Is Shared List [True, False] This is read-only. Limited to the object type Network and
Network Container.
IP Type List [Private, Public, Fixed, Floating, Elastic] This is read-only. Type of IP address.
Location String
Port Attached Device - Device ID String Device ID for associated device, such as OpenStack or
equivalent, in other CMPs.
Port Attached Device - Device Owner String Device name for associated device, such as OpenStack
or equivalent, in other CMPs (e.g. compute:nova,
network:dhcp, or netowrk:router_interface).
Port Name String Port name for associated device, such as OpenStack or
equivalent, in other CMPs.
Segmentation ID String
Subnet ID String
Tenant ID String This is read-only. The unique ID for the tenant object.
vDC String
You can modify some of the properties for the cloud extensible attributes, except for the read-only attributes. By default,
all cloud extensible attributes are configured to allow Read/Write access for the Cloud Platform Appliances. You can
change this configuration to read-only so the Cloud Platform Appliances can only access the attribute values, but not
modify them. Note that when you reference modification for a read-only attribute in a cloud API request, the Cloud
Platform Appliance returns an error because it cannot modify the attribute value. For information about how to configure
extensible attributes, see About Extensible Attributes.
Note
An upgrade could fail if the name of an existing extensible attribute matches the name of any of the cloud
extensible attribute for a different object type. You must define values for all required cloud extensible attributes
in a cloud API request.
Interface Virtual Interface Managed private IP address: Any DNS record, fixed address, or
reservation associated with that IP address.
Interface (tags are the same for private Public IP address (Public IP Managed public IP address: Any DNS record, fixed address, or reservation
IP address and public IP address of the address has specific tags in associated with the IP address.
same interface) Azure)
Note
NIOS generates alert messages about tags that are translated and tags that are skipped due to missed
extensible attributes or incorrect extensible attributes types will be displayed in the syslog and infoblox.log file.
Note
The vDiscovery for the OpenStack management platform discovers all tenants if the OpenStack user has the
admin role in at least one tenant.
Note: Since a VM can be defined by objects from different network views, the same IP address may appear multiple
times if it has been defined in more than one network view. A VM object is a read-only abstract object, therefore you
cannot create, modify, or delete it.
Warning
Setting a proper stratum value is important for time and service synchronization among Grid members. Unless
a special configuration is required, use the default values. In case you configure the values, keep the
configuration as simple as possible.
The NIOS NTP service is configured with external NTP servers, and the NTP service stratum is derived from these
external NTP servers. Sometimes, in the absence of the external NTP servers, NIOS Grid members, through the
disconnected NTP server deliver the NTP service to the clients. Depending on your admin permissions, you need to
configure the NTP service stratum values for Grid Manager and Grid members to facilitate the disconnected NTP service.
The disconnected NTP service uses the service stratum values to help Grid Manager or members act as NTP servers.
Once the external NTP server is accessible, the Grid connects to the external NTP server and receives the stratum
values from the external NTP server. When the NTP service is in a disconnected state, it is referred to as the orphan
mode.
You can configure stratum values for Grid Manager and Grid member at the Grid level, and for individual member at Grid
member level using Grid Manager or CLI commands. For information on how to configure orphan mode stratum values,
see Defining NTP Orphan Mode and for information about admin permissions, see About Administrative Permissions.
Note
The Grid member value configuration takes precedence over Grid Manager value configuration.
Administrative Permissions
You can configure a named ACL at the Grid level and override it at the member and object level. Superusers and limited-
access users with Read/Write permission to All Named ACLs can create, modify, and delete named ACLs. Users with
Read-only permission to All Named ACLs can apply a named ACL to a supported object if they have Read/Write
permission to the respective object. Other users can only view named ACLs and their entries. For information about
admin permissions, see About Administrative Permissions.
DNS Zone Transfers (excludes zone Yes Yes Yes Yes Yes
transfers for Microsoft servers)*
Match Clients for DNS Views Yes Yes Yes Yes Yes
Match Destinations for DNS Views Yes Yes Yes Yes Yes
Note
* Zone transfers for Microsoft servers do not support named ACLs. However, you can still use individual ACEs
to configure access control. For more information about how to configure zone transfer settings for Microsoft
servers, see Setting Zone Properties. In addition, the DNSone 2.x TSIG key supports only the "Allow"
permission. You cannot change "Allow" to "Deny."
Note
If you disable access control or select None or Any for an operation, the appliance removes the previously
applied named ACL or the configured anonymous ACEs. To avoid losing your ACE configuration, Infoblox
recommends that you convert the ACEs to a named ACL.
For information about how to apply access control to each supported operation, see the following:
• DNS zone transfers, as described in Enabling Zone Transfers
• DNS queries, as described in Controlling DNS Queries
• Recursive queries, as described in Enabling Recursive Queries
• Dynamic DNS updates, as described in Configuring DNS Servers for DDNS
• AAAA filtering, as described in Controlling AAAA Records for IPv4 Clients
• Blackhole list, as described in Configuring a DNS Blackhole List
• Match clients list for DNS views, as described in Defining Match Clients Lists
• Match destinations for DNS views, as described in Defining a Match Destinations List
• DNS64 clients, DNS64 mapped IPv4 addresses, and DNS64 excluded IPv6 addresses, as described in Setting
DNS64 Group Properties
• File distribution services, as described in Configuring Access Control for File Distribution
• Grid Manager and API access, as described in Configuring Security Features
• NTP access control, as described in Defining NTP Access Control
• Syslog proxy access, as described in Configuring Syslog for Grid Members
Note
A Key name must be a valid domain name without any space and it cannot begin with
DHCP_UPDATER.
Note
The Order field in the table displays the position of each entry based on the order it is placed in
the list. You can modify this number to change the order of an ACE. You can also select the ACE
checkbox and use the up and down arrows next to the table to place the entry in the desired
position.
• Click Next to enter extensible attributes for the named ACL. For information, see About Extensible Attributes.
• Save the configuration.
Note
When you click the Validate icon in the Add Named ACL wizard or Named ACL editor, the appliance validates
all the entries in the named ACL, even if you have selected only one or a few entries in the wizard or editor.
Note
It is important that you manually validate each named ACL after a CSV import to ensure data and performance
integrity. The appliance does not automatically perform ACL validation.
Note
It may take a long time to validate a named ACL that contains a large number of ACEs.
Note
You cannot delete a named ACL that has been applied to an operation or is currently in use by another
operation.
Note
You cannot manually set the date and time if the NTP service is enabled.
To set the time and date for a Grid using the Grid Properties editor:
1. From the Grid tab, select the Grid Manager tab, expand the Toolbar and click Grid Properties -> Edit.
2. In the General tab of the Grid Properties editor, complete the following:
• Date: Click the calendar icon to select a date or enter the date in YYYY-MM-DD format.
• Time: Click the clock icon to select a time or enter the time in HH:MM:SS format. For afternoon and
evening hours, use the integers 13-24.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
Changing the date and time resets the application and terminates the management session.
Note
Changing the time zone does not reset the application nor does it terminate the management session.
Red The NTP service is not running properly. View the corresponding description for additional information.
Note
The NTP service supports both IPv4 and IPv6 networks.
Scenario Behavior
No authentication on both the NTP client and server The NTP client will synchronize with the server
Authentication on the NTP server, no authentication on the NTP client The NTP client will synchronize with the server
Authentication on both the NTP server and client The NTP client will synchronize with the server
No authentication on the NTP server, authentication on the client The NTP client will be out-of-synchronization with the server
NTP Client Administrator Obtaining Secret Key from NTP Server Administrator
Note
You can configure NIOS appliance as NTP client in either IPv4, IPv6, or dual mode (IPv4 and IPv6) network
environment.
When you enable a NIOS appliance to function as an NTP client, you must specify at least one NTP server with which
the appliance can synchronize its clock. Infoblox recommends that you specify multiple NTP servers that synchronize
their time with different reference clocks and that have different network paths. This increases stability and reduces risk in
case a server fails. For a list of public NTP servers, you can access www.ntp.org.
When you specify multiple NTP servers, the NTP daemon on the appliance determines the best source of time by
calculating round-trip time, network delay, and other factors that affect the accuracy of the time. NTP periodically polls the
servers and adjusts the time on the appliance until it matches the best source of time. If the difference between the
appliance and the server is less than five minutes, the appliance adjusts the time gradually until the clock time matches
the NTP server. If the difference in time is more than five minutes, the appliance immediately synchronizes its time to
match that of the NTP server.
To secure communications between a NIOS appliance and an NTP server, you can authenticate communications
between the appliance and the NTP server. When you configure authentication, you must obtain the key information from
the administrator of the NTP server and enter the key on the appliance. For information, see Authenticating NTP.
In a Grid, you can configure the Grid Master and Grid members to synchronize their clocks with external NTP servers.
When you enable the NTP service on the Grid, the Grid Master automatically functions as an NTP server to the Grid
members. A Grid member can synchronize its time with the Grid Master, an external NTP server, or another Grid
member. When Grid members synchronize their times with the Grid Master, the Grid Master and its members send NTP
Note
Grid member cannot act as an NTP server to the Grid Master.
Note
To prevent intruders from interfering with the time services on your network, you can
authenticate communications between a Grid member and an external NTP server, as well as
between a Grid member and external NTP clients. NTP communications within the Grid go
through an encrypted VPN tunnel, so you do not have to enable authentication between the Grid
Master and Grid members.
Authentication Key: Select a key that you previously entered from the drop-down list.
• Click Add to add the NTP server to the list or Cancel to cancel the operation. In the table, you can
configure some of the following settings:
• Preferred: Select this to mark an external NTP server as the preferred NTP server. You can select
only one server as the preferred NTP server. NIOS uses the responses from this preferred server
over responses from other external NTP servers. A response from a preferred server will be
discarded if it differs significantly from the responses of other servers. Infoblox recommends that
you select an NTP server that is known to be highly accurate as the preferred server, such as one
that has special time monitoring hardware. Note that this option is enabled only when you have
selected the checkbox Synchronize the Grid with these External NTP Servers.
• Server: Displays the FQDN or IP address of the NTP server that you added.
• Authentication: When you enable authentication, this column displays Yes. Otherwise, it displays
No.
• Key Number: Displays the authentication key that you have selected.
• BURST: Select this checkbox to configure the NTP client to send a burst of eight packets if the
external NTP server is reachable and a valid source of synchronization is available. The NTP
client transmits each packet at a regular interval of two seconds. After you add an NTP server and
save the configuration, the appliance will enable this option by default. When you deselect this
checkbox, the client sends a single packet only once to the server.
• IBURST: Select this checkbox to configure the NTP client to send a burst of eight packets if the
external NTP server is not reachable when the client sends the first packet to the server. The NTP
client transmits each packet at a regular interval of two seconds. After you add an NTP server and
save the configuration, the appliance will enable this option by default. When you deselect this
checkbox, the client sends a single packet only once to the server.
For information about adding NTP authentication keys, see Adding NTP Authentication Keys.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
To prevent intruders from interfering with the time services on your network, you can
authenticate communications between a Grid member and an external NTP server, as well as
between a Grid member and external NTP clients. NTP communications within the Grid go
through an encrypted VPN tunnel, so you do not have to enable authentication between the Grid
Master and Grid members.
Authentication Key: Select a key that you previously entered from the drop-down list. Note that you must
enter authentication keys at the Grid level when you configure a Grid Master or Grid member to use
external NTP servers.
• Click Add to add the NTP server to the list or Cancel to cancel the operation. In the table, click Override in
the table to override configurable settings. To inherit the same properties as the Grid, click Inherit.
• Preferred: Select this to mark an external NTP server as the preferred NTP server. You can select
only one server as the preferred NTP server. NIOS uses the responses from this preferred server
over responses from other external NTP servers. A response from a preferred server will be
discarded if it differs significantly from the responses of other servers. Infoblox recommends that
you select an NTP server that is known to be highly accurate as the preferred server, such as one
that has special time monitoring hardware. Note that this option is enabled only when you have
selected the checkbox Synchronize this Member with other NTP Servers.
• Server: Displays the FQDN or IP address of the NTP server that you added.
• Authentication: When you enable authentication, this column displays Yes. Otherwise, it displays
No.
• Key Number: Displays the authentication key that you have selected.
• BURST: Select this checkbox to configure the NTP client to send a burst of eight packets if the
external NTP server is reachable and a valid source of synchronization is available. The NTP
client transmits each packet at a regular interval of two seconds. After you add an NTP server and
save the configuration, the appliance will enable this option by default. When you deselect this
checkbox, the client sends a single packet only once to the server.
• IBURST: Select this checkbox to configure the NTP client to send a burst of eight packets if the
external NTP server is not reachable when the client sends the first packet to the server. The NTP
client transmits each packet at a regular interval of two seconds. After you add an NTP server and
save the configuration, the appliance will enable this option by default. When you deselect this
checkbox, the client sends a single packet only once to the server.
Note
NTP members inherit NTP properties from the Grid. Click Override in
the Member NTP Properties wizard to override configurable settings. To inherit the same
properties as the Grid, click Inherit.
For information about adding NTP authentication keys, see Adding NTP Authentication
Keys.
4. Save the configuration and click Restart if it appears at the top of the screen.
To specify which clients can access the NTP service of a NIOS appliance and from which clients a NIOS appliance can
accept ntpq queries, and to enable or disable KoD, complete the following:
1. Grid: From the Grid tab, select the Grid Manager tab, expand the Toolbar and click NTP -> NTP Grid Config.
Member: From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member checkbox. Expand the
Toolbar and click NTP -> NTP Member Config.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the Access Control tab of the Grid or Member NTP Properties editor, select one of the following to configure
NTP access control:
• None: Select this if you do not want to configure access control for NTP service. When you select None,
the appliance allows all clients to access the NTP service. This is selected by default.
• Use Named ACL for Time only: Select this and click Select Named ACL to select a named ACL that
contains only IPv4 addresses and networks. NTP queries do not support TSIG key based ACEs. When
you select this, the appliance allows clients that have the Allow permission in the named ACL to use its
NTP service. NTP queries from the named ACL entries specified here are denied. You can click Clear to
remove the selected named ACL and the appliance accepts ntpq queries from those NTP clients.
• Use Named ACL for Time + NTP Control (NTPQ): Select this and click Select Named ACL to select a
named ACL that contains only IPv4 addresses and networks. NTP queries do not support TSIG key based
ACEs. When you select this, the appliance allows clients that have the Allow permission in the named
ACL to use its NTP service, and for the appliance to accept ntpq queries from those clients as well. You
can click Clear to remove the selected named ACL.
• Use this set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the
following from the drop-down list. Depending on the item you select, Grid Manager either adds a row for
the selected item or expands the panel so you can specify additional information about the item you are
adding, as follows:
• IPv4 Address: Select this to add an IPv4 address. Click the Value field and enter the IPv4 address.
The default permission is Allow, which means that the appliance allows access to and from this
IPv4 client. You cannot change the default permission. In the Service field, select Time only to
allow this client for using the NTP service on the appliance; or select Time + NTP Control (NTPQ)
to also accept ntpq queries from this client.
• IPv4 Network: Select this to add an IPv4 network. Click the Value field and enter the IPv4 network.
The default permission is Allow, which means that the appliance allows access to and from this
IPv4 network. You cannot change the default permission. In the Service field, select Time only to
allow this network for using the NTP service on the appliance; or select Time + NTP Control
(NTPQ) to also accept ntpq queries from this network.
• IPv6 Address: Select this to add an IPv6 address. Click the Value field and enter the IPv6 address.
The default permission is Allow, which means that the appliance allows access to and from this
IPv6 client. You cannot change the default permission. In the Service field, select Time only to
allow this client for using the NTP service on the appliance; or select Time + NTP Control (NTPQ)
to also accept ntpq queries from this client.
• IPv6 Network: Select this to add an IPv6 network. Click the Value field and enter the IPv6 network.
The default permission is Allow, which means that the appliance allows access to and from this
IPv6 network. You cannot change the default permission. In the Service field, select Time only to
allow this network for using the NTP service on the appliance; or select Time + NTP Control
(NTPQ) to also accept ntpq queries from this network.
Note
• Unless a special configuration is required, use the default values. In case you configure the values,
keep the configuration as simple as possible.
• When you select the Use Default option for the stratum value of either the Grid Manager or the Grid
member, you will not be able to add or edit the stratum values.
• You can use the set ntp_stratum CLI command in maintenance mode to set the local NTP stratum
value for both the Grid Manager and member.
1. From the Grid tab, select the Grid Manager tab, expand the Toolbar and click NTP -> NTP Grid Config.
2. In the Orphan Mode tab of the Grid NTP editor, specify the following:
Monitoring NTP
When you enable the Grid to synchronize its time with external NTP servers, you can monitor the status of the NTP
service by checking the NTP status icons in the Member Services panel. To access the panel, from the Grid tab, select
the Grid Manager tab -> Members tab -> Grid_member checkbox, and then select the Manage Member Services icon in
the table toolbar of the Members tab.
The following are descriptions of the NTP status icons in the Members Services panel. The type of information that can
appear in the Description column corresponds to the SNMP trap messages. For information about the Infoblox SNMP
traps, see Configuring SNMP.
Yellow The NTP service is enabled, and the appliance is synchronizing its time.
Red The NTP service is enabled, but it is not running properly or is out of synchronization.
After you upgrade the Grid to 6.6.x or later, the color of the Grid status icon changes based on the following:
Note
Only superusers can configure extensible attributes.
You can use predefined extensible attributes or specify new ones for different objects. For more information on supported
object types and their corresponding fields for the extensible attributes, see Subscriber Record. The appliance provides
the following predefined extensible attributes that you can customize:
• Region
• Country
• State
• Site
• Building
• VLAN
• ReportingSite (Report Clustering)
• Parental-Control-Policy
• Proxy-All
• User-Name
• White-List
• Black-List
• Subscriber-Secure-Policy
• PC-Category-Policy
Note
Using the CSV import option, if you import DHCP network, fixed address or reservation address with Parental
control extensible attributes, then the subscriber records are not created.
Note
You can specify whether an extensible attribute is required or not only by selecting the Required
checkbox on the Administration > Extensible Attributes tab in Grid Manager. You cannot specify whether
an extensible attribute is required or not by using CSV or WAPI. For more information about extensible
attribute options, see Adding Extensible Attributes.
Warning
The Cloud Platform member is evicted from the Grid Master if you modify the extensible
attribute using Grid Manager.
5. Save the configuration and click Restart if it appears at the top of the screen.
Grid Manager adds the attribute to the Extensible Attributes tab in either the wizard or editor for the specified object
types.
Note
Infoblox recommends that you define values for mandatory extensible attributes using the Grid only and do not
use PAPI or RESTful API to define values.
Inherited The extensible attribute inherits its value from the parent. You cannot edit the value of an attribute
when the inheritance state is set to Inherited. You can change the state to Overridden and then
change the value of the attribute or change the state to Not Inherited to remove the inherited value.
Overridden The extensible attribute overrides the value inherited from the parent. You can change the state to
Inherited and restore the original inherited value or change the state to Not Inherited and remove the
inherited value.
Not Inherited The extensible attribute can inherit its value from the parent, but the attribute does not exist on the
descendant. You can change the state to Inherited and restore the original inherited value or change
the state to Overridden and change the value of the attribute.
Note that when the state of an inheritable extensible attribute is Not Inherited, the corresponding
attribute will not be added as a new extensible attribute for objects that are currently not inheriting this
extensible attribute.
No Parent The inheritance state is set to No Parent when an object has a parent, but the parent does not have
an extensible attribute or the parent's extensible attribute is set to Not Inherited.
No Change The extensible attributes of the selected objects do not have the same inheritance state for all
objects. This state allows you to retain the current state on the selected objects. Note that this state is
only seen in the Multi-object Extensible Attributes editor.
When you add an inheritable extensible attribute to an object, if there are descendants of this object the Descendant
Actions dialog box is displayed which will provide options for the descendants. Following is a summary of these options:
• Retain the original value of the attribute for all descendants.
• Inherit the extensible attribute and its value from the parent object.
• Inherit the extensible attribute and its value when it does not exist on descendants.
• If the extensible attribute does not exist on the descendant, do not add it.
• If you are deleting an inherited extensible attribute from a parent object you can retain or remove the extensible
attribute from the object's descendants.
To configure default descendant actions for inheritable extensible attributes:
1. From the Grid tab, select the Grid Manager tab, expand the Toolbar and click Grid Properties -> Edit.
2. In the Extensible Attribute Inheritance tab, complete the following:
When adding an extensible attribute that already exists on a descendant:
• Keep the descendant's existing value and change the inheritance state to Override: Select this if you want
to retain the existing extensible attribute values for all direct descendants, irrespective of the values you
define at the parent level. The inheritance state for all direct descendants will be set to Overridden. Note
that this is applicable only when you add a new extensible attribute to the parent object that already exists
on the descendant. If you modify the value of an existing extensible attribute that is already inherited by
the descendant, and select the above option in the Descendant Actions dialog box, then the new value
will be inherited by the descendant, but the inheritance state will remain Inherited. For example, consider
a network 10.0.0.0/16 that has an extensible attribute Site with the value SA (native). When you add
another network 10.0.0.0/24, extensible attribute Site inherits its value, SA, from the parent object. Now, if
you add network 10.0.0.0/8, assign extensible attribute Site and set its value to NY, then when you
choose this option, the value of Site will remain as SA, but the inheritance state will be changed to
Overridden for network 10.0.0.0/16; however, network 10.0.0.0/24 will still have its value as SA for Site
with the inheritance state set to Inherited.
• Inherit the parent's value and change the inheritance state to Inherit: Select this to inherit the extensible
attribute values from the parent for all descendants. The inheritance state for all descendants will be set to
Inherited.
• Change the inheritance state to Inherit only if the descendant's value is the same as the parent's value.
Otherwise, change the state to Override: Select this to set the inheritance state to Inherit if the
descendants have the same extensible attribute value as the parent. Otherwise, retain the original
extensible attribute value on the descendants and change the inheritance state to Overridden.
When adding an extensible attribute that does not exist on a descendant:Do not inherit the value from the parent
and change the inheritance state to Not Inherited: Select this if the extensible attributes do not exist on the
Note
The options above apply only to extensible attributes which no longer have a parent, due to the
merge. If the extensible attributes on descendants are also on the resulting merged network,
then they will retain their current state.
When you add multiple inheritable networks, new networks will automatically inherit all extensible
attributes from the parent.
Note
The Descendant Actions dialog box is displayed only when an object has descendants and you are modifying
extensible attributes that affects those descendants. However, the dialog box is always displayed when a join is
performed for a network that has inheritable extensible attributes.
The following section describes configuration changes for inheritable extensible attributes:
1. Network Container: From the Dashboards tab, select the Tasks tab -> click Add Networks. Select a network, enter
the required details. You can edit the inheritable extensible attributes that are displayed automatically. If this is a
parent object, then you can add extensible attributes.
IPv4 Network: From the Data Management tab -> select the DHCP tab -> Networks tab. In the Networks section,
select IPv4 Network from the Add drop-down menu. In the Add IPv4 Network wizard, enter the attributes in the
Extensible Attributes tab after specifying the required details.
IPv6 Network: From the Data Management tab -> select the DHCP tab -> Networks tab. In the Networks section,
select IPv6 Network from the Add drop-down menu. In the Add IPv6 Network wizard, enter the attributes in the
Extensible Attributes tab after specifying the required details.
IPv4 Range: From the Data Management tab > select the DHCP tab -> Networks tab -> Networks tab -> network
> click addr_range, select Range from the Add drop-down menu. In the Add IPv4 Range wizard, enter the
attributes in the Extensible Attributes tab after specifying the required details.
IPv6 Range: From the Data Management tab > select the DHCP tab -> Networks tab -> Networks tab -> network
> click addr_range, select Range from the Add drop-down menu. In the Add IPv6 Range wizard, enter the
attributes in the Extensible Attributes tab after specifying the required details.
Zones: From the Data Management tab > select the DNS tab - > Zones tab - > click Add. In the Add
Zone wizard, enter the attributes in the Extensible Attributes tab after specifying the required details.
DNS View: From the Data Management tab > select the DNS tab - > In the toolbar select Add - > Select DNS
View. In the Add DSN View wizard, enter the attributes in the Extensible Attributes tab after specifying the
required details.
Host: From the Data Management tab > select the DNS tab - > Zones tab - > click Add. In the Add section,
select Host or Bulk Host from the Add drop-down menu. In the Add DNS View wizard, enter the attributes in
the Extensible Attributes tab after specifying the required details.
Record: From the Data Management tab > select the DNS tab - > Zones tab - > click Add. In the Add section,
select Record from the Add drop-down menu select the record type. In the Add DNS View wizard, enter the
attributes in the Extensible Attributes tab after specifying the required details.
VLAN Range: From the Data Management tab > select the VLANs tab - > click Add, select VLAN Range from the
Add drop-down menu. In the Add VLAN Range Wizard, enter the attributes in the Extensible Attributes tab after
Note
This checkbox is not displayed for hosts, fixed addresses, and reservations since they do not have
descendants.
5. In the Descendant Actions dialog box, select options that will be applied for descendant objects as described in
Configuring Inheritable Extensible Attributes
The Descendant Actions dialog box displays all the mentioned options when you perform add and delete
operations simultaneously. Consider an example where you add a new inheritable extensible attribute Site, and
delete an existing inheritable attribute Region from the parent object, and then click Save to save both changes.
In this case, the Descendant Actions dialog box displays all the options.
6. Save the configuration.
The following table displays various inheritance states and corresponding changes to source and object types that are
displayed in the Value column of an extensible attribute.
If an extensible attribute is a native attribute (an object which is at the Source is not displayed in the Value column. This column will not display
top of the inheritance chain, or does not have ancestors), the source details, if none of the selected objects support inheritance.
If the state of an extensible attribute is set to Inherited, then the Source and object is displayed. You cannot change the value of the
extensible attribute.
If the state of an extensible attribute is set to Overridden or Not then the Source will have a strike-through. You can change the state of
Inherited, such extensible attributes. You cannot change the value of the extensible
attribute when the inheritance state is set to Not Inherited.
Note
The deleted extensible attributes will not be moved to the Recycle Bin and you cannot restore
extensible attributes that are deleted.
After a superuser admin configures the attributes of an object, they become available in the wizard and editor of the
object. This section describes how users can then add and manage the attributes that were configured.
Grid Manager displays the required extensible attributes in the Extensible Attribute tab. You must enter values for all
required attributes. If an object does not have required attributes, you can add the available optional attributes.
In the Extensible Attribute tab of an object, such as a network or host record, you can do the following:
• Enter values for extensible attributes
• Add attributes
• Change the inheritance state of an extensible attribute
• Select if descendants must inherit extensible attribute values from its parent
Note
You cannot delete an extensible attribute which has its inheritance state set to Inherited, Overridden,
and Not Inherited. You can delete an extensible attribute that is directly assigned to the object and has its
inheritance state set to No Parent or if the inheritance state is Disabled.
Note
You can delete only attributes that are not required. If you have one or more required attributes, you
cannot use the delete all function.
3. Save the configuration and click Restart if it appears at the top of the screen.
Example 1
When you add an extensible attribute to the top object, the inheritance state is set to No Parent. For example, if you add
a new inheritable extensible attribute, Building, to a network view, the inheritance state of this extensible attribute is set to
No Parent for the network view.
Example 2
When you add an extensible attribute Site to the parent object Network that has a descendant Range, you can define
Site as inheritable and add it to the Network. The descendant, Range, may or may not have the same extensible
attribute. Infoblox displays a list of options that lets you either inherit the value or retain or override the existing value of
the extensible attribute at the descendant level. Another option is to inherit the value of Site, only if the value for this
attribute in Range is same as that in Network. You can also decide if Range should acquire the same value for Site, if it is
not defined for Range. This change can be inherited by the descendants of Range.
Depending on your configuration, the inheritance state of the extensible attribute can display Inherited, Overridden or Not
Inherited. If the object is at the top of the inheritance chain (Network View), then the inheritance state is not displayed.
The inheritance state is set to No Parent only if an object has a parent, but the parent does not have the inherited
extensible attribute.
Example 3
Examples in this section show different results when you add a new inheritable extensible attribute to an object located at
the top or in the middle of the inheritance chain based on the following:
10.0.0.0/8 Network
Containe
r
10.1.0.0/16 Network
Example 3.1: Add an extensible attribute Region with value DEF to 10.0.0.0/8
You select the following options for the existing extensible attribute:
• • For descendants that already have this extensible attribute, the existing extensible attribute will always be
set to Inherit.
• For descendants that do not have this extensible attribute, the descendants will inherit this extensible
attribute.
Result:
Example 3.3: Add an extensible attribute Region with value DEF to 10.0.0.0/8 8
You select the following options for the existing extensible attributes:
• For descendants that already have this extensible attribute, the existing extensible attribute will always be set to
Inherit.
• For descendants that do not have this extensible attribute, the descendants will not inherit this extensible attribute
(extensible attribute is set to Do not Inherit).
Result:
Example 4
Examples in this section show different results when you remove an existing inheritable extensible attribute from an
object located at the top or in the middle of the inheritance chain based on the following:
Example 4.1: Remove extensible attribute Region with value DEF from 10.0.0.0/8
Example 4.2: Remove extensible attribute Region with value DEF from 10.0.0.0/8 You select the following option for the
existing extensible attribute:
• Preserve all descendant extensible attributes, whether the state is set to Inherited or Overridden. Result:
Example 5
Examples in this section show different results when you remove parent object based on the following:
Example 5.1: Removing object 10.0.0.0/8 from the parent level You select the following option for the existing extensible
attribute:
• Remove extensible attributes with the inheritance state set to Inherited. Extensible attributes with the state set to
Overridden are not removed.
Result:
10.0.0.0/24 Network
Example 6
Examples in this section show different results after you add an object in the middle of the inheritance chain based on the
following:
Example 6.1: Adding object 10.10.0.0/16 without extensible attributes You select the following option for the existing
extensible attribute:
• Retain values if the extensible attribute already exists, and inherit the attribute from the parent object if it does not
exist.
Result:
Example 7
Examples in this section show different results after you modify inheritable extensible attributes with multiple values
based on the following:
Example 7.1: Adding extensible attribute Region with value GHI to 10.0.0.0/8 You select the following option for the
existing extensible attributes:
• The descendants that already have this extensible attribute will inherit the value from the parent object.
Result: Multiple values will be replaced with the single inherited value.
Example 7.2: Adding extensible attribute Region with value GHI to 10.0.0.0/8 You select the following option for the
existing extensible attributes:
• The descendants that already have this extensible attribute will override the value.
10.0.0.0/16 Network
Container
10.0.0.0/24 Network
Caution: If you specify an address or network other than the one from which you are currently accessing the appliance,
when you save your configuration, you will lose your administrative session and be unable to reconnect. If you have
enabled the Enable GUI/API Access via both MGMT and LAN1/VIP feature and configured ACLs to control access to the
GUI and API, then the same set of ACLs are applicable on both the interfaces (LAN1 and MGMT port). For information,
see Enabling GUI and API Access on the MGMT and LAN1/VIP Ports and Configuring Security Features.
Warning
If the Detailed Status panel is open, the following actions take place:
• Grid Manager auto refreshes at a rate of 30 seconds.
• Widgets that support user-specified auto refresh, refresh at the rate specified in the Auto Refresh Period
field.
Therefore, even if you set the session timeout to be greater than the auto refresh rate, auto refresh still takes
place. The Grid Manager session does not time out because auto refresh takes precedence over the session
timeout. For more information about widgets, see Status Dashboard.
Note
If you change the session timeout value, the new setting takes effect only after you log out and log back in.
Note
Before you disable multiple logins to a NIOS system, ensure that all its existing sessions
(if any) are logged out. If not, the existing sessions continue to remain active even after
you disable multiple logins.
• Enable Account Lockout: Select the checkbox to enable account lockout for the local user. You
can enable password security such that if a local user tries to log in to Grid Manager by using an
incorrect password, NIOS appliance locks the user account after the configured number of failed
login attempts for a configured time period. Only superusers can enable and configure this feature.
This feature is applicable only to local users. This option is disabled by default.
• Maximum number of attempts: Enter the maximum number of invalid login attempts to Grid
Manager after which NIOS locks the account. You can specify a value from 1 to 99. The
default value is 5.
• Lockout duration: Enter the time duration in minutes for which the account must be locked.
You can specify a value from 1 to 1440. The default value is 5 mins.
• Never Unlock: Select the checkbox to permanently lock a local user account which is
already locked. Only a superuser can clear the checkbox to unlock the account. NIOS
displays a warning message if you enable this option. This option is not applicable to
superuser accounts because you cannot permanently lock a superuser account. This
option is disabled by default.
You can also configure account lockout for admin groups. For more information,
see Configuring Account Lockout for Admin Group.
• Disable Inactive Users: Select this checkbox to disable users who have not logged in to NIOS for
a specified period of time. You can specify the time period (in days) in the Disable account if user
has not logged in for <time period> days field. The range of days is from 2 to 9999. You can also
specify a reminder to be sent in the Remind <days> prior to expiration field. The range of days is
from 1 to 30. The number of days you specify in this field is the time from which users start getting
daily email reminders that their account will be disabled. NIOS sends the email reminder only if an
email address has been configured for the user.
Select the Allow user to reactivate account via serial console and Allow user to reactivate account
via remote console checkboxes if you want users to activate their account after it has been
disabled. To reactivate using the serial console, see Deploying a Single Independent Appliance. To
reactivate using the remote console, type ssh <user name>@<ip address>.
Note: Reactivating the account using the serial console or the remote console is possible only for
superusers.
3. Save the configuration and click Restart if it appears at the top of the screen.
Warning
After permanently disabling remote console and support access, you cannot re-enable them! Not even resetting
an appliance to its factory default settings can re-enable them.
If you have any questions, contact Infoblox Technical Support. To enable or disable remote console and Infoblox
technical support access:
1. Grid: From the Grid tab, select Grid Manager tab, expand the Toolbar and click Grid Properties -> Edit.
Member: From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member checkbox, and then
click the Edit icon.
Independent appliance: From the System tab, select the System Manager tab, expand the Toolbar and click
System Properties -> Edit.
2. In the editor, select the Security tab -> Advanced tab, and then complete the following in the
Remote Console and Infoblox Technical Support Access section:
• Enable Remote Console Access: Select this checkbox to enable superuser admins to access the Infoblox
CLI from a remote location using SSH (Secure Shell) v2 clients. You can set this at the Grid and member
levels.
• Enable Support Access: Select this checkbox to enable an SSH (Secure Shell) daemon that only Infoblox
Technical Support can access. You can set this at the Grid and member levels.
• Support Access Info: Displays the support access code and the expiration time of the code. Note that the
Enable Support Access is disabled after the expiration time.
• Permanently Disable Remote Console and Support Access: This field is in the Grid Properties editor only.
Select this checkbox to permanently disable remote console (Secure Shell v2) access for appliance
administration and for Infoblox Technical Support.
3. Save the configuration.
Note
• Configured proxy settings are for the entire Grid. You cannot configure proxy settings for individual
members.
Depending on the updates you want to download, you may need to install the respective licenses in your Grid. For
example, to download threat protection ruleset updates, the Grid must have the Threat Protection Update license
installed. To download threat analytics bundles, you must install the Threat Analytics license. When you configure your
appliance to obtain periodic ruleset updates, all updates go through the MGMT port on the Grid Master by default. You
can, however, delegate this function to a Grid member using a different interface such as LAN1 or LAN2. For information
about how to delegate updates to a Grid member and configure the interface, see Configuring Members and Interfaces
for Automatic Updates.
To configure proxy settings for the Grid, complete the following steps:
1. From the Grid tab, select the Grid Manager tab, and then click Edit -> Grid Properties from the Toolbar.
2. In the Grid Properties editor, select the Proxy Settings tab -> Basic tab, and complete the following:
• Use Proxy Server: When you select this checkbox, the appliance uses the connection that has been
established with the proxy server to establish connection with endpoints or download automatic updates,
such as threat protection rulesets and threat analytics bundles. The reporting member sends API requests
to the proxy server for threat details. For more information, see Threat Protection Reports. Similarly, the
Grid Master sends API requests to the proxy server for all threat context details. For more information, see
Viewing the RPZ Threat Details. This setting applies to the entire Grid. When you clear this checkbox, the
appliance does not use the proxy server; however, the configuration will not be affected.
• Name or IP Address and Port: Enter the name or IP address and port number of the proxy server you plan
to use for this connection.
• HTTPS Proxy Content Inspection: From the drop-down list, select one of the following methods the proxy
server uses to inspect packet content. Note that this section does not apply to AWS deployments.
• None: Select this to use HTTP for the connection. This method does not allow certificate
authentication for the proxy server.
• Allow Deep Packet Inspection: This option is not supported for AWS deployments. To eliminate
man-in-the-middle attacks, select this to allow deep pack inspection and information extraction for
non-compliant protocol, intrusions, or other criteria that determine whether the packets should be
routed to an alternate destination. When you select this, you must click Proxy Server Certificate
and navigate to the proxy server certificate to upload it to the Grid, or you must ensure that a
trusted chain has been established before the proxy server can perform deep packet inspection.
When you have uploaded a certificate, the appliance displays Loaded.
• Enable Strict Host Name Checking: This option is enabled only when you select Allow
Deep Packet Inspection. As part of the SSL handshake process, the appliance verifies that
the CN (Common Name) of the public certificate of the proxy server exactly matches the
host name of the proxy server.
Credentials for Proxy Server (if configured at proxy server)
• Use user name and password to connect to proxy server if configured: If you have configured user credentials on
the proxy server, enter the Username and Password here. This is optional.
Note
The appliance generates an SNMP trap if any of the configured Grid members failed to receive updates.
Note
When the Threat Protection service is running on the Advanced Standalone Appliance, then the GUI and API
access is allowed only on the MGMT port.
To enable GUI and API access on the MGMT and LAN1/VIP ports:
1. From the Grid tab, select the Grid Manager tab.
2. Expand the Toolbar and select Grid Properties -> Edit.
3. In the Grid Properties editor, select the General tab -> click the Advanced tab (or click Toggle Advanced Mode)
and complete the following:
• Enable GUI/API Access via both MGMT and LAN1/VIP: Select this checkbox to allow access to the Infoblox GUI
and API using both the MGMT and LAN1 ports for standalone appliances and allow both the MGMT and VIP
ports for an HA pair. This feature is valid only if you have enabled the MGMT port. For information about enabling
the MGMT port, see Appliance Management.
• Click Save to save the changes.
Note
When you configure VLANs on the following Network Insight appliances: ND-1405, ND-2205, ND-4000, ND-
V1405, and ND-V2205, the VLAN interfaces are used exclusively for discovery. You cannot bind other services
on these VLAN interfaces of the supported Network Insight appliances. For more information about Network
Insight, see About Network Insight.
VLAN Tagging
When your VLANs span across multiple networks, VLAN tagging is required. This enables the NIOS appliance to
connect to different networks using the same port. VLAN tagging involves adding a VLAN tag or ID to the header of an IP
packet so the appliance can identify the VLAN to which the packet belongs. In addition, switches use the VLAN tag to
determine the port to which it should send a broadcast packet. The appliance uses the IEEE 802.1Q networking standard
to support VLANs and VLAN tagging. On the appliance, you can configure VLANs as tagged networks by adding VLAN
Untagged networks are those without VLAN tags assigned to them. When you set up a VLAN as either a tagged or
untagged network, ensure that you properly configure the corresponding switch for the VLAN to function properly.
Note
A tagged VLAN interface receives only those packets that belongs to the tagged network, but an untagged
VLAN interface receives all the packets belonging to the tagged and untagged networks of the interface.
VLANs and VLAN tagging are supported on both IPv4 and IPv6 transports. This feature is currently supported on the
following Infoblox appliances: Trinzic 1405, 1415, 1425, 2205, 2215, 2225, 4005, Infoblox-4030-10GE, PT-1405,
PT-2205, CP-VM-800, CP-VM-1400, and CP-VM-2200. It is also supported on all the Trinzic virtual appliances. VLAN
tagging is not supported on TE-100, TE-805, ND-805, TR-805, TE-815, and TE-825. For information about these
appliances, refer to the respective installation guides on the Infoblox Support web site at http://www.infoblox.com/support.
Currently, only the DNS service can listen on specific VLAN interfaces. The DHCP service listens only on the primary
VLAN interface (tagged or untagged). You can also specify VLANs as the source port for sending DNS queries and notify
messages. For information about how to configure these, see Specifying Port Settings for DNS.
Additional VLAN support is available exclusively for discovery on the following Network Insight appliances: ND-1405,
ND-2205, ND-4000, ND-V1405, and ND-V2205. Binding other services on the VLAN interfaces of the Network Insight
appliances is not supported.
Note
When you join an appliance that supports VLANs to a Grid that does not support VLANs or revert the appliance
to a NIOS version that does not support VLANs, the appliance will become unreachable after joining the Grid or
being reverted. You must remove VLAN tagging from the corresponding switch in order to reach the
downgraded appliance.
Consider the following guidelines when tagging VLANs on the LAN1 and LAN2 ports:
• You can assign VLAN addresses to an interface and add VLAN tags to them. However, you must designate one
of the tagged VLANs as a primary address.
• If the primary IPv4 address is tagged with a VLAN ID, all other addresses on the same interface must be tagged
with a VLAN ID as well.
• You can use the same VLAN ID to tag only one IPv4 and one IPv6 address on the same interface. You cannot
use the same VLAN ID to tag multiple IPv4 and IPv6 addresses on the same interface.
• You can assign one untagged IPv4 and one untagged IPv6 address to the same interface. These addresses are
designated as the primary address for the interface.
• For IPv6, you must have a primary IPv6 address (either tagged or untagged) before you can add other tagged
IPv6 addresses on the same interface.
• If you have multiple VLANs assigned to the LAN1 interface and the primary VLAN is untagged, DHCP listens on
all VLAN interfaces and thus DHCP lease requests will succeed for the additional VLANs assigned to the LAN1
interface, but the request will actually be handled by the primary untagged VLAN interface.
• You can set up the system to define only tagged networks:
• When the VLAN tag is not set, the appliance considers the network as an untagged network.
• You can specify a single untagged IPv4 and IPv6 network per interface.
• The primary network can be tagged or untagged, but you must tag the additional VLANs.
Configuring VLANs
When you first set up a NIOS appliance, you can assign VLANs through the Grid Setup Wizard. For more information,
see Using the Setup Wizard. After the initial setup, you can assign VLANs to the LAN1 or LAN2 ports in the Required
Ports and Addresses table, as described in Modifying Ethernet Port Settings.
On a Grid member, you can assign up to 10 VLANS for each protocol (IPv4 or IPv6) on the LAN1 and LAN2 ports. You
can assign up to 10 IPv4 VLAN addresses and 10 IPv6 VLAN addresses for each interface. You can configure only IPv4
VLAN addresses for an IPv4 Grid member and only IPv6 VLAN addresses for an IPv6 Grid member, but for a dual mode
Grid member you can configure both IPv4 and IPv6 VLAN addresses.
To assign additional VLANs to the LAN1 or LAN2 port, complete the following:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member checkbox, and then click the
Edit icon.
2. Select the Network -> Basic tab in the Grid Member Properties editor.
3. In the Additional Ports and Addresses table, click the Add icon and select either MGMT (IPv4), MGMT (IPv6),
LAN2 (IPv4), LAN2 (IPv6), Additional Address (loopback) (IPv4), Additional Address (loopback) (IPv6), LAN1
(VLAN)(IPv4), LAN1 (VLAN)(IPv6), LAN2 (VLAN)(IPv4) or LAN2 (VLAN)(IPv6) from the drop-down list. You can
add up to 10 IPv4 and 10 IPv6 VLANs for each interface.
Note
• You can configure only IPv4 VLAN addresses for an IPv4 Grid member and only IPv6 VLAN
addresses for an IPv6 Grid member, but for a dual mode Grid member you can configure both
IPv4 and IPv6 VLAN addresses.
• For vNIOS appliances, some of the options in the drop-down list may vary depending on your
vNIOS configuration. For example, if you are using a single network interface instance of vNIOS
for GCP, you will see choices specific to the LAN1 interface and Additional Address only. For
more information, see the vNIOS documentation specific to your product at Appliances.
• MGMT (IPv4): Select this to configure IPv4 address for MGMT port.
• MGMT (IPv6): Select this to configure IPv6 address for MGMT port.
• LAN2 (IPv4): Select this to configure IPv4 address for the LAN2 port for DHCP or DNS. This is not
applicable to Trinzic 100 appliance.
• LAN2 (IPv6): Select this to configure IPv6 address for the LAN2 port for DHCP or DNS. This is not
applicable to Trinzic 100 appliance.
• Additional Address (loopback) (IPv4): Select this to add a non-anycast IPv4 address to the loopback
interface. Note that you can configure this for IPv4 and dual mode Grid member.
• Additional Address (loopback) (IPv6): Select this to add a non-anycast IPv6 address to the loopback
interface. Note that you can configure this for IPv6 and dual mode Grid member.
• LAN1 (VLAN) (IPv4): Select this to add a VLAN to the LAN1 interface. You can add up to 10 IPv4 VLAN
addresses. Note that you can configure this for IPv4 and dual mode Grid member. This is supported on
the following Infoblox appliances: Trinzic 1405, 1415, 1425, 2205, 2215, 2225, 4005, Infoblox-4030-10GE,
PT-1405, PT-2205, CP-VM-800, CP-VM-1400, and CP-VM-2200. It is also supported on all the Trinzic
virtual appliances. VLAN tagging is not supported on TE-100, TE-805, ND-805, TR-805, TE-815, and
TE-825.
• LAN1 (VLAN) (IPv6): Select this to add a VLAN to the LAN1 interface. You can add up to 10 IPv4 and 10
IPv6 VLAN addresses. Note that you can configure this for IPv6 and dual mode Grid member. This is
supported on the following Infoblox appliances: Trinzic 1405, 1415, 1425, 2205, 2215, 2225, 4005,
Infoblox-4030-10GE, PT-1405, PT-2205, CP-VM-800, CP-VM-1400, and CP-VM-2200. It is also
supported on all the Trinzic virtual appliances. VLAN tagging is not supported on TE-100, TE-805,
ND-805, TR-805, TE-815, and TE-825.
• LAN2 (VLAN) (IPv4): Select this to add a VLAN to the LAN2 interface. You can add up to 10 IPv4 VLAN
addresses. Note that you can configure this for IPv4 and dual mode Grid member. This is supported on
the following Infoblox appliances: Trinzic 1405, 1415, 1425, 2205, 2215, 2225, 4005, Infoblox-4030-10GE,
PT-1405, PT-2205, CP-VM-800, CP-VM-1400, and CP-VM-2200. It is also supported on all the Trinzic
In IPv4 and IPv6 headers, DiffServ uses the DS (Differentiated Services) field for packet classification purposes. The DS
field defines the layout of the ToS (Type of Services) octet in IPv4 and the Traffic Class octet in IPv6. The first six bits of
the DS field are used as the DSCP value, which determines the PHBs (per-hope behaviors) on DiffServ compliant nodes
and enables priorities of services to be assigned to network traffic. For more information about the DS field, refer to RFC
2474, Definition of the Differentiated Services Field (DS Field) in the IPv4 and IPv6 Headers.
When you configure the DSCP value for DiffServ, the appliance sets priorities for all outgoing IP traffic. It implements
QoS (quality of service) rules so you can effectively classify and manage your critical network traffic. To ensure that core
network services, such as DNS services, continue to operate in the event of network traffic congestion, you can set the
DSCP value for the entire Grid and override it at the member level. Note that on an appliance, all outgoing IP traffic on all
interfaces uses the same DSCP value.
DSCP is supported on both IPv4 and IPv6 transports and the DSCP value for both IPv4 and IPv6 transports must be the
same. This feature is currently supported on the following Infoblox appliances: Trinzic 2215, 2225, Infoblox-4030-10GE,
PT-1405, PT-2205, TE-1415, TE-1425, and TE-4015. For information about these appliances, refer to the respective
installation guides on the Infoblox Support web site at http://www.infoblox.com/support.
Note
You can set the DSCP value of the primary LAN using the set network CLI command. DSCP values for all other
interfaces and VLANs must be set through Grid Manager.
Appliance Roles and Configuration, Communication Types, and Port Usage for Appliances with LAN2 Ports
HA Grid Master Activ Disabled Enable VIP on HA VIP on HA LAN1 or LAN2 VIP on HA
e d
Single Grid – Disabled Enable LAN1 LAN1 and/or LAN2 LAN1 or LAN2 LAN1
Master d
Single Grid – Disabled Enable LAN1 LAN1 and/or LAN2 LAN1 or LAN2 –
Member d
To see the service port numbers and the source and destination locations for traffic that can go to and from a NIOS
appliance, see Sources and Destinations for Services. This information is particularly useful for firewall administrators so
that they can set policies to allow traffic to pass through the firewall as required.
Note
The colors in both tables represent a particular type of traffic and correlate with each other.
Key Exchange VIP on HA Grid Master, or LAN1 or MGMT on all Grid 17 2 2114
(Grid Master LAN1 on single Grid members (including Grid UD 1
Candidate Master Master and Grid Master P 1
Promotion) Candidate) 4
Accounting LAN1 or MGMT on Grid VIP on HA Grid Master, or 17 1 1194 Default VPN port 1194 for
member LAN1 on single Grid Master UD 1 or Grids with new DNSone 3.2
VIP on HA Grid Master P 9 5002 installations and 5002 for
Candidate, or LAN1 on 4 , or Grids upgraded to DNSone
single or 1024 3.2; the port number is
Grid Master Candidate 5 -> configurable
0 6399
0 9 Required for Grid
2,
or
1
0
2
4
->
6
3
9
9
9
Network Insight LAN1 or LAN2 on Probes LAN1 or LAN2 on UD 1 1194 All default VPN tunnels for
VPN Consolidator P 1 Network Insight
9
4
DHCP Client LAN1, LAN2, VIP, or 17 5 547 Required for IPv6 DHCP
broadcast on NIOS UD 4 service
appliance P 6
DHCP LAN1, LAN2 or VIP on Client 17 5 546 Required for IPv6 DHCP
NIOS appliance UD 4 service
P 7
DHCP Failover LAN1, LAN2 or VIP on LAN1, LAN2 or VIP on 6 1 519, Required for DHCP failover
Infoblox DHCP Infoblox DHCP failover peer TC 0 or
failover peer P 2 647
4
→
6
5
5
3
5
DDNS Updates LAN1, LAN2, or VIP LAN1, LAN2, or VIP 17 1 53 Required for DHCP to send
UD 0 DNS dynamic updates
P 2
4
→
6
5
5
3
5
DNS Transfers LAN1, LAN2, VIP, or LAN1, LAN2, VIP, or MGMT 6 5 53 For DNS zone transfers,
MGMT, or client TC 3, large client queries, and for
P or Grid members to
1 communicate with external
0 name servers
2
4 Required for DNS
->
6
5
5
3
5
NTP NTP client LAN1, LAN2, VIP, or MGMT 17 1 123 Required if the NIOS
UD 0 appliance is an NTP server.
P 2 On an HA member, the NTP
4 service runs on the active
-> node. If there is an HA
6 failover, the NTP service is
5 automatically launched after
5 the passive node becomes
3 active and the NTP traffic
5 uses the LAN2, VIP, or
MGMT port on one of the
nodes from an HA pair,
instead of the LAN1 port.
During another HA failover,
the currently passive node
becomes active again and
the NTP traffic uses the
LAN1 port, and the NTP is
back in synchronization.
RADIUS NAS (network access LAN1 or VIP 17 1 1812 For proxying RADIUS
Authentication server) UD 0 Authentication-Requests.
P 2 The default destination
4 port number is 1812, and
– can be changed to 1024 –
6 63997. When configuring an
5 HA pair, ensure that you
5 provision both LAN IP
3 addresses on the RADIUS
5 server.
RADIUS NAS (network access LAN1 or VIP 17 1 1813 For proxying RADIUS
Accounting server) UD 0 Accounting-Requests. The
P 2 default destination port
4 number is 1813, and can be
– changed to 1024 – 63998.
6
5
5
3
5
RADIUS Proxy LAN1 or VIP RADIUS home server 17 1 1024 Required to proxy requests
UD 8 -> from RADIUS clients to
P 1 6399 servers. The default source
4 7 port number is 1814, and
(auth although it is not
), or configurable, it is always two
1024 greater than the port number
-> for RADIUS authentication.
6399
8
(acct
)
ICMP Echo VIP, LAN1, LAN2, or VIP, LAN1, LAN2, or MGMT, 1 – – Required for response from
Reply MGMT, or client or client IC ICMP echo request (ping)
MP
Typ
e0
ICMP Echo VIP, LAN1, LAN2, or VIP, LAN1, LAN2, or 1 – – Required to send pings and
Request MGMT, MGMT, or client IC respond to the Windows-
or client MP based traceroute tool
Typ
e8
ICMP TTL Gateway device (router or Windows client 1 – – Gateway sends an ICMP
Exceeded firewall) IC TTL exceeded message to a
MP Windows client, which then
Typ records router hops along a
e data path
11
SMTP LAN1, LAN2, or VIP Mail server 6 1 25 Required if SMTP alerts are
TC 0 enabled
P 2
4
→
6
5
5
3
5
SNMP NMS (network VIP, LAN1, LAN2, or MGMT 17 1 161 Required for SNMP
management system) UD 0 management
server P 2
4
→
6
5
5
3
5
Syslog LAN1, LAN2, or MGMT of syslog server 17 1 514 Required for remote syslog
NIOS appliance UD 0 logging
P 2
4
→
6
5
5
3
5
Traceroute LAN1, LAN2, or UNIX- VIP, LAN1, LAN2, or MGMT, 17 1 3300 NIOS appliance responds
based appliance or client UD 0 0→ with ICMP type code 3 (port
P 2 6553 unreachable)
4 5
→
6
5
5
3
5
TFTP Data LAN1 or MGMT TFTP server 17 1 69, For contacting a TFTP
UD 0 then server during database and
P 2 1024 configuration backup and
4 → restore operations
→ 6399
6 9
5
5
3
5
VRRP HA IP on the active node Multicast address 224.0.0.18 112 8 For periodic announcements
of HA pair VR 0 of the availability of the HA
RP 2 node that is linked to the
VIP. The nodes in the HA
pair must be in the same
subnet.
HTTPS/SSL Management System VIP, LAN1, or MGMT 6 1 443 Required for administration
TC 0 through the GUI
P 2
4
→
6
5
5
3
5
Reporting Reporting Forwarders LAN1, LAN2, or MGMT on 6 1 9997 Required for the reporting
the indexer TC 0 service. Communication is
P 2 single directional from
4 forwarders to the indexer.
- For example, a forwarder
6 detects events and forwards
5 them to the indexer.
5
3
5
Reporting - All Reporting Members LAN1, LAN2, MGMT on TC 1 7887 Splunk cluster peer
Peer each reporting member P 0 replication (traffic among
Replication 2 reporting members)
4
-
6
5
5
3
5
Distributed All Reporting Members LAN1, LAN2, MGMT on TC 1 7089 Distributed searches from
Search each reporting member P 0 Search Head to Reporting
2 Members
4
-
6
5
5
3
5
Reporting All Reporting Members LAN1, LAN2, MGMT on TC 1 8089 Grid Master to reporting
Management each reporting member P 0 members
2
4
-
6
5
5
3
5
Reporting All Reporting Members LAN1, LAN2, MGMT on TC 1 8000 Grid Master to reporting
Management each reporting member P– 0 members
IPv 2
6 4
-
6
5
5
3
5
Threat VIP on HA Grid Master or N/A (using FQDN = https:// HT N/ 443 For threat protection rule
Protection MGMT on single ts.infoblox.c) TP A updates.
appliance (with threat S
protection service running)
Threat Insight Client N/A (using FQDN = https:// HT N/ 443 For downloading module set
ts.infoblox.co) TP A and whitelist updates.
S
Microsoft Managing Member Microsoft Server TC 1 135, Note that TCP ports 135
Management P 0 445 and 445 must be open
2 Dyna on the Microsoft server,
4 mic in addition to the
- Port dynamic port range.
6 Ran Ports 135 and 445 are
5 ge used by the port
5 1025 mapper interface,
3 -500 which is a service on
5 0 the Microsoft server
(Win that provides
dows information to clients
Serv on which port to use to
er connect to a specific
2003 service, such as the
) service that allows the
management of the
Dyna DNS service.
mic
Port
Ran
ge
4915
2-65
535
(Win
dows
Serv
er
2008
)
Occasionally, for example, even though both the NIOS appliance and the connecting switch support 1000-Mbps
(megabits per second) full-duplex connections, they might fail to auto-negotiate that speed and type, and instead connect
at lower speeds of either 100 or 10 Mbps using potentially mismatched full- and half-duplex transmissions. If this occurs,
first determine if there is a firmware upgrade available for the switch. If so, apply the firmware upgrade and test the
connection. If that does not resolve the issue, manually set the ports on the NIOS appliance and on the switch to make
1000-Mbps full-duplex connections.
Note
The port settings on the connecting switch must be identical to those you set on the NIOS appliance.
Note
NIC failover for LAN1 and LAN2 is not supported on AWS members.
The LAN2 port is a 10/100/1000Base-T Ethernet connector on the front panel of the TE-815, TE-825, TE-1415, TE-1425,
TE-2215, TE-2225, TE-4015 and TE-4025 appliances. By default, the LAN2 port is disabled and the appliance uses the
LAN1 port (and HA port when deployed in an HA pair). Before you can enable and configure the LAN2 port on a Grid
member, you must first configure the member and join it to the Grid. You must also have read/write permission to the Grid
member on which you want to enable the port. When you enable the LAN2 port and SNMP, the appliance sends traps
from this port for LAN2 related events.
You can configure the LAN2 port in different ways. You can enable the port redundancy or port failover feature, which
groups the LAN1 and LAN2 ports into one logical interface. The LAN1/LAN2 grouping can be activated for both IPv4 and
IPv6. Alternatively, you can configure the LAN2 port on a different IP network than LAN1, and enable the LAN2 port to
provide DNS and DHCP services.
Note that you cannot use the LAN2 port to access the GUI and the API, or to connect to the Grid. This can impact the
ability of other appliances, such as the NetMRI and PortIQ appliances, to communicate with the Grid Master. Any IPv6
services enabled for the LAN2 port also require provisioning of an IP address on the LAN2 port.
Note
• When configuring port redundancy, the speed of the interfaces is not taken into consideration when
selecting the active interface.
The LAN1 or LAN1 (VLAN) and LAN2 or LAN2 (VLAN) ports share the IP address of the LAN1 or LAN1 (VLAN) port; the
port that is currently active owns the IP address. When you enable services on the appliance, such as DNS and DHCP,
clients send their service requests to the LAN1 or LAN1 (VLAN) port IP address and receive replies from it as well. The
port supports the services and features supported on the LAN1 or LAN1 (VLAN) port as listed in Appliance
Roles table and Sources and Destinations for Services table. You cannot enable the port redundancy feature if the LAN2
or LAN2 (VLAN) port is serving DNS or DHCP.
For example, you can use the MGMT port for Grid communications, and the LAN1 and LAN2 ports are connected to the
same switch. The LAN1 and LAN2 port share the IP address of the LAN1 port, which is 1.1.1.5. In the illustration, LAN1
is the active port.
You can also have the MGMT port disabled and configure LAN1 and LAN2 for port redundancy. You can enable port
redundancy on single or HA independent appliances and Grid members.
Note
The MGMT port currently does not support DHCP, NAT, or TFTP. IPv6 addressing may be applied to the MGMT
port.
Some NIOS appliance deployment scenarios support more than one concurrent use of the MGMT port. The following
table depicts MGMT port uses for various appliance configurations.
Supported MGMT Port Uses for Various appliance Configurations
Grid Master
HA Grid Member
* Although you manage all Grid members through the Grid Master, if you enable the MGMT port on common Grid
members, they can send syslog events, SNMP traps, and e-mail notifications, and receive SSH connections on that port.
Infoblox does not support MGMT port usage for some appliance configurations (indicated by the symbol in
Supported MGMT Port Uses for Various appliance Configurations table ) because it cannot provide redundancy through
the use of a VIP. A Grid Master that is an HA pair needs the redundancy that a VIP interface on the HA port provides for
Appliance Management
You can restrict administrative access to a NIOS appliance by connecting the MGMT port to a subnet containing only
management systems. This approach ensures that only appliances on that subnet can access the Infoblox GUI and
receive appliance management communications such as syslog events, SNMP traps, and e-mail notifications from the
appliance.
If you are the only administrator, you can connect your management system directly to the MGMT port. If there are
several administrators, you can define a small subnet—such as 10.1.1.0/29, which provides six host IP addresses
(10.1.1.1–10.1.1.6) plus the network address 10.1.1.0 and the broadcast address 10.1.1.7—and connect to the NIOS
appliance through a dedicated switch (which is not connected to the rest of the network). The figure below shows how an
independent appliance separates appliance management traffic from network protocol services. Note that the LAN port is
on a different subnet from the MGMT port.
Appliance Management from One or More Management Systems
Grid Communications
You can isolate all Grid communications to a dedicated subnet as follows:
• For Grid communications from the Grid Master, which can be an HA pair or a single appliance, the master uses
either the VIP interface on the HA port of its active node (HA master) or its LAN port (single master). Neither a
single nor HA Grid Master can use its MGMT port for Grid communications. (This restriction applies equally to
Master Candidates.)
• Common Grid members connect to the Grid Master through their MGMT port.
This ensures that all database synchronization and Grid maintenance operations are inaccessible from other network
elements while the common Grid members provide network protocol services on their LAN ports.
The below figure shows how Grid members communicate to the master over a dedicated subnet.
Grid Communications
To enable the MGMT port for Grid communications on an existing single or HA Grid member:
1. Log in to the Grid Master with a superuser account.
Note
You must enable the MGMT port before modifying its port settings. See Using the MGMT Port.
3. In the Network -> Basic tab of the Grid Member Properties editor, add the MGMT port to the Additional Ports and
Addresses table as follows:
4. Click the Add icon and select MGMT (IPv4) to configure an IPv4 address or select MGMT (IPv6) to configure an
IPv6 address for the MGMT port. You can configure both IPv4 address and IPv6 address for the MGMT port.
Grid Manager adds a row for the MGMT port. For an HA pair, it adds two rows, one for each node.
5. Enter the following in the row of the MGMT port for a single Grid Master or independent appliance, and in the
rows of the two nodes for an HA Grid Master or independent HA pair:
• Interface: Displays the name of the interface. You cannot modify this.
• Address: Type the IP address for the MGMT port, which must be in a different subnet from that of the LAN
and HA ports.
• Subnet Mask (IPv4) or Prefix Length (IPv6): For IPv4 address, specify an appropriate subnet mask for the
number of management systems that you want to access the appliance through the MGMT port. For IPv6
address, specify the prefix length.
• Gateway: Type the default gateway for the MGMT port. If you need to define any static routes for traffic
originating from the MGMT port—such as SNMP traps, syslog events, and email notifications—destined
for remote subnets beyond the immediate subnet, specify the IP address of this gateway in the route.
• Port Settings: Choose the connection speed that you want the port to use. You can also choose the
duplex setting. Choose Full for concurrent bidirectional data transmission or Half for data transmission in
one direction at a time. Select Automatic to instruct the NIOS appliance to negotiate the optimum port
connection type (full or half duplex) and speed with the connecting switch automatically. This is the default
setting. You cannot configure port settings for vNIOS appliances.
• DSCP Value: Displays the Grid DSCP value. To modify, click Override and enter the DSCP value. You can
enter a value from 0 to 63. For information about DSCP, see Implementing Quality of Service Using
DSCP.
6. In the Network -> Advanced tab, select the Enable VPN on MGMT Port checkbox.
7. In the Security tab, do the following:
• Restrict Remote Console and Support Access to MGMT Port: Select this checkbox to restrict SSH
(Secure Shell) v2 access to the MGMT port only. This restricts Infoblox Technical Support and remote
console connections—both of which use SSH v2—to just the MGMT port. For an HA pair, you can make
an SSH v2 connection to the MGMT port on both the active and passive nodes.
Clear the checkbox to allow SSH v2 access to both the MGMT and LAN ports. For an HA pair, you can
make an SSH v2 connection to the MGMT and LAN ports on both the active and passive nodes.
8. Save the configuration and click Restart if it appears at the top of the screen.
The master communicates the new port settings to the member, which immediately begins using them. The
member stops using its LAN port for Grid communications and begins using the MGMT port.
9. To confirm that the member still has Grid connectivity, check that the status icons for that member are green on
the Detailed Status and Grid panels.
DNS Services
You can configure a single independent appliance or single Grid member to provide DNS services through the MGMT
port in addition to the LAN port. For example, the appliance can provide DNS services through the MGMT port for
internal clients on a private network, and DNS services through the LAN port for external clients on a public network.
While providing DNS services on the MGMT port, you can still use that port simultaneously for appliance management.
The figure below shows a management system communicating with a single independent appliance through its MGMT
port while the appliance also provides DNS services on that port to a private network. Additionally, the appliance provides
DNS services to an external network through its LAN port.
DNS Services on the LAN and MGMT Ports, and appliance Management on the MGMT Port
Note
• You must enable the MGMT port before modifying its port settings. See Using the MGMT Port.
• You must mandatorily configure the LAN interface before joining the HA nodes to the Grid. If you
join the nodes with VLAN tagging already enabled on HA, the new nodes must join with VLAN
tagging only. If you join the nodes using the MGMT interface, you must enable VLAN tagging for
the new nodes.
2. In the Network -> Basic tab of the Grid Member Properties editor, add the MGMT port to the Additional Ports and
Addresses table as follows:
3. Click the Add icon and select MGMT (IPv4) to configure an IPv4 address or select MGMT (IPv6) to configure an
IPv6 address for the MGMT port. You can configure both IPv4 and IPv6 address for the MGMT port.
Grid Manager adds a row for the MGMT port. For an HA pair, it adds two rows, one for each node.
Note
You can configure LOM only on appliances that support LOM. This port automatically negotiates a speed of up
to 1000 Mbps. Devices connected to the LOM port must be configured to auto-negotiate and must not have a
fixed speed of 1000 Mbps.
LOM is disabled by default. Before you can configure LOM and remotely manage the appliance, ensure that the IPMI
(Intelligent Platform Management Interface) port on your appliance is properly connected to the network. Consider the
following security measures before you enable the IPMI interface for LOM:
• Use an authentication method other than the RAKP (Remote Authenticated Key-Exchange Protocol) for the IPMI
interface. Any implementation that uses the RAKP can become vulnerable.
• Secure the network to which the IPMI interface is connected. Infoblox recommends that you use a separate and
secure network for all IPMI traffic.
• Use strong passwords for all IPMI users. At least 10 random characters are recommended. Attacks are only
effective against weak passwords.
• IPMI is disabled by default. DO NOT enable IPMI on the appliances if it is not being used.
By default, IPMI uses UDP port 623. You can then enable LOM and add LOM users through the Infoblox GUI. When you
add LOM users, you can assign them specific roles so they can perform only certain functions. When you add a LOM
user, you can configure the user to be an "operator" or a "user" depending on the functions you want the user to perform.
An operator can access an appliance remotely and perform the following functions:
• Access the serial console
• Reset the appliance
• Power up and down the appliance
• Monitor system status, such as CPU usage and system temperature
A user role can only monitor system status. Users with this role cannot perform any other functions remotely.
After you set up and configure your appliance, perform the following tasks through Grid Manager to enable LOM and set
up LOM users:
1. Enable LOM for the Grid or members that support IPMI, as described in Enabling LOM.
2. Add LOM users based on your organizational needs, as described in Adding LOM User Accounts.
3. Configure the IPMI network interface on the appliance, as described in Configuring the IPMI Network Interface.
4. After you have configured LOM and set up the IPMI interface, install a utility such as IPMItool on your Linux
management system. For information about IPMItool, visit the IPMItool web site at http://ipmitool.sourceforge.net.
For the most commonly used commands and examples, see IPMI Commands and Examples.
You can also do the following from Grid Manager after you configure LOM:
• Enable and disable LOM for the Grid or members, as described in Enabling LOM.
• Modify LOM settings, as described in Modifying LOM Settings.
• View LOM users, as described in Modifying LOM Settings.
Enabling LOM
Before you can add LOM users and manage Infoblox appliances remotely, you must enable LOM. When LOM is
configured for the entire Grid, all members inherit the Grid settings. You can also override the Grid settings for specific
Caution: Using this command has the same effect as pulling the power cord off the appliance.
Checking Various Sensors [Temperature, Voltage, FANS, Physical Security, Power supply, OEM] with User Role
Command:
ipmitool -H 10.37.2.70 -U user -P infoblox -L USER -I lanplus sensor
Command output:
System Temp | 23.000 | degrees C | ok | -9.000 | -7.000 | -5.000 | 75.000 | 77.000 | 79.000
CPU Temp | 0x0 | discrete | 0x0000| na | na | na | na | na | na
FAN 1 | 10390.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
FAN 2 | na | RPM | na | na | na | na | na | na | na
FAN 3 | 9835.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
FAN 4 | 11870.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
FAN 5 | 10390.000 | RPM | ok | 215.000 | 400.000 | 585.000 | 29260.000 | 29815.000 |
30370.000
CPU Vcore | 0.832 | Volts | ok | 0.640 | 0.664 | 0.688 | 1.344 | 1.408 | 1.472
+3.3VCC | 3.264 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
+12 V | 11.978 | Volts | ok | 10.494 | 10.600 | 10.706 | 13.091 | 13.197 | 13.303
CPU DIMM | 1.528 | Volts | ok | 1.152 | 1.216 | 1.280 | 1.760 | 1.776 | 1.792
+5 V | 5.088 | Volts | ok | 4.096 | 4.320 | 4.576 | 5.344 | 5.600 | 5.632
-12 V | -12.486 | Volts | ok | -13.844 | -13.650 | -13.456 | -10.934 | -10.740 | -10.546
VBAT | 3.120 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
+3.3VSB | 3.264 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
AVCC | 3.264 | Volts | ok | 2.816 | 2.880 | 2.944 | 3.584 | 3.648 | 3.712
Chassis Intru | 0x0 | discrete | 0x0000| na | na | na | na | na | na PS Status | 0x1 | discrete |
0x01ff| na | na | na | na | na | na
Command output:
[SOL Session operational. Use ~? for help] login: admin
password:
Infoblox NIOS Release 6.4.0-163715 (64bit)
Copyright (c) 1999-2012 Infoblox Inc. All Rights Reserved. type 'help' for more information
Infoblox >
Note
Consult your network administrator before specifying the gateway address for a static
route on the appliance. Specifying an invalid gateway address can cause problems, such
as packets being dropped or sent to an incorrect address.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
Consult your network administrator before specifying the gateway address for a static
route on the appliance. Specifying an invalid gateway address can cause problems, such
as packets being dropped or sent to an incorrect address.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
If you are using the Infoblox Subscriber Parental Control feature, set the primary DNS resolver to a
loopback address (127.0.0.1) to enable parental control.
• Search List: You can define a group of domain names that the NIOS appliance can add to partial queries that do
not specify a domain name. For example, if you define a RADIUS authentication home server as "as1", and you
list "corpxyz.com" and "hq.corpxyz.com" in the domain group list, then the NIOS appliance sends a query for
as1.corpxyz.com and another query for as1.hq.corpxyz.com to the preferred or alternate name server. To specify
domain names containing IDNs, manually convert it into punycode and specify domain names in punycode.
To add a domain name, click the Add icon and type a domain name in the Search List field. To remove a domain
name from the group, select it, and then click Delete.
3. Save the configuration and click Restart if it appears at the top of the screen.
Managing Licenses
You must install valid licenses for services and features to function properly in your Infoblox Grid. Different license types
that are available are discussed in this topic. You can choose to obtain licenses for the desired features and services,
and install them as static, dynamic, or Grid-wide licenses, depending on your network and business requirements.
After you install your licenses, you can monitor them through Grid Manager. Licenses are listed on the Grid tab ->
Licenses tab. Grid Manager also displays the number of licenses that have expired and those that are expiring within the
next 30 and 90 days respectively.
NIOS licenses are valid for SOT (Son Of Trinzic) 2016 hardware appliances, both physical and virtual. A NIOS license
can be permanent or have an expiration date.
This topic includes the following sections:
• License Types
• Managing Static Licenses
• Retrieving the Hardware ID of an Appliance
• Obtaining Static Licenses
• Downloading License Keys
• Managing Dynamic Licenses
• Obtaining Dynamic Licenses
• Manually Allocating Dynamic Licenses
• Manually Deallocating Dynamic Licenses
• Manually Revoking Dynamic Licenses
• Managing Grid-wide Licenses
• About the Flex Grid Activation License
• About the Flex Grid Activation for Managed Services License
• Obtaining Grid-wide Licenses
• Adding Permanent or Subscription Licenses
• Adding Temporary Licenses
• Viewing Licenses
• Viewing Member Licenses
• Viewing Dynamic Licenses
• Viewing Grid-wide Licenses
• Backing Up Licenses
• Removing Licenses
• NIOS Licenses
Note
Grid Manager does not distinguish between subscription and temporary licenses.
Note
Make a note of the hardware IDs that you obtain during this procedure. Each of these unique Hardware
ID values can be associated with a License Activation ID from your Contract Notification email. If a
license key is installed for the current VM, that key value also appears in the output for
the show license command.
Note
Each VM License Activation ID should have a Hardware ID associated with it. As you install and spin up each
virtual machine, establish written records for each Hardware ID with the VM License Activation IDs in a one-to-
one ratio. These value pairs are necessary should you need to contact Infoblox Technical Support.
3. In the Save as dialog, choose the location where you want to save the file.
4. Click Save.
Note
You must install both the Grid and vNIOS licenses on a vNIOS appliance for it to join the Grid. You can add
other licenses such as DNS, DHCP, or Cloud Platform depending on how you deploy your vNIOS virtual
appliances.
Note
You can also use the show license_pool_container CLI command to display the LPC_UID.
2. Contact Infoblox Technical Support or your Infoblox representative to obtain the dynamic licenses.
Note
If you install the Flex Grid Activation for Managed Services license, you cannot install the Flex Grid Activation
license and if you install the Flex Grid Activation license, you cannot install the Flex Grid Activation for Managed
Services license.
Note
Ensure that you obtain the license UID of the Grid Master. If you use the license UID of a Grid member or an
appliance that has not yet joined the Grid, you might not be able to properly install the Grid-wide license.
The license file (CSV) format for Grid-wide licenses are as follows:
GRID_WIDE,license_uid,license_type,[expiry_date],license_string
Note
To obtain the UID of the Grid, you can use the show license_uid command on the Grid Master.
For more information, refer to the Infoblox CLI Guide.
2. Contact Infoblox Technical Support or your Infoblox representatives to obtain the Grid-wide licenses.
Note
• Once the NIOS license is installed, you must wait for NIOS to restart (if prompted) before you install
other licenses.
• To transfer licenses between vNIOS on VMware appliances, refer to
the Infoblox Installation Guide for vNIOS for VMware.
Note
Once the NIOS license is installed, you must wait for NIOS to restart before you install other licenses.
Viewing Licenses
If the appliance is part of a Grid, you must log in to the Grid Master to view license information from Grid Manager. If the
appliance is an independent appliance, log in to System Manager on the appliance. If you have transferred licenses from
one vNIOS appliance to another, you can view information about the new and replaced licenses.
Grid Manager displays licenses on the Grid tab -> Licenses tab. You can view license information for all static and
dynamic licenses (including temporary licenses) on the Member tab, and a summary of dynamic licenses on the Pool
tab.
Note
The overall license status for a particular feature reflects the most critical status among all licenses in the pool.
For example, if there are expired licenses in the pool, the overall status for this license type appears as expired.
Backing Up Licenses
You can back up all static licenses, dynamic licenses added in the license pool container, and Grid-wide licenses in case
you need to re-install them at a later time. Infoblox recommends backing up the licenses before removing any of them.
Note
Dynamic licenses are not exported to this file. Dynamic licenses are automatically released and returned to the
license pool on the Grid Master when a member leaves the Grid. Unallocated dynamic Licenses are available
for allocations.
When you back up the licenses, Grid Manager creates a CSV file that lists the following information for each license:
serial number, hardware ID, license type, end date, and license string.
To back up licenses:
1. From the Grid tab, select the Licenses tab.
2. Click Export All Licenses in the toolbar. Grid Manager generates a CSV file that contains all the licenses.
Depending on the browser you use, you can then open the file or save it to a specified location.
Removing Licenses
You can remove licenses and reset a NIOS appliance to its factory default settings. For example, if you have a NIOS
appliance running the DNSone package with the Grid upgrade, but you want to use it as an independent appliance, you
can remove the Grid license. Infoblox recommends that you back up licenses before removing them, in case you decide
to re-install them at a future time.
When you remove a Grid-wide license, the licensed feature is deactivated on all the members that are affected by the
license. On the other hand, when you remove a Grid member from the Grid, the member no longer has the ability to run
the feature associated with the Grid-wide license now that is it not part of the Grid.
Note
• Exercise caution when removing licenses; you may render an appliance unusable by removing the
wrong license. Other feature sets may be affected once you remove a license; for example, removing
licensing for DNS and DHCP services will also disable task packs on the NIOS Dashboards –
> Tasks page.
NIOS Licenses
The following table lists NIOS licenses and the behavior when the subscription licenses expire:
Advanced DNS Advanced DNS Protection / Existing functionality continues to work as is. You can add new custom rules and publish.
Protection (ADP) / Threat protection You may not be able to upload new ruleset, but old rulesets remain functional.
Threat Protection
Security Ecosystem Outbound Notification Existing functionality continues to work as is with existing and new endpoints and
notifications. Integrations such as the FireEye feed will stop functioning as it is dependent
on RPZ.
DNS Cache DNS Cache Acceleration Existing functionality continues to work as is. Changes and new additions work fine.
Acceleration (DCA)
DNS DNS Existing functionality continues to work as is. Allows addition of new zones and networks.
DNS Traffic Control DNS Traffic Control Existing functionality continues to work as is.
(DTC)
Threat Analytics Threat Insight/Threat Analytics Existing functionality continues to work as is. New RPZ may not take effect as Named
server does not restart after license expiry.
DHCP DHCP Existing functionality continues to work as is. Allows addition of new zones and networks.
Microsoft • Management of New data (new zone) added on Microsoft server is not synchronized to NIOS.
Management (MS
MGMNT)
Microsoft DNS and
DHCP servers from
Infoblox Grid
Manager.
• Synchronization of
DNS and DHCP
data to the Grid
database.
Cloud Network Cloud network automation Existing functionality continues to work as is.
Automation (only if
IB-FLEX is used as
a Grid Master)
Cloud Platform Cloud Platform Existing functionality continues to work as is. The Cloud API is available. In Grid Manager,
you can manage cloud objects from the Grid -> Grid Manager -> Cloud-API tab.
You may not be able to add an A record on a zone that has Cloud Platform members
assigned to it.
Response Policy Response Policy Zone RPZ Feed zones and zone transfer continue to work. RPZ feeds will stop.
Zone (RPZ)
Grid • When installed on a Functionality continues to work as is with existing members. You may not be able to add
new members to the Grid.
member that has no
other Infoblox
licenses installed,
you can Join the
member to a Grid.
• When installed on a
Grid Master, you
can get the UID
required to obtain
dynamic licenses.
Reporting Reporting Reporting functionality continues to work as is and reports update. If the license related to
FireEye expires, old data does not show in the FireEye Alerts report.
The Flex Grid Activation • Grid Functionality continues to work as is for all features except for the Grid license,
license includes the where functionality works for existing members. You may not be able to add new
following licenses:
• Unbound members to the Grid.
• Grid • DNS Cache
• Unbound Acceleration
• DNS Cache • DNS
Acceleration • DHCP
• DNS • DNS Traffic Control
• DHCP • Response Policy Zone
• DNS Traffic • Software ADP
Control • Threat Protection
• Response Update
Policy Zone • DNSFW
• NXDOMAIN • NXDOMAIN Redirect
Redirect • Query rewrite
• Dual Engine • Threat Analytics
DNS (only for • Security Ecosystem
recursive • Captive Portal
DNS) • Microsoft Management
• Software • Cloud Network
Threat Automation (only if IB-
Protection FLEX is used as a Grid
• Threat Master).
Protection
Update
• Threat
Analytics
• Security
Ecosystem
• Microsoft
Management
• Cloud
Network
Automation
(applies only
to the IB-
FLEX Grid
Master)
Note
NTLMv2 is the only authentication method supported for Microsoft servers managed from Infoblox Grids. For
information about managing Microsoft Windows servers from Grid Manager, see Managing Microsoft Windows
Servers.
About IB-FLEX
IB-FLEX is a virtual platform that is scalable based on the resource that you allocate to the virtual machine. NIOS
automatically detects the capacity of the virtual machine and scales it to the appropriate platform after you provision the
IB-FLEX member.
You must first install the Grid license on a non IB-FLEX appliance that is designated as the Grid Master to allow
members to join the Grid, even if you have already installed an Flex Grid Activation license. This license does not affect a
non IB-FLEX Grid Master.
An IB-FLEX appliance designated as a member does not require any license, either Grid or vNIOS, while joining the
Grid. When you register an IB-FLEX member, the appliance checks for the Grid (enterprise) license and changes it to a
non IB-FLEX member. For an IB-FLEX appliance, it checks for an Flex Grid Activation Grid-wide license before node
registration.
IB-FLEX members can join the Grid through the MGMT interface when Software ADP is enabled. You can configure an
IB-FLEX appliance to function as a Grid Master or a member. To enable reporting for a Grid member that is running
Software ADP, you must configure the MGMT interface.
A non IB-FLEX appliance designated as a member requires either a Grid and/or vNIOS/NIOS licenses installed to join
the Grid. Similarly, for a reporting appliance to join the Grid, you must install a Grid and/or vNIOS/NIOS licenses. You
cannot assign pool licenses to an IB-FLEX appliance. IB-FLEX supports HA for appliances that are running Software
ADP.
Infoblox supports elastic scaling on IB-FLEX members that use the Flex Grid Activation Grid-wide license. It also
supports pre-provisioning for Software ADP on the supported platforms. You must add the new IB-FLEX model to the list
of supported pre-provisioning hardware types, so that you can select it during the member pre-provisioning. To pre-
provision a non IB-FLEX Grid member, you must have valid pool licenses and pre-provisioned those members in the
Grid.
Important
To set up a supported virtual appliance as an IB-FLEX, you must first define the hardware type of the virtual
appliance as IB-FLEX before you configure it. Depending on the platform or environment in which you are
installing IB-FLEX, you can define the hardware_type parameter to IB-FLEX during the cloud-init process, or
you can manually set the hardware type using the set hardware-type CLI command. For more information,
see set hardware-type.
Limitations of IB-FLEX
• It is not compatible with the traditional node-based licensing and it supports capacity based licensing only.
• An IB-FLEX instance will not start if you do not configure the required minimum level of resources.
Installing IB-FLEX
Depending on your network environment, you can install IB-FLEX just like how you install other Infoblox virtual
appliances. Before you deploy an IB-FLEX, ensure that you set the hardware type of the appliance to IB-FLEX. You can
do so either through the cloud-init process during deployment or manually through the set hardware-type CLI command.
For more information about installing IB-FLEX in the VMware environment, see Deploying vNIOS Appliances on VMware.
For information about installing IB-FLEX in the OpenStack environment, see Deploying vNIOS for KVM in OpenStack
Using Elastic Scaling.
The table below provides information about the IB-FLEX platform and various platform settings:
Total Resource Usage for Different Use Cases
Intended Use Total CPU Total Virtual Memory Total Virtual Memory Database Object Grid Master
GB (Without GB (With Software Count Capable
Software ADP) ADP)
DNS Query Rate by Query Type DNS Top RPZ Hits Flex Grid Licensing Features Enabled
DNS Query Rate by Member DNS Top RPZ Hits by Client CPU Utilization Trend
DNS Daily Query Rate by Member DNS RPZ Hits Trend By Mitigation Memory Utilization Trend
Action
Features IB-Flex IB- IB-2 IB- IB- IB-4 IB-4 IB- IB-
22 225 v2215 v2225 015 025 v4015 v40
15 25
Tiered licensing Licensing is based on the Flex Grid IB-40x5 appliances support four tiers of DNS QPS and the QPS levels
Activation license on the Grid. Note that the are enforced by rate limiting
queries per second are limited by the
number of CPUs for IB-FLEX.
RPZ Yes, the maximum cache lifetime for DNS Yes, the maximum cache lifetime for DNS cache acceleration is set to
cache acceleration is set to 300 seconds if 300 seconds if the RPZ license is installed.
RPZ zones are configured for the member.
DNS Views Yes, it supports up to six DNS views. Yes, it supports up to six DNS views.
Unbound as DNS resolver Yes, unbound is supported through the Flex Yes, unbound is supported if the Dual Engine DNS license is installed.
Grid Activation license.
DNS cache acceleration Yes, for NIOS version 8.2.0, restrictions are No
related restrictions for enforced based on whether the DNS cache
configuration acceleration feature is enabled or disabled.
DSCP No, Infoblox does not support DSCP for Infoblox does not support DSCP for physical or virtual appliances only
virtual appliances. if DCA is enabled.
Multiple-Interfaces on the No No
same subnet
IP Rate-limit and No No
Response logging
NXDomain-redirection Yes Ye
NX Mitigation No No
Traffic-capture (All modes) Yes, there is partial support. Note that Yes, there is partial support. Note that tcpdump captures both queries
tcpdump captures both queries and and responses.
responses.
CLI commands You can use the commands set dns-accel You can use the commands set dns-accel and show dns-accel to
and show dns-accel to view and set DNS view and set DNS cache acceleration information. For more
cache acceleration information. For more information, see CLI Commands.
information, see CLI Commands.
Threat Protection Supported on IB-FLEX platforms. Allows Supported on IB-FLEX platforms. Allows enabling Software ADP and
enabling Software ADP and DNS cache DNS cache acceleration simultaneously.
acceleration simultaneously on IB-FLEX
platforms.
Note
By default, all malformed packets are dropped early when the accelerated threat protection service is enabled.
Note
• Under certain circumstances, the DNS cache acceleration feature may not function normally when you
perform a product restart. This happens due to increased resource allocation on the virtual machine and
the appliance does not log any entries in the syslog. Infoblox recommends that you restart or reboot the
system and free up server resources if you encounter this issue.
• Before enabling DNS Cache Acceleration or ADP on virtual platforms, ensure that the ssse3, sse4_1,
and sse4_2 CPU flags are set on the host server. For more information, see https://help.ubuntu.com/lts/
serverguide/DPDK.html.en
• If you see the "/usr/bin/fast-path.sh: error starting /usr/bin/fp-rte. Check logs for details" error message
in the infoblox.log file, ensure that the ssse3, sse4_1, and sse4_2 flags are set for the VM.
Note
You must include the Grid and vNIOS provisional licenses for pre-provisioned vNIOS members in order
to join them to the Grid.
4. Generate a token for the Grid member, as described in Generating Tokens for Grid Members.
Note
For HA pairs, the appliance generates two tokens—one for each node of the HA pair.
5. Use cloud API calls to add network views, networks, or zones and then delegate the objects to the offline Grid
member. For information about sample cloud API requests, see Sample Cloud API Requests for Elastic Scaling.
6. Use API requests to join the Grid member to the Grid. For sample API requests, see Sample Cloud API Requests
for Elastic Scaling. If for any reasons the automated process of Elastic Scaling fails or if you are unable to send
API calls, you can use CLI commands to join the Grid member to the Grid as a workaround. For more
information, see Using CLI Commands to Join Grid Members.
7. Verify the Grid member has successfully joined the Grid, as described in Viewing Status.
8. Verify the dynamic licenses have been allocated correctly by viewing the license usage, as described in Viewing
Dynamic Licenses.
Note
You can use API calls as part of the automated deployment process to generate a token for the vNIOS Grid
member before joining it to the Grid. For information about sample API requests you can use to generate a
token, see Sample Cloud API Requests for Elastic Scaling. As a workaround, you can also generate a token
through Grid Manager.
Note
Copy this token and paste it at the CLI when you use the set token on command to set the token and
generate the token file.
Note
If for any reasons the automated process of Elastic Scaling does not function properly, you can use CLI
commands to join Grid members to the Grid as a workaround.
Note
You must enter n to use Elastic Scaling. If you enter y, the member becomes a Grid member and you
will not be able to set token and join the pre-provisioned member to the Grid.
4. Use the set token on command to set the member token, the Grid Master IP address and certificate to the
token file. Following is an example:
Infoblox > set token on
Enter GM-IP [Current: not defined]: <Enter the Grid Master IP address>
Enter Token [Current: not defined]: Copy token from the Your Permission Token dialog in Grid
Manager.
New Token Settings:
GM-IP: 1.1.1.1
Token: b25lLnZpcnR1YWxfbm9kZSQx
Is this correct? (y or n): y
Do you want to download the certificate form GM and validate (y or n): y
Is this correct and valid (y or n): y
Are you sure to apply and save settings to file?: y
The token and certificate are saved.
5. To verify the token:
Infoblox > show token
The CLI displays the current token setting and certification information. Verify this information.
Note
If there is incorrect information, use set token off to remove the token file.
6. Use the set token join command to register the Grid member and get licenses from the license pool before
joining the member to the Grid. Once the member joins the Grid, the token become invalid—you can use the
token only once.
Infoblox > set token join
Are you sure to start Member registration Client? (y or no): y Starting Member registration
Note
For HA pairs, repeat the CLI commands on both nodes.
Using OpenStack cloud-init template to configure Grid Master and join Grid members
You can use the following OpenStack cloud-init template to configure an IB-V815 as a Grid Master:
#infoblox-config remote_console_enabled: y default_admin_password: infoblox
temp_license: nios IB-V815 dns dhcp enterprise
lan1:
v4_addr: 10.2.0.132
v4_netmask: 255.255.255.0
v4_gw: 10.2.0.1
mgmt:
v4_addr: 10.1.0.69
v4_netmask: 255.255.255.0
v4_gw: 10.1.0.1
You can use the following OpenStack cloud-init template to join an IB-V815 member to the Grid:
v4_addr: 10.2.0.140
v4_netmask: 255.255.255.0
v4_gw: 10.2.0.1
mgmt:
v4_addr: 10.1.0.77
v4_netmask: 255.255.255.0
v4_gw: 10.1.0.1
gridmaster:
CERTIFICATE-----MIIDdzCCAl8CEBgaTP/XX2lAxDokwClJub4wDQYJKoZIhvcNAQEFBQAwejELMAkGA1UEBh
MCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAcTCVN1bm55dmFsZTERMA8GA1UEChMISW5mb2Jsb3gx
FDASBgNVBAsTC0VuZ2luZWVyaW5nMRkwFwYDVQQDExB3d3cuaW5mb2Jsb3guY29tMB4XDTE3MDMwNTE0NTE1M1
oXDTE4MDMwNTE0NTE1M1owejELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAcTCVN1
bm55dmFsZTERMA8GA1UEChMISW5mb2Jsb3gxFDASBgNVBAsTC0VuZ2luZWVyaW5nMRkwFwYDVQQDExB3d3cuaW
5mb2Jsb3guY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAsRf7VSVyYgRZCsdEgqU5m531Pk0H
qOlZ5CqWrcyGiKDYrbByPGATWSOKcQ9opUMj7VF3vttXOoY/f2pI8OAKrOr8ADWh70fqXFDWFAYsxGmP0dkFTd
NajI0reIrlYE0tF3FTBOZiXixfTUsI0hX96xNMU/0tHptloQxXz9+Uolf7ovFi6D0QBwjtBHmcVYhIJh0CfRUm
MsIZgCupKVfwXNo3BMQfyNKsePjfVvoxCWTXF+KfAv3JSOOARbwuAZiYcMl2rdKb+8vBq4+IaMwr83QaJV8cph
Ahyt5s7PebgS+GJLWzcIdUXSecDl3HEpJxLMnV0ko8ZByN5T4mywz6GQIDAQABMA0GCSqGSIb3DQEBBQUAA4IB
AQCWYwlB8Z5usHU0HL2WgyMkAZW8PYsjQNlv/aI/0kEkiJsvZc5H72frgbTA+whnz/CqsRu8Rd06VEi+3UqR7n
+0wRwSL6gWmlVBLNP3BZfsTKn0Bhd89hzUrSGtK07xF/kY2qUEb6LnJ91B1O46h7LUJutmzSPK2w10yY295kLe
You can use the following OpenStack cloud-init template to join an IB-V1415 member to the Grid:
#infoblox-config remote_console_enabled: y default_admin_password: infoblox
temp_license: nios IB-V1415 dns dhcp enterprise sw_tp tp_sub
#temp_license: nios IB-FLEX
lan1:
v4_addr: 10.2.0.28
v4_netmask: 255.255.255.0
v4_gw: 10.2.0.1
ha:
v4_addr: 10.2.0.30
v4_netmask: 255.255.255.0
v4_gw: 10.2.0.1
mgmt:
v4_addr: 10.1.0.29
v4_netmask: 255.255.255.0
v4_gw: 10.1.0.1
gridmaster:
certificate: -----BEGIN
CERTIFICATE-----MIIDdzCCAl8CEChqLtGPEl/kEVjEE488HtkwDQYJKoZIhvcNAQEFBQAwejELMAkGA1UEBh
MCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAcTCVN1bm55dmFsZTERMA8GA1UEChMISW5mb2Jsb3gx
FDASBgNVBAsTC0VuZ2luZWVyaW5nMRkwFwYDVQQDExB3d3cuaW5mb2Jsb3guY29tMB4XDTE3MDIyMjA5MDEyOV
oXDTE4MDIyMjA5MDEyOVowejELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAcTCVN1
bm55dmFsZTERMA8GA1UEChMISW5mb2Jsb3gxFDASBgNVBAsTC0VuZ2luZWVyaW5nMRkwFwYDVQQDExB3d3cuaW
5mb2Jsb3guY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEA02LEbIeAjjRZhBQSsPRIMoeR6GZC
SftQV+DPHPQAmvzPeJqaH8obCcRi6pfrPToxTKRCde7W87Tdy/uurZVXbJNWdtW7xhfelFVmdFuUGR+PId7oJd
nd9qmBLmUUPRniQDkk5pM8+g+olWjXPv2yn+zad+LaZpXUslP7TSfVvIeo6t2lwsUUxyozUnGLN9Pm91u/k/pz Cog2e+3y/
F2WPYQzmAC5KU5vY8Rl8iX8z/03eHhnVFITSrk15xgE5IQtlJG5C/RksFt/b5gcAFqh/7yUhCPvW2 pd8/xw/
caXsY2nFUC1b3jgUg+EfXpXE7EMD/thxqkhMNNK9GOhPrbVdQIDAQABMA0GCSqGSIb3DQEBBQUAA4IB
AQBiTz2cbVfUHIoQiLefSaf5Yv1fM6AyZ/sjPlVjYa0DBOdn4n1iiIL0tibPML3v3SVd2suAFPLmZdf1XTqkaT
rN8SLE0RR7fS/7Nz7eibPlXWGgeY6se8Br9cLWm+1AP7ugAPvjSZxBn87Spz6BfZKQ7L1NKHeqfu0UDuUvv2rO
tdlbRSHhb0INmm20LlMmLwmLxTCg/o7W2YaJa9lggyzz20oaZHGD1dLEP+mh2TsRyX/fxXYpwiAvmZ/VkccLgC xcj/
fU44hxLfFa+Ibz5sjYp1gExYfGFwUBDuf/7ftrBNh90qcXzXncrQAebGBHhRYtsDpRnpWH+qGAzTdJXTm8
---END CERTIFICATE---
You can use the following OpenStack cloud-init template to join an IB-V825 member to the Grid:
#infoblox-config remote_console_enabled: y default_admin_password: infoblox
temp_license: nios IB-V825 dns dhcp enterprise
lan1:
v6_addr: 2620:10a:6000:2708::17
v6_cidr: 64
v6_gw: 2620:10a:6000:2708::1
v6_addr: 2620:10a:6000:2701::a
v6_cidr: 64
v6_gw: 2620:10a:6000:2701::1
gridmaster:
CERTIFICATE-----MIIDdzCCAl8CEDdxmmxPWBgZpzPXFjO1fzowDQYJKoZIhvcNAQEFBQAwejELMAkGA1UEBh
MCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAcTCVN1bm55dmFsZTERMA8GA1UEChMISW5mb2Jsb3gx
FDASBgNVBAsTC0VuZ2luZWVyaW5nMRkwFwYDVQQDExB3d3cuaW5mb2Jsb3guY29tMB4XDTE3MDExMTEzNDY0OV
oXDTE4MDExMTEzNDY0OVowejELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExEjAQBgNVBAcTCVN1
bm55dmFsZTERMA8GA1UEChMISW5mb2Jsb3gxFDASBgNVBAsTC0VuZ2luZWVyaW5nMRkwFwYDVQQDExB3d3cuaW
5mb2Jsb3guY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEArDd9+rSVV7zah8S/zRSFPtmiEO0X
6SLPbXWFtI+5PdVyIzl+IcGrl0Z09hoNGddZvXTyzCJCKI/J5WA9+PzjJJnjRRjGaB8QLe3Pq8Dpe24VVpaL92
vVSkHAruKS9IjNZk2OxGrPC0EMVb8/8H6Q/Ym1Wmm8IocHXxL9syaSG6lyhJstsaNDV/J1U7d0Qwmx/wJ0OZv2
pJsHFKWGC8pnxH4IWSCPyKv1scJYmgUttVKzCzlAgQ6+qEbAMJXkfAF39Hak/gKwLArENOheQVZg0lbZV6fhIl
etmXNsr84wzELT7h2Xe4i6Dd01g287MCZAaLXzqDSGAhfVKcBkaCvs4wIDAQABMA0GCSqGSIb3DQEBBQUAA4IB
AQACqr/Sjo8e07Vqp/gUhzwRv27NISHpI0VXp0/j2Vl4JZ3kkPAIDgcmT9flHr6QLJc2KsU2WVyt8XPB0XYWes
jEJ4m468NVwGDkveDCnJ5le7/oYub3aKOYN8/Bkd5hju/GNmcKXybx8yPjw9hnXfG1sPT6H9UaMpxHx2cVH9se
EvLNbxIF2hVg/yX0kE+YOQP892up9IANVKjSFCsQEkZ6os961IZjzY/MQYr4aWoP1KfU825chZ7BqCCDQMj0Vx
CX2pHKzuFoCYB8a3/Tt0znlm/7ulRuHftqHAKLXeabLmxMJBW/5ZoX0RSjbr4OvcekwS2e7MuklnCMuSlJA2uL
---END CERTIFICATE---
To configure an IB-FLEX Grid Master using the Flex Grid Activation license, you can use the following OpenStack cloud-
init template:
#infoblox-config
remote_console_enabled: y
hardware_type: IB-FLEX
temp_license: flex_grid
lan1:
v4_addr: 10.39.51.33
v4_netmask: 255.255.255.0
v4_gw: 10.39.51.1
mgmt:
v4_addr: 10.39.50.22
v4_netmask: 255.255.255.0
v4_gw: 10.39.50.1
lan2:
nic_bonding_enabled: Y
bonding_failback_interface: lan1
mac:
mgmt: fa:16:3e:14:3a:ae
lan1: fa:16:3e:01:29:0b
ha: fa:16:3e:25:43:8a
lan2: fa:16:3e:8e:26:4c
Note
If there is a disruption in power when the NIOS appliance is operating, the NIOS appliance automatically
reboots itself when power is restored.
Forcing an HA Failover
If you want to change which node in an HA pair is active and which is passive, you can force a failover to occur. Within
five seconds after initiating a failover, the previously passive node becomes active and assumes ownership of the VIP
address. Note that a forced failover causes a temporary service disruption. To proceed with the forced failover, click OK.
The appliance logs this task in the audit log.
To restart a single Grid member:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member checkbox.
Note
The Grid member that you select must be an HA pair.
Note
If you have previously imported HTTPS certificates, the appliance regenerates the certificates and replaces
them.
Note
If you have previously imported HTTPS certificates, the NIOS appliance regenerates the certificates and
replaces them.
To reset the NIOS appliance to its factory settings and remove all its licenses:
1. Log in to the Infoblox CLI using a superuser account.
2. Enter the following CLI command: reset all licenses.
Caution: Never remove more than one disk at a time from the array. Removing two or more disks at once can cause an
array failure and result in an unrecoverable condition. You should replace only one disk at a time, using a replacement
disk from Infoblox. For information, see Replacing a Failed Disk Drive.
About RAID 10
RAID 10 (or sometimes called RAID 1+0) uses a minimum of four disk drives to create a RAID 0 array from two RAID 1
arrays, as shown in RAID 10 Array Configuration. It uses mirroring and striping to form a stripe of mirrored subsets. This
means that the array combines—or stripes—multiple disk drives, creating a single logical volume (RAID 0). RAID 10
combines the high performance of RAID 0 and the high fault tolerance of RAID 1. Striping disk drives improves database
write performance over a single disk drive for large databases. The disks are also mirrored (RAID 1), so that each disk in
the logical volume is fully redundant.
RAID 10 Array Configuration
When evaluating a fault on the Infoblox-4010, it is best to think of the disk subsystem as a single, integrated unit with four
components, rather than four independent disk drives. For information, see Evaluating the Status of the Disk Subsystem.
RAID_ARRAY: OPTIMAL
RAID_BATTERY: OK READY Yes 103 HOURS
The Detailed Status panel provides a detailed status report on the appliance and service operations. To see a detailed
status report:
• From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member checkbox -> Detailed Status
icon in the table toolbar.
After displaying the Detailed Status panel, you can view the status of the selected Grid member. For more information on
the Detailed Status panel, see Status Dashboard.
The RAID icons indicate the status of the RAID array on the Infoblox-4010.
Yellow A new disk was inserted and the RAID array is rebuilding.
Red The RAID array is degraded. At least one disk is not functioning properly. The GUI lists the
disks that are online. Replace only the disks that are offline.
The appliance also displays the type of each disk. In the event of a disk failure, you must replace the failed disk with one
that is qualified and shipped from Infoblox and has the same disk type as the rest of the disks in the array.
Infoblox-4010 uses only the IB-Type 3 disk type. All disk drives in the array must have the same disk type for the array to
function properly. You can have either IB-Type 1, IB-Type 2, or IB-Type-3, but you cannot mix both in the array. When you
have a mismatched disk in the array, you must promptly replace the disk with a replacement disk from Infoblox to avoid
operational issues.
On, off, or blinking Alternating amber and blue The drive has failed, or it has received a predictive failure
alert; it also has been selected by a management application.
On Amber, blinking regularly (1 Hz) The drive has received a predictive failure alert. Replace the
drive as soon as possible.
Blinking regularly (1Hz) Off Do not remove the drive. The drive is rebuilding. Removing
the drive may terminate the current operation and cause data
loss.
Blinking irregularly Amber, blinking regularly The drive is active, but it has received a predictive failure
(1 Hz) alert. Replace the drive as soon as possible.
Off Steadily amber A critical fault condition has been identified for this drive, and
the controller has placed it offline. Replace the drive as soon
as possible.
Off Amber, blinking regularly The drive has received a predictive failure alert. Replace the
(1 Hz) drive as soon as possible.
Note
Do not remove a correctly functioning drive.
3. Push in the latch for the drive and pull the release lever out towards you.
4. When the drive disengages, wait about 30 seconds for the disk to completely stop spinning.
5. Slide it out of the slot.
Replacement drives are shipped as a complete unit, ready to insert into the appliance. There is no preparation required.
To install a replacement drive, follow this procedure:
1. Insert the replacement drive into the drive bay slot.
2. Gently slide the drive into place. When you feel the release lever engage, continue applying gentle pressure to
the drive while pushing the release lever towards the appliance.
3. The release lever locks into place and the LED next to the disk drive lights up. Note that if the alarm buzzer is
sounding, it automatically turns off about 20 seconds after the drive is inserted.
4. The disk drive automatically goes into rebuild mode.
Restarting Services
Whenever you make a change such as adding a zone or a network, Grid Manager notifies you that a service restart is
required. You can enable the appliance to display the Restart Banner whenever it requires a service restart and prompt
the administrator to input the user name before restarting the services. For information about how to enable the restart
banner, see Changing Grid Properties. To view all pending activities that are waiting for service restart s , you can click
View Changes in the restart banner at the top of Grid Manager.
The pending activities include additions, modifications, and deletions performed by all administrators. You can also view
pending changes through the Restart <Grid/ Member> Services dialog box.
There are several ways to restart services on the affected Grid members. You can restart services at the Grid or member
level, or you can restart services by groups, as described in:
• Restarting Grid Services
• Restarting Member Services
• Restarting Services by Groups
You can configure services restart settings such as restart timeout or delay as described in Configuring Restart Settings.
Note
When you make configuration changes for DNS or DHCP and the service is enabled on at least one Grid
member, Grid Manager suggests a restart even if the service is disabled on the member affected by the
change.
For example:
USER jdoe insert service restart schedule '02/20/2007 01:30:00' on Grid Infoblox USER jdoe
deleted service restart schedule '02/22/2007 01:30:00' on node id 3
For more information on the audit log, see Using the Audit Log.
Note
When you restart services at the Grid level, the services are restarted only on those members for which you
have permissions.
Note
You can manage restart groups only if you are a superuser. If you are a limited-access user, you can see the
restart groups and their restart status only if these groups include members for which you have permissions.
When you restart services by groups, the services are restarted only on those members for which you have
permissions.
For more information on how to create and manage restart groups, see the following sections. For how to restart services
by groups, see Restarting Groups.
Note
For how to delay service restarts, see Configuring Restart Settings.
5. Click Next.
6. Add members by clicking the Add icon for each new member.
7. Click Next.
8. If you want to create a restart schedule for this group, select Enable Restart Schedule and specify the required
parameters.
Note
The restart schedule can run either once or on a recurring basis. It does not create scheduled tasks. If a
schedule is configured for a restart group, you can still perform one-time restarts independently for Grid
members or restart groups and create scheduled tasks for these restarts.
9. Select the restart type for the services on the affected members:
• If needed: Select this to restart services only if there are changes requiring a service restart.
• Force service restart: Select this to force a service restart even if it is not needed. A forced restart may be
delayed if there are pending restarts for the same service.
10. Click Next.
11. If necessary, specify the extensible attributes.
12. Click Save & Close.
Note
Normally, you cannot restart or schedule a restart of services when a scheduled full Grid upgrade is in
progress. However, you can do so for the Default DNS or DHCP restart group. In this case, only the
Grid Master is restarted. The other members of the group remain in the Timed Out status and are
restarted after Grid Manager gets a response from them. For more information about the full Grid
upgrades, see Guidelines for Scheduling Full Upgrades.
Note
If the delay time from the previous group restart has not elapsed yet, the new restart requests are
displayed with the Pending restart status. To speed up the new restarts, you change the delay between
restart groups to a smaller value at any time.
• Member Restart Timeout. This is the amount of time that the appliance waits for a response from a member. The
default is 1 minute.
5. Optionally, select the checkbox Apply restart requests to offline members when they connect.
6. Click Save & Close.
Note
File distribution services using TFTP, HTTP, and FTP is not supported by IPv6-only appliances.
Network devices, such as VoIP phones, can use the DHCP services on the appliance for IP address assignments and
use the file distribution services for IP device configuration downloads. Downloads can be accomplished with TFTP,
HTTP, or FTP.
Uploading and retrieving files
Note
To avoid data loss, after you change the storage limit FD services will be disrupted briefly and will take
some time to resume. Wait until the File Distribution services are running again on the members before
you upload any files.
Note
For HTTP service, you can grant permissions to all clients or specific clients, but you can deny permissions only
to all clients, not specific clients.
When you grant access to a network for a specific file distribution service, all clients in the network are allowed to request
file distribution service. You can deny services to specific IP addresses within the network by adding these addresses to
an access control list and denying access to the service. Ensure that you list these IP addresses before the network
address in the list because the appliance applies permissions to the addresses in the order they are listed. You can use
the arrow keys to move the addresses up and down the list after you add them. For information about how to create a
Note
When you start or stop a service, there may be a short delay before Grid Manager displays the correct
status.
Managing Directories
You can create directories on the Grid Master and on Grid members, in which you can store your files. You can manage
the directories in the following ways:
• Create a directory structure for file distribution, as described in Adding Directories.
• Modify the directory name and permissions, as described in Modifying Directories.
• Create a Virtual TFTP root directory, as described in Creating a Virtual TFTP Root Directory.
• View the directories, as described in Viewing Directories From the Files Tab.
Modifying Directories
1. From the Data Management tab, select the File Distribution tab -> Files tab.
2. Select a directory checkbox and click the Edit icon.
3. The Directory editor provides the following tabs from which you can modify data:
• General: You can modify the directory name here, except for the Root directory.
• Virtual TFTP Root: You can add an IP Address, a Network or a Range of IP addresses to support VMware
ESX hosts who need different PXE boot images based on where they are in the network.
• Permissions: You can add or delete admin permissions in this tab. For information, see About
Administrative Permissions.
4. Save the configuration and click Restart if it appears at the top of the screen.
You can also select a directory and click the Delete icon to delete it.
Note
When you delete a directory, the appliance automatically removes all its contents in that directory.
Note
Root directory can not be a virtual TFTP root.
1. From the Data Management tab, select the File Distribution tab -> Files tab.
2. Select the directory checkbox and click the Edit icon.
3. In the Directory editor select Virtual TFTP Root. Click the Add icon and select one of the following:
• IP Address: This creates a virtual TFTP directory that the clients from a specified IP address will see as
the root directory.
• Network: This creates a virtual TFTP directory that the clients on a specified network will see as the root
directory.
• Range: This creates a virtual TFTP directory that the clients in a specified range of IP addresses will see
as the root directory.
4. From the drop-down in the Member column, select the member on which to make the virtual TFTP root directory.
5. In the Address/Network column, enter a value:
• IP Address: Enter the IP address of the client that will have access to the virtual TFTP root directory. This
IP address must be on the allow list in the TFTP access control list.
• Network: Enter a network address using the format 10.0.0.0/24. This allows all clients in that network to
access the virtual TFTP root directory. This network address must be on the allow list in the TFTP access
control list.
• Range: Enter the first IP address in the range Address/Network column, and the last IP address in the
range in the End column. This allows all clients in that range to access the virtual TFTP root directory. This
range must be on the allow list in the TFTP access control list.
6. Click Save & Close. Click Restart if it appears at the top of the screen.
7. To create more virtual TFTP root directories, repeat Steps 3 through 5.
Managing Files
This section describes how to upload files using the Grid Manager or a file transfer client. You can upload files to the Grid
Master or to individual members.
Uploading Files
Some things to keep in mind when you upload files:
• When you use the Grid Manager to upload files, you can upload files only to the Grid Master, not to individual
members of the Grid.
• To upload files to a member, you must use an FTP client, TFTP client or HTTP client. Files uploaded by file
transfer clients to any member, will be synchronized back to Grid Master.
• The logs for file transfers using third party clients can be found in syslog.
• You can use a third party file transfer client to upload and retrieve files:
• If the 'anonymous' login is enabled, you can retrieve files but this 'anonymous' user can not upload files
even if the "Allow uploads" option is enabled.
• If you create a user to use with a third party transfer client, this must be an FTP user with read/write
permissions in their directory.
• You can upload a maximum of 10,000 files.
• If uploading a file exceeds the storage limit of 2 GB for a single file, NIOS logs a message and does not upload
the file. For information about file distribution storage, see Modifying File Distribution Storage Limits.
• If you upload a file that has the same name and path as an existing file, NIOS automatically replaces the old file.
Note
Administrators with superuser privileges can manage uploading files. Limited-access admins with read/write
permissions to specific directories can upload files to the directories. For information,
see Administrative Permissions for File Distribution Services.
Note
The directory structure in the compressed file is restored when the files are extracted. A directory that
already exists it will be replaced by an extracted directory with the same name.
Note
You can delete an incorrect file selection by clicking the red icon next to the filename before you click
Upload
8. To verify the upload was successful. roll the mouse cursor over the green check mark next to the file name. If the
upload was successful, the message "Upload succeeded." appears.
Viewing Files
You can view files from the Files Tab and from the Members Tab.
Tip: When you drill down on the Grid Master from the Members tab, the Add icon is activated.
4. To see the files on a member, click on the name of the member. Grid Manager displays the following information:
• Name: The name of the file.
• Type: Depending on the file type, this can be Directory or File.
• Size: The file size in B, KB, or MB depending on whether the file size crosses the unit limit or not. For
example, if the file size is 1023, Grid Manager displays 1023 B. If the file size is 1025, Grid Manager
displays 1 KB. For a directory, Grid Manager displays a dash (-).
• Date Modified: The timestamp when the directory was last created or when the file was last modified.
Note
You cannot upload, modify, or delete a file or a directory when you drill down from the Members
tab.
Managing Users
This section describes how to add and modify user accounts for use with an FTP client.
You must be a NIOS admin user with super user privileges to add, modify, or delete FTP users. FTP users are created at
Grid level, so the same users will be available to access FTP service on all members.
• Each user must have unique Username.
• By default, the home directory with the user name is under the /ftpusers directory. However, the user can also
choose to use an existing directory outside of /ftpusers as his home directory. If the admin specified home
directory is not available then it will raise an error.
• Permission: Read-write or Read-only are assigned for each FTP user. Users with read-write permissions are
allowed to upload files, delete files and list the files and directories under his home directory.
• You can have multiple users to use same home directory. One user may have read-only permissions while others
have read-write permissions on same home directory.
• FTP users are not allowed to add, modify, or delete the directories, even with read-write permissions.
• If the "Allow uploads on the member" is disabled, then users with read-write permission also can not upload files
to his home directory.
bloxTools Environment
The bloxTools environment provides a pre-installed environment for hosting custom web-based applications. This section
includes the following topics:
Note
In previous NIOS releases, you could run the bloxTools service only on a Grid Master. If bloxTools has been
configured to run on a Grid Master before an upgrade, the bloxTools service continues to run on the Grid
Master after an upgrade. This configuration is preserved mainly for migration purposes only. Infoblox strongly
recommends that you move the bloxTools service to a Grid member after the upgrade. For information,
see Moving the bloxTools Service.
In a Grid, you can run the bloxTools service only on one Grid member at a time, and you cannot configure this member
as a Grid Master candidate. However, you can move the bloxTools service from one member to another. For information,
see Moving the bloxTools Service.
On an HA member, the bloxTools service runs on the active node. If there is an HA failover, the bloxTools service is
automatically launched after the passive node becomes active. For information, see About HA Pairs.
Note
When you run the bloxTools service on an independent appliance or a Grid member, the performance of other
services running on the appliance may be affected. Infoblox recommends that you run the bloxTools
environment on a member that does not host critical services.
After you enable the bloxTools service and configure its built-in file transfer services, you can upload content to the
bloxTools portal using either an FTP (File Transfer Protocol) or SFTP (SSH File Transfer Protocol) client. The uploaded
content is included in system backups and you can restore it from the backups.
If you have further questions about bloxTools, visit the community site at https://community.infoblox.com.
System Requirements
The following table shows which Infoblox physical appliances support the bloxTools service.
TE-815
TE-1415
TE-2215
The following table shows which Infoblox appliances support the bloxTools service and the memory requirement for
each. The service "borrows" host resources such as CPU, memory, and disk space from the host Infoblox appliance.
WARNING: Resetting the Grid member using either the reset all or reset database CLI commands permanently deletes
the content you uploaded to the bloxTools environment. Infoblox recommends that you backup the appliance before
using any of these commands.
Note
When you redirect HTTP to HTTPS, the connection is not as secure as compared to connecting directly
through HTTPS.
Note the following when you configure the bloxTools service on port 443:
• HTTP to HTTPS redirection from Grid member to Grid Master is disabled.
• HTTP file distribution service is not allowed.
In previous NIOS releases, you could run the bloxTools service on a Grid Master or a Grid Master candidate. If you have
not removed the bloxTools service from a member before you upgrade it to NIOS 6.11.0 or later, you cannot configure the
bloxTools service on port 443 until you move the bloxTools service to an upgraded Grid member. For information, see
Moving the bloxTools Service.
To configure the bloxTools service:
1. Log in as a superuser.
2. From the Grid tab, select the Grid Manager tab, and then click bloxTools. In the Services tab, click Edit -> Grid
bloxTools Properties from the Toolbar.
3. In the Grid bloxTools Properties editor, complete the following:
• Enable Web Service: Select HTTPS Port to enable users to access the applications through an HTTPS
connection. The default port is 444. You can change the default HTTPS port to 443 or to a port between
1024 to 63999.
Note
The password is sent as clear text when you use the FTP service. To maintain security on the Infoblox
appliance, this password should be different from the password set for the Infoblox appliance.
4. Save the configuration and click Restart if it appears at the top of the screen.
When you configure the bloxTools service on an independent appliance, you can configure the allocated memory in the
System bloxTools Properties editor. For information, see Allocating Memory.
Allocating Memory
You can configure the memory you want to allocate to the bloxTools service. You must configure this at the member level.
If you run the bloxTools service on an independent appliance, you can configure the allocated memory in the System
bloxTools Properties editor.
To configure the allocated memory:
1. Log in as a superuser.
2. From the Grid tab, select the GridManager tab, and then click bloxTools. In the Services tab, click Edit ->
MemberbloxToolsProperties from the Toolbar.
3. In the MemberbloxToolsProperties editor, complete the following:
• Allocated Memory (MB): The service "borrows" host resources such as CPU, memory, and disk space from the
host Infoblox appliance. The default amount of memory the appliance allocates for the bloxTools environment is
256 MB. You can change this allocation, depending on the appliance platform. See System Requirements for the
requirements and allowed values of each appliance.
Uploading Files
Use an FTP or a SFTP client to upload content, such as Perl modules, JavaScript files, PHP files, CGI files, and image
files, to the bloxTools environment. You can upload a maximum of 4 GB of data. After you have uploaded content to your
bloxTools environment, you should disable the FTP and SFTP services to prevent unauthorized or accidental changes.
To upload files using the FTP service:
1. Open an Internet browser window and log in to the FTP service by entering:
ftp://Grid_member_ip_addr:ftp_port
For example, if the IP address of the Grid member is 10.1.1.1 and the FTP port number is 26, enter: ftp://
10.1.1.1:26
2. In the Authentication Required dialog box, enter the username and password. This is the username and
password you entered for the FTP service in the bloxTools Environment editor on the appliance.
3. Follow the instructions provided by your FTP client to upload the files.
To upload files using the SFTP service:
1. Open a terminal window and log in to the SFTP service by entering:
sftp -oPort=sftp_port sftp_user@Grid_member_ip_addr
For example, if the IP address of the Grid member is 10.1.1.1, the login username for the SFTP service is jdoe,
Note
On a computer running Microsoft Windows, you can use WinSCP as the FTP or SFTP client for uploading files.
The bloxTools environment stores the uploaded data in the /portal directory.
Scheduling Tasks
bloxTools includes support for the Perl module Config::Crontab so you can manage scheduler services. You can use the
scheduler to execute commands in the future. You can also schedule recurring commands. For example, you can
schedule the creation of a host record or schedule recurring reports. The scheduler allows default "user level" crontab
access and you can use the user account 'nobody' to submit commands. The Grid Master replicates the crontab data to
the Master Candidates.
Yellow Usage of at least one of the following resources is greater than or equal to 80%: CPU,
memory or disk. The description indicates the percentage of each resource.
Red The bloxTools Environment is down, or an essential service within the bloxTools
Environment has failed.
Note
The RIR registration update feature is not supported in a Multi-Grid configuration.
Note
Before the NIOS appliance sends registration updates to the RIPE database, it does not validate the data you
submit. Therefore, if you enter invalid information that cannot be mapped to the RIPE database, your updates
will fail. In addition, the NIOS appliance does not synchronize data from the RIPE database
Note
Ensure that you configure DNS resolvers for the Grid when you enable this feature. For information
about how to configure DNS resolvers, see Enabling DNS Resolution.
Note
You cannot leave an optional RIR attribute value empty. If you do not have a value for an RIR attribute,
you must delete it from the table. You can enter up to 256 characters for all RIR attributes.
3. Save the configuration. Note that you cannot schedule the creation, modification, or deletion of an RIR
organization.
Note
You can also add RIR networks through Task Dashboard. For information, see The Tasks Dashboard.
After you create an RIR network container or network, you can perform the following:
• Split a network that has an organization ID. A child network that is created does not contain an organization ID by
default. You must assign an organization ID to the child network after splitting it. For information about splitting an
RIR network, see Splitting IPv4 Networks into Subnets and Splitting IPv6 Networks into Subnets.
• Resize an IPv4 RIR network that contains an organization ID and has been registered with RIPE. For more
information, see Resizing IPv4 Networks.
Note
RIPE does not support UTF-8 data in the Description and Remarks fields. After an upgrade, the NIOS
appliance keeps the UTF-8 data in these fields. However, if you want to modify these fields after the upgrade,
you must remove the UTF-8 data before you can save the changes.
When you enter a value for the following RIR attributes that cannot be mapped to a valid reference in the RIPE database,
updates to the RIR database will fail. However, these values will still be displayed in the IPv4 or IPv6 network or network
container panels of Grid Manager.
• RIPE Routes Maintainer
• RIPE Lower Level Maintainer
• RIPE Reverse Domain Maintainer
• RIPE Admin Contact
• RIPE Technical Contact
• RIPE Computer Security Incident Response Team
You can add multiple values for certain RIR attributes. When you add multiple values of the same attribute, the appliance
groups the values in the order they are listed in the attribute table. You can also reorder the RIR attributes using the up
and down arrows in the attribute tables.
RIPE Description descr Enter a short description about the organization. Optional
RIPE Country country From the drop-down menu, select the country name, followed Required
by the two-letter ISO 3166 country code, of the country or area
within the RIPE NCC service region or through Local Internet
Registries.
RIPE Admin Contact admin-c Enter the name of the on-site admin contact for the Required
organization. Enter the name in this format: Start with two to
four optional characters, followed by up to six optional digits,
and then follow by a source specification. The first digit cannot
be "0". The source specification starts with "-" followed by the
source name that contains up to nine characters in length.
RIPE Technical Contact tech-c Enter the name of the technical contact for the organization. Required
Enter the name in this format: Start with two to four optional
characters, followed by up to six optional digits, and then follow
by a source specification. The first digit cannot be "0". The
source specification starts with "-" followed by the source name
that contains up to nine characters in length.
RIPE Notify notify Enter the email address to which notifications of changes to the Optional
organization will be sent.
RIPE Registry Source source From the drop-down list, select the registry at which the Optional
organization is registered. The default is RIPE. Select RIPE for
the RIPE database, which is the authoritative database. Select
TEST for the RIPE TEST database that operates in the same
way as the RIPE database but contains only test data. Note that
test data is cleaned out at the start of each month and a
predetermined set of basic objects is re-inserted. You can use
the RIPE TEST database to learn how to update the database
and try out special scenarios. The RIPE TEST database has
fewer restrictions which allows you to create encompassing or
parent objects you may need for testing.
RIPE Organization Type org-type From the drop-down list, select one of the following organization Optional
type:
• IANA for Internet Assigned Numbers
Authority
• RIR for Regional Internet Registry
• NIR for National Internet Registry
• LIR for Local Internet Registry
• WHITEPAGES for special industry people
• DIRECT_ASSIGNMENT for direct contract
with RIPE NCC
• OTHER for all other organizations
Note: Only the RIPE database admin can set the organization
type, and there are no NIRs in the RIPE NCC service region.
RIPE Phone Number phone Enter the organization phone number in numeric format starting Optional
with the + character, followed by the country code, area code,
and the phone number. For example, you can enter
+18089991000. You can also use one of the following formats:
• '+' <integer-list>
• '+' <integer-list> "(" <integer-list> ")" <integer-
list>
• '+' <integer-list> ext. <integer list>
• '+' <integer-list> "(" integer list ")" <integer-
list> ext. <integer-list>
RIPE Fax Number fax-no Enter the organization fax number in numeric format starting Optional
with the + character, followed by the country code, area code,
and the fax number. For example, you can enter
+16052529000. You can also use one of the following formats:
• '+' <integer-list>
• '+' <integer-list> "(" <integer-list> ")" <integer-
list>
• '+' <integer-list> ext. <integer list>
• '+' <integer-list> "(" integer list ")" <integer-
list> ext. <integer-list>
RIPE Abuse Mailbox abuse-mailbox Enter the email address to which abuse complaints are sent. Optional
RIPE Reference Notify ref-nfy Enter the email address to which notifications are sent when a Optional
reference to the organization object is added or removed.
RIPE Admin admin-c The name of the on-site admin contact for the network address. This attribute is populated from the Requi
Contact organizational attribute. red
You can modify the value in this format: Start with two to four optional characters, followed by up to six
optional digits, and then follow by a source specification. The first digit cannot be "0". The source
specification starts with "-" followed by the source name that contains up to nine characters in length.
RIPE mnt-irt The name of the Computer Security Incident Response Team (CSIRT) that handles security incidents for the Optio
Computer network address. nal
Security You can enter the value in this format: Use letters, digits, the character underscore "_", and the character
Incident hyphen "-". The value must start with "irt-", and the last character of a name must be a letter or a digit. You
Response must enter a minimum of five characters.
Team
RIPE country The two-letter ISO 3166 country code of the country within the RIPE NCC service region or through Local Requi
Country Internet Registries. This attribute is populated from the organizational attribute. You can select a different red
country code from the drop-down list.
RIPE IPv4 status The status of the IPv4 network address. From the drop-down list, select one of the following status: Requi
Status ALLOCATED PA red
ALLOCATED PI
ALLOCATED UNSPECIFIED
LIR-PARTITIONED PA
LIR-PARTITIONED PI
SUB-ALLOCATED PA
ASSIGNED PA
ASSIGNED PI
ASSIGNED ANYCAST
EARLY-REGISTRATION
NOT-SET
RIPE IPv6 status The status of the IPv6 network address. From the drop-down list, select one of the following: Requi
Status ALLOCATED-BY-RIR red
ALLOCATED-BY-LIR
ASSIGNED
ASSIGNED ANYCAST
ASSIGNED PI
RIPE Lower mnt-lower Enter the name of the registered maintainer for hierarchical authorization purposes. This can protect the Optio
Level creation of networks directly (one level) below in the hierarchy of a network container or another network. The nal
Maintainer authentication method of the maintainer will be used upon creation of any network directly below the network
that contains the "mnt-lower:" attribute.
Enter the maintainer name in this format: Use letters, digits, the character underscore "_", and the character
hyphen "-". The first character must be a letter, and the last character must be a letter or a digit. You cannot
use the following words (they are reserved by RPSL): any, as-any, rs-any, peer, as, and, or, not, atomic, from,
to, at, action, accept, announce, except, refine, networks, into, inbound, outbound. Also note the following:
Names starting
with certain prefixes are reserved for certain object types. Names starting with "as-" are reserved for as set
names. Names starting with "rs-" are reserved for route set names. Names starting with "rtrs-" are reserved
for router set names. Names starting with "fltr-" are reserved for filter set names. Names starting with "prng-"
are reserved for peering set names. Names starting with "irt-" are reserved for irt names.
RIPE netname The name of the IP address range. You can enter up to 80 characters. Enter the network name in this format: Requi
Network Use letters, digits, the character underscore "_", and the character hyphen "-". The first character must be a red
Name letter, and the last character must be a letter or a digit.
RIPE Notify notify Enter the email address to which notifications of changes to the object must be sent. Optio
nal
RIPE source From the drop-down list, select the registry at which the organization is registered. The default is RIPE. Requi
Registry Select RIPE for the RIPE database, which is the authoritative database. Select TEST for the RIPE TEST red
Source database that operates in the same way as the RIPE database but contains only test data. Note that test data
is cleaned out at the start of each month and a predetermined set of basic objects is re-inserted. You can use
the RIPE TEST database to learn how to update the database and try out special scenarios. The RIPE TEST
database has fewer restrictions which allows you to create encompassing or parent objects you may need for
testing.
RIPE mnt- Enter the name of a registered maintainer used for reverse domain authorization. This can protect domain Optio
Reverse domains objects. The authentication method of this maintainer will be used for any encompassing reverse domain nal
Domain object.
Maintainer Enter the maintainer name in this format: You can use letters, digits, the character underscore "_", and the
character hyphen "-". The first character must be a letter, and the last character must be a letter or a digit.
You cannot use the following words (they are reserved by RPSL): any, as-any, rs-any, peer, as, and, or, not,
atomic, from, to, at, action, accept, announce, except, refine, networks, into, inbound, outbound. Also note
the following: Names starting with certain prefixes are reserved for certain object types. Names starting with
"as-" are reserved for as set names. Names starting with "rs-" are reserved for route set names. Names
starting with "rtrs-" are reserved for router set names. Names starting with "fltr-" are reserved for filter set
names. Names starting with "prng-" are reserved for peering set names. Names starting with "irt-" are
reserved for irt names.
RIPE mnt-routes This attribute references a maintainer that is used in determining authorization for the creation of route Optio
Routes objects. Enter the name in this format: Start with the reference to the maintainer, followed by an optional list nal
Maintainer of prefix ranges inside of curly brackets or the keyword "ANY". The default, when no additional set items are
specified, is "ANY". For more information, refer to RFC-2622. Example: <mnt-name> [ { list of <address-
prefix-range> } | ANY ].
RIPE tech-c The name of the technical contact for the network. Enter the name in this format: Start with two to four Requi
Technical optional characters, followed by up to six optional digits, and then follow by a source specification. The first red
Contact digit cannot be "0". The source specification starts with "-" followed by the source name that contains up to
nine characters in length.
IP Address Management
IPAM (IP Address Management) is the allocation, administration, reporting, and tracking of IP addresses, network
devices, and their associated data. This section provides information about IPAM and how to use the Infoblox tools to
perform IPAM tasks and manage your entire IP network. It includes the following topics:
• Managing IP Addresses
• IP Discovery and vDiscovery
• Infoblox Network Insight
Managing IP Addresses
This section describes how to manage your networks and IP addresses through the Infoblox IPAM (IP Address
Management) implementation. It contains the following topics:
You can perform the following IPAM tasks to effectively manage and control your network:
• Create host records. Host records integrate the DNS records and DHCP data of a network device. You can use a
host record to manage a network device from one central point. For more information, see About Host Records.
• Create IPv4 and IPv6 networks. For information, see About Network Containers.
• Discover devices in IPv4 and IPv6 networks and other Objects created in IPAM. For more information, see
Adding IPv4 and IPv6 Network Containers and Networks, Adding Host Records. View your IPv4 network and
address utilization in a graphical mode. For information, see IPv4 Network Map and IP Map.
• When necessary, resize, join, or split networks. For information, see Resizing IPv4 Networks, Splitting IPv4
Networks into Subnets, Joining IPv4 Networks,Splitting IPv6 Networks into Subnets, and Joining IPv6 Networks.
• Manage IPv4 and IPv6 address data. For information, see Viewing and Managing IPv4 Addresses,Viewing IPv6
Data , and Managing IPv4 and IPv6 Addresses.
Note
The appliance cannot respond if there is no PTR record and a PTR record is not created if there is no
corresponding reverse-mapping zone.
Additionally, if you specify an alias in the host record, the appliance uses this data as a CNAME record to respond to
queries with the alias. It maps the alias to the canonical name and sends back a response with the canonical name and
IP address of the host. Thus, a single host record is equivalent to creating A, PTR, and CNAME resource records for an
IPv4 address and AAAA and PTR records for an IPv6 address. The appliance supports IDNs for a host record. You can
specify alias and domain names in the native character set. For information about IDN support, see Support for
Internationalized Domain Names.
Hosts also support prefix delegation for IPv6. For example, you can specify an IPv6 prefix in the host record of a router.
The router then advertises this prefix on one of its interfaces, so hosts that connect to the interface can generate their IP
addresses, using the stateless autoconfiguration mechanism defined in RFC 2462, IPv6 Stateless Autoconfiguration.
In addition, if the Infoblox DHCP server manages the IP address assigned to the host, the server uses it as a fixed
address record as well. The DHCP server assigns the IP address to the host when it receives a DHCP request with the
matching MAC address or DUID. Its response includes configuration information, and any DHCP options defined for the
host or inherited from the network to which the fixed address belongs. You can also assign multiple IPv4 and IPv6
addresses to a host, as described in Assigning Multiple IP Addresses to a Host.
You can copy an existing host record and turn it into a new one. When you copy a host record, other than the new host
name and IP address, all DHCP and IPAM configuration including the MAC address and extensible attributes apply to the
new record. You can also modify information, except for the host name and IP address, of an existing host record. For
information about how to copy or modify a host record, see Copying and Modifying Host Records. Note that you can also
modify an IPv4 host record and turn it into a IPv4 reservation. For information, see Configuring IPv4 Reservations.
You can execute immediate discovery on a host record. This simple setting enables you to determine the precise type of
device that is associated with the host, along with its IP addresses, its name and other information.
You can define extensible attributes for a host record to further describe the device. You can include information such as
its location and owner for IP address management purposes. For information about extensible attributes, see About
Extensible Attributes.
The below figure illustrates how the appliance uses the host record for both DHCP and DNS.
Note
If you select to protect the record, ensure that you also select the Prevent dynamic updates to
RRsets containing protected records checkbox in the advanced updates properties of the Grid,
view, zone, or Standalone appliance.
Alternatively, you can protect records by selecting them, individually or in bulk, in the Resource Records Viewer
and clicking Protect Records -> Enable Protection in the Toolbar.
• DNS View: Displays the DNS view for the host record. This appears only when you enable the host record in
DNS.
• Host Name Policy: Displays the host name policy of the selected zone. This appears only when you enable the
host record in DNS.
• RRset Order: Select one of the following RRset orders that the appliance uses to return A and AAAA records of
the host. This checkbox appears only when you have enabled the configuration of RRset order for the Grid and
there are multiple IP addresses in this host record. For information about how to enable this feature, see Enabling
the Configuration of RRset Orders.
• Cyclic: The records are returned in a round robin pattern. This is the default.
• Fixed: The records are returned in the order you specify in this host record. When you select this
checkbox, the appliance displays up and down arrows next to the IPv4 and IPv6 address tables. You can
use these arrows to reorder the address list. The appliance returns the A and AAAA records of this host
based on the order you define in the address tables.
• Random: The records are returned in a random order.
Note that when you specify Fixed as the RRset order, the appliance places the resource records as
follows:
• A and AAAA records of the host in the fixed order you specify in the address tables. Note that the order of
the returned A and AAAA records are independent of each other.
• Other A and AAAA records in an undefined order.
• Other record types in the default cyclic order.
For more information about RRset order, see Enabling the Configuration of RRset Orders.
From Grid Manager, you can click the link of the network container 20.0.0.0/8 in the IP List panel and drill down to the
two network containers, 20.8.0.0/13 and 20.7.0.0/13, as shown in the below figure. You can click the network container
links to drill down further to the leaf networks.
IP List View of Network Containers
In the IPAM tab, when you create an IPv4 or IPv6 network that belongs to a larger network, the appliance automatically
creates a network container and puts the leaf network in the container. The appliance also creates network containers
when you split IPv4 or IPv6 networks into smaller networks. For information, see Splitting IPv4 Networks into Subnets
and Splitting IPv6 Networks into Subnets.
Note
If the Discover Now button and other associated discovery elements are disabled on the Toolbar, it
indicates that discovery is not enabled for the parent network of the selected network or IP, or the
network is not associated with a discovery appliance.
Delete one or multiple networks, as described in Discovering Networks (Under Network Insight only).
• Clear All Unmanaged Data or Clear All Discovered Data, as described in the section Clearing Discovered Data.
• Switch to the List view of the network. For information, see IPAM Home.
• When you select one or more networks in Net Map and then switch to the List view, the list displays the
page with the first selected network.
• If you select one or more networks in the List view and then switch to the Net Map view, the first network
is also selected in Net Map. If you select a network in the List view that is part of a Multiple Networks
block in Net Map, it is not selected when you switch to the Net Map view.
IPAM Home
The IPAM Home panel is an alternative view of an IPv4 and IPv6 network hierarchy. For a given network, the panel
shows all the networks of a selected network view in table format. This panel displays only the first-level subnets. It does
not show further descendant or child subnets. You can open a subnet to view its child subnets. Subnets that contain child
subnets are displayed as network containers. If the number of subnets in a network exceeds the maximum page size of
the table, the network list displays the subnets on multiple pages. You can use the page navigation buttons at the bottom
of the table to navigate through the pages of subnets.
The IPAM home panel displays the following:
• Network: The network address.
• Comment: The information you entered about the network.
• RIR Organization: This appears only if support for RIR updates is enabled. This displays the name of the RIR
organization to which the network is assigned.
• RIR OrganizationID: This appears only if support for RIR updates is enabled. This displays the ID of the RIR
organization to which the network is assigned.
• RIR RegistrationStatus: This appears only if support for RIR update is enabled. This field displays the RIR
registration status. This can be Registered or Not Registered. Registered indicates that the network has a
corresponding entry in the RIPE database.
• Last Registration Updated: Displays the timestamp when the last registration was updated. The displayed
timestamp reflects the timestamp used on the Grid Master.
• Status of Last Registration Update: Displays the registration status and communication method of the last
registration update. The status can be Pending, Sent, Succeeded, or Failed. Each time you send a registration
update to create, modify, or delete a network container or network, the updated status will be displayed here. If
you have selected not to send registration updates, the previous status is retained.
• IPAM Utilization: For a network, this is the percentage based on the IP addresses in use divided by the total
addresses in the network. For example, in a /24 network, if there are 25 static IP addresses defined and a DHCP
Note
As a general rule for the VRF-related columns, a column displays a specific value if there is a single
non-empty value or several same values for the IP addresses in the network. Otherwise, the column
displays “Multiple”. For example, if the VRF names for a network have the same value, the VRF
Name column displays this value for the network. If more than one VRF are discovered for a network
and their names are different, the VRF Name column displays “Multiple”. However, if for a number of
VRFs there is only one VRF description or VRF RD value among other empty strings, the columns VRF
Description and VRF RD display “Multiple” as this is regarded as distinct VRFs.
To see values for each IP address in the network, click the network -> List tab.
Note
If more than one BGP AS are discovered for a network and their numbers are different, the BGP
AS column displays “Multiple”. If the BGP AS numbers have the same value, the BGP AS column
displays this value for the network. To see values for each IP address in the network, click the network
-> List tab.
• Managed: (AppliesonlywithNetworkInsight) Indicates whether the network is set to Managed status under Grid
Manager. For more information, see the
section Converting Unmanaged Networks under IPAM to Managed Status.
• First Discovered: (Applies only with Network Insight) The date and timestamp of the first occasion that Grid
Manager discovered the network.
• Last Discovered: (Applies only with Network Insight) The date and timestamp of the last occasion that Grid
Manager performed discovery on the network. The timestamp is updated whenever any new IP from this network
is discovered.
• Extensible attributes and RIR attributes: You can select the extensible attributes such as Building, Country,
Region, State, and VLAN for display. When you enable support for RIR registration updates, you can also select
associated RIR attributes for display. For information about RIR attributes, see Managing RIR Attributes.
• Active Directory Sites: You can also select Active Directory Sites for display. For information about Active
Directory Sites, see About Active Directory Sites and Services.
The Toolbar and the Action menu provide access to actions you can take on the selected network where applicable, as
follows:
• Click Show Device View to view the devices whose interfaces are in the selected network. To view device details
and a list of all the interfaces associated with it, click the name of the device.
• Click Convert to change the status of an unmanaged network to managed status under IPAM.
• Click Discover Now to apply Network Insight discovery to a listed network.
• Click Edit to open the network editor.
• Click Delete to delete or schedule deletion of the selected network. To delete the network now, in the Delete
Confirmation dialog box, click Yes. Grid Manager displays a warning message. Click Yes to continue or No to
cancel the process.
• Click Extensible Attributes to open the network editor’s Extensible Attributes page for the selected network.
• Click Permissions to open the network editor’s Permissions page for the selected network.
• Click Move Networks to move a network to a destination Active Directory site.
• Click Show Active Users to view all the users who are currently active on the Active Directory domain.
You can sort the list of networks in ascending or descending order by columns. For information about customizing tables
in Grid Manager, see Customizing Tables.
You can also modify some of the data in the table fields. Double click a row of data, and either edit the data in the field or
select an item from a drop-down list. Note that some fields are read-only. For more information about this feature,
see Modifying Data inTables.
Tip: If you select a network from the list and switch to the Net Map panel, the network is also selected in the network
map.
Note
The member assignment for the expanded network combines all member assignments of the joining networks.
Note that the join and resize features work identically only when you have a single network. If the resize feature is
disabled and if you have a single network object with additional new networks, then you must use the join feature to
combine all networks.
To join or expand a network:
1. From the Net Map or List panel, select a network, and then click Join from the Toolbar.
2. In the Join Network editor, do the following:
• Address: Displays the network address. You cannot modify this field.
• Netmask: Displays the netmask of the network as you expand the network.
• Join Network slider: Use the join network slider to specify the available subnet masks for the newly
expanded network. Select a smaller netmask value, based on your requirements of the newly-expanded
network. When you move the slider, a dialog box displays the total number of IP addresses and the IP
address range of a selected subnet mask.
• Automatically create reverse-mapping zone: Select this checkbox to configure the expanded network to
support reverse-mapping zones Adding Grid Members.
3. Click OK.
Note
When you add a new network and select the Enable Discovery option in the Add IPv4 Network Wizard window,
network discovery begins automatically, and you do not need to click Discover Now.
If the Discover Now button and other associated discovery elements are disabled on the Toolbar, it indicates
that discovery is not enabled for the parent network of the selected network or IP, or that a discovery appliance
(known as a Probe) is not associated with the network that you wish to discover.
IP MAP
The IPv4 Map panel provides a graphical representation of all IPv4 addresses in a given subnet. IP Map displays cells
that represent IPv4 addresses. Each cell in the map represents an IPv4 address, and its color indicates its status as
described in the legend section. You can run a network discovery on the selected network, and the status of each IP
address is updated accordingly. For information, see About Discovery.
Each IP Map panel can accommodate up to 256 cells with each cell representing an IP address. If a given network has
more than 256 addresses, additional IP addresses are displayed by paging to the next page. You can use the page
navigation buttons to page through the IP addresses. To go to a specific IP address, you can enter the IP address in
the Go to field or click a specific cell in IP Map. IP Map has a basic and an advanced view. You can toggle between these
views by clicking Toggle Basic View or Toggle Advanced View. As illustrated in the figure IP Map - Advanced View , the
status of an IP address is represented with a different color in the IP Map panel.
In the basic view, the IP Map panel displays the following IP address status:
• Unused: An IP address that has not been detected and is not associated with any network device or active host
on the network.
• Conflict: An IP address that has either a MAC address conflict or a DHCP lease conflict detected through a
network discovery.
• Used: An IP address that is associated with an active host on the network. It can be a resource record, fixed
address, reservation, DHCP lease, or host record.
• Pending: An IP address that is associated with a scheduled task or approval workflow, and the associated
operation has not been executed yet. This IP address is not considered when using the next available IP address
function.
• Selected IP Address: The IP address that you selected.
• DHCP Range: The IP addresses within a DHCP range in the network. The appliance highlights the cells using a
green background.
• Reserved Range: A range of IP addresses that are reserved for statically configured hosts. They are not served
as dynamic addresses. You can allocate the next available IP from the reserved range when you create a static
host.
IP Map - Advanced View
Note
For a Microsoft split-scope range, the appliance highlights the cells using a combination of orange and
pink background colors when the network is managed by two Microsoft servers. For a DHCP exclusion
range, the appliance highlights the cells using an orange background.
• Reserved Exclusion Range: A range of IP addresses that are reserved for statically configured hosts. IP
addresses residing within the exclusion range are excluded from the pool of available IP addresses and are not
available for lease.
Under the IP map, Grid Manager displays the following information for the IP address that you have selected in the map:
• Type: The object type that is associated with the IP address. For example, this can
be Lease, IPv4 DHCP Range or Fixed Address.
• Comment: Additional information about the IP address.
• Lease State: The lease state of the IP address. This can be one of the
following: Free, Backup, Active, Expired, Released, Abandoned, Reset, BootP, Static, Offered, or Declined.
IP Address List
The IP address List panel displays all IPv4 addresses of a selected subnet in table format. The list provides information
about the IP addresses in a hierarchy view. You can use this list to view detailed information about each IP address and
its related objects in a selected network. This list provides information such as address status, object type, and usage.
You can configure filter criteria to display only IP addresses that you want to see in the table. For example, you can enter
"MAC Address begins with 00" as the filter criteria to view only IP addresses that have associated MAC addresses that
begin with 00. You can also enter a specific IP address in the Go to field to view information about the address.
Grid Manager can display the following information for the IP addresses. You can edit the columns to display information
that is not shown by default.
• IP Address: The IP address of the corresponding record. The appliance highlights disabled DHCP objects in gray.
A DHCP object can be an DHCP address range, fixed address, reservation, host configured for DHCP, or
roaming host with an allocated IP address.
• Name: The name of the object type associated with the IP address. For example, if the IP address belongs to a
host record, this field displays the hostname.
• MAC Address: The discovered MAC address of the host. This is the unique identifier of a network device. The
discovery acquires the MAC address for hosts that are located on the same network as the Grid member that is
running the discovery. This can also be the MAC address of a virtual entity on a specified vSphere server.
Note
For an IP address that falls within a DHCP range, Grid Manager displays extensible attribute values for the
DHCP range and fixed address or host record. When you view the same IP address in the DHCP tab however,
Grid Manager displays only the extensible attribute values associated with the fixed address or host record, but
not the DHCP range. For example, when you define extensible attribute State with the value California for
DHCP range 1.0.0.1 – 1.0.0.5, and then define extensible attribute State with the value of Alaska for fixed
address 1.0.0.3, Grid Manager displays both California and Alaska in the State field for IP address 1.0.0.3 in
the IP Address List view. However, when you view 1.0.0.3 from the DHCP tab, the State field
displays Alaska only
• Attached Device Type: Indicates the device type for the neighboring device: Router, Switch-Router, Switch, and
other types.
• Port Duplex: Discovered Duplex setting for the neighboring port, when applicable.
• Port Link: Indicates the state of the link: Connected or Disconnected.
• Port Speed: Indicates the speed of the network connection.
The IP address List panel provides an Action icon with a series of menu options for features related to IP address
management and IP data management under IPAM. Menu choices change based upon the context and the current state
of IP addresses in the table; features available in the List panel action menu include the following:
• (Applies only with Network Insight) View Router Redundancy information for discovered IP addresses in an IPv4
network. For active VIPs, you will see several sets of related information:
Discovered Data
The Discovered Data tab displays discovered data through a network discovery or integrated from PortIQ and NetMRI
appliances. For information about viewing discovered data, see Viewing Discovered Data.
Related Objects
The Related Objects tab displays the following information about the records associated with the IP address:
• Name: The name of the object. For example, if the IP address belongs to a host record, this field displays the
hostname. The appliance highlights disabled DHCP objects in gray. A DHCP object can be a DHCP range, fixed
address, reservation, host configured for DHCP, or roaming host with an allocated IP address.
• Type: The object type, such as DHCP lease, host, A record, and bulk host.
• Comment: Information about the object. You can also select the following for display:
• DNS view: The DNS view to which the object belongs. You can do the following in this tab:
• Add a resource record. You can select the following from the drop-down list:
Audit History
By default, the Audit History tab displays the following information about the last five actions performed on the selected
IP:
• Timestamp: The day, date, and time of the operation.
• Action: The type of operation that was performed by the administrator.
• Object Type: The object type of the entry.
• Object Name: The name of the object.
• Admin Name: The name of the administrator who performed the operation.
• Message: The description of the administrative activity.
Note
If you change the IP address of an existing record to a new one in the IP MAP tab when the
Grid Audit Logging is set to Brief, then NIOS will not display modification or transition details about the
new IP address in this tab. You can only view subsequent modifications and deletions to the new IP
address. However, you can view the audit log history and transition details of the old IP address, but you
cannot view the initial transition from an old IP address to the new IP address.
Tip: If you select a network from the list and switch to the Net Map panel, the network is also selected in the network
map.
Audit History
Grid Manager displays the following information about the last five actions performed on the selected IP:
• Timestamp: The day, date, and time of the operation.
• Action: The type of operation that was performed by the administrator.
• Object Type: The object type of the entry.
• Admin Name: The name of the administrator that performed the operation.
• Message: Description of the administrative activity.
The NIOS appliance provides a simple mechanism for converting unmanaged IP addresses to resource records, such as
host records and A or AAAA records. You can also convert the active lease of a dynamically assigned IPv4 or IPv6
address to a fixed address or host, and convert an IPv4 lease to an IPv4 reservation. Using the conversion mechanism,
you can keep the existing information of a network device during the conversion.
The appliance supports the following conversions for IPv4 objects:
• DHCP leases to fixed addresses, reservations, or host records
• Fixed addresses to reservations or host records
• Unmanaged addresses to host records, A records, PTR records, or fixed addresses
• A records to host records
• PTR records to host records
The appliance supports the following conversions for IPv6 objects:
Note
You cannot convert unmanaged IP addresses or leases served by Microsoft DHCP servers to host records.
To create a fixed address, you bind an IPv4 address to a MAC address or an IPv6 address to a DUID. You can make that
binding by converting an active dynamically leased address to a fixed address. The lease conversion transforms the
temporary binding between the IPv4 address and MAC address or the IPv6 address and DUID in the dynamic lease to a
persistent one. The lease must be active so that the NIOS appliance has an IPv4-to-MAC address or IPv6-to-DUID
binding to convert into a fixed address.
The appliance uses the following rules when converting a DHCP lease:
• If an IPv4 DHCP lease is converted to a fixed address, the appliance copies the client identifier to the fixed
address, based on information in the lease. If the appliance finds the client identifier in the lease information, the
appliance includes it when it creates the host. If it finds the MAC address, the appliance includes it when it
creates the host. If it finds both, the appliance includes only the MAC address (default) when it creates the host.
• If an IPv6 DHCP lease is converted to a fixed address, the appliance copies the DUID to the fixed address.
• If you try to convert an IPv4 DHCP lease or a fixed address with a client identifier, not a MAC address, to a host,
the appliance displays an error message in the host editor. This ensures that you do not attempt this operation
and lose the data.
• You cannot create two IPv4 fixed addresses with the same client identifier or MAC address in the same network.
You cannot create two IPv6 fixed addressed with the same DUID in the same network.
• If the appliance receives a second IPv4 DHCP request with the same client identifier, it provides the same fixed
IP address if the lease is still binding.
The below figure illustrates converting a dynamic IPv4 lease to a fixed lease.
Converting a Dynamic IPv4 Lease to a Fixed Lease
Note
To return an IP address to its place in a DHCP range after converting it from an active dynamic lease to a fixed
address, reservation, or Infoblox host, delete the fixed address, reservation, or host to which you previously
converted the IP address. The IP address then becomes part of the DHCP range to which it first belonged.
You can convert IPv4 fixed addresses to reservations, as shown in the below figure.
Note
When you select an object for conversion, Grid Manager displays only the available conversion types for the
object. You must save the changes in the editor for the conversion to take place.
You can use the reclaim IP function to delete all objects, except the active DHCP lease, that are associated with a
selected IP address. To delete a DHCP lease, use the clear lease function as described in Clearing Active DHCP
Leases. When you reclaim an IP address, Grid Manager deletes the associated objects and puts them in the Recycle
Bin, if enabled. You can reclaim any used and unmanaged IP addresses. You can also select multiple IP addresses for
this function. After you reclaim an IP address, the address status changes to Unused. You can then reassign the IP
address to other objects. For example, when you reclaim a fixed address, Grid Manager deletes the fixed address object
Pinging IP Addresses
You can find out whether an IP address is accessible and active by pinging the address. Grid Manager sends a packet to
the selected IP address and waits for a reply when you ping the address. You can ping individual IP addresses from the
IP Map and IP List panels. You can ping all IP addresses from the IP Map panel and all IP addresses on the selected
page from the IP List panel.
To ping an IPv4 or IPv6 address:
• From the IP Map or IP List panel, select the IP address that you want to ping, and then click Ping from the
Toolbar.
To ping all IPv4 addresses:
• From the IP Map panel, click Multi-ping from the Toolbar. Grid Manager pings all IP addresses displayed in the IP
Map panel and displays the ping status in the panel. When the ping or multi-ping is complete, the status bar
displays the number of active IP addresses detected through the ping. To close the ping status bar, click the
Close icon.
• From the IP List panel, click Multi-ping from the Toolbar. Grid Manager pings all IP addresses visible on the
selected page. When the ping or multi-ping is complete, the status bar displays the number of active IP
addresses detected on the selected page. To close the ping status bar, click the Close icon.
Note
Infoblox recommends that you do not enable SNMP traps and email notifications for IPAM utilization during an
upgrade, because if you have configured notifications you may have to unconfigure them during an upgrade.
You can configure the thresholds for IPAM utilization at the Grid level and override them at the network level. To configure
the IPAM utilization thresholds at the Grid level, see Defining Thresholds for Traps.
To configure the IPAM utilization thresholds for a IPv4 network, network container, or network template, complete the
following:
1. Network Container: From the Data Management tab, select the IPAM tab -> network_container checkbox, and
click the Edit icon.
Network: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
checkbox, and click the Edit icon.
Network Template: From the Data Management tab, select the DHCP tab -> Templates tab -> DHCP_template
checkbox, and click the Edit icon.
2. In the editor, click Toggle Advanced Mode, select the IPv4 IPAM Utilization Notification tab, and then complete the
following:
• IPAM Utilization Notification: Click Override to override the inherited property, and specify the following:
• Enable SNMP Notifications: Select this for the appliance to send an SNMP trap to the trap receiver
that you define for the Grid when IPAM utilization crosses the configured threshold.
• Enable Email Notifications: Select this for the appliance to send an email notification to a
designated destination if IPAM utilization crosses the configured threshold.
• IPAM Threshold Settings: Click Override to override the inherited property, and specify the following:
• Trigger: Enter a Trigger value between 0 to 100. The appliance sends an SNMP trap and—if
configured to do so—sends an email notification to a designated destination when the IPAM
utilization exceeds the Trigger value. The default Trigger value is 95.
• Reset: Enter a Reset value between 0 to 100. The appliance sends an SNMP trap and —if
configured to do so—an email notification to a designated destination when the IPAM utilization
drops below the Reset value. The default Reset value is 85.
• Email Addresses: Click Override to override the inherited property. Click the Add icon, and then enter an
email address to which you want the appliance to send email notifications when IPAM utilization for the
network or network container crosses the configured threshold. You can create a list of email addresses.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
On an Infoblox appliance, the Enable Network Users Feature option is disabled by default for all new
installations.
The Active Users tab or Active Users dialog box displays the following information:
• User Name: Displays the logon name of the user. When the same user logs in to the domain from multiple clients,
entry for each IP address is displayed separately. If multiple users logs in to the same domain, entry for each user
is listed separately.
• Domain: The name of the domain.
• First Seen: The timestamp when the user logged in to the network for the first time.
• IP Address: The IP address of the client.
• Data Source: The IP address of the Microsoft server or the API method.
• Data Source IP Address: Displays the source from which the data is collected. It can be Cisco ISE, Microsoft
server or the API method.
• Last Seen: The timestamp when the user was last seen accessing the network.
• Last updated: Displays the timestamp when the user information was last updated.
• About Discovery
• IP Discovery Process
• Supported IP Discovery Methods
• Guidelines Before Starting a Discovery
• Configuring IP Discovery
• Configuring vDiscovery Jobs
• Viewing Discovered Data
• Managing Discovered Data
• Integrating Discovered Data from NetMRI
About Discovery
Note
The discovery features described in this chapter apply to NIOS Grid deployments that do not use the Discovery
license and its accompanying features under Network Insight. Network Insight provides the ability to discover,
query, and catalog routed and switched networks and the devices within them, including infrastructure routers,
enterprise switches, security devices such as firewalls, wireless access points, end host computer systems,
and more. For more information about Network Insight, see Infoblox Network Insight.
Infoblox provides IP discovery for detecting and obtaining information about active hosts in predefined networks, and
vDiscovery for discovering virtual entities and interfaces (such as vSwitch and vRouter) in private, public, and hybrid
clouds managed through CMPs (Cloud Management Platforms) such as VMware vCenter servers and vSphere
Hypervisor, OpenStack, and AWS (Amazon Web Services). You can configure multiple discovery tasks on one or more
discovering members.
• IP discovery: You execute an IP discovery (Data Management tab -> IPAM tab -> Discovery from the Toolbar) to
detect active hosts on specified networks in a network view. You can configure the appliance to perform an IP
discovery using one of the following protocols: ICMP (Internet Control Message Protocol), NetBIOS (Network
Basic Input/Output System), and TCP (Transmission Control Protocol). For more information, see Supported IP
Discovery Methods. You can start an IP discovery immediately after you configure it, schedule it for a later date
and time, or configure a recurring discovery based on a recurrence pattern. For information about how to
configure an IP discovery, see Configuring IP Discovery.
• vDiscovery: This is an extension to the former VM discovery, in which the NIOS appliance only discovers virtual
entities on VMware vCenter and vSphere servers. A vDiscovery job (from the Data Management tab -> IPAM tab
-> vDiscovery from the Toolbar, or Cloud tab -> any sub tab -> vDiscovery from the Toolbar) now detects virtual
entities and interfaces in private, public, and hybrid clouds that are managed through VMware vCenter servers
and vSphere Hypervisor, OpenStack, Azure, or AWS. You can define vDiscovery jobs through the vDiscovery Job
wizard and manage all configured vDiscovery jobs through the vDiscovery Job Manager. Note that for a specific
vDiscovery job, NIOS synchronizes successive discovered data (not the associated NIOS objects) with the data
in the targeted CMP. For example, if you change the IP address of a VM, this information is reflected in the next
discovery of the same vDiscovery job. If you terminate a VM, the VM is deleted from the NIOS database. If you
delete certain information on the CMP, the respective discovered data is removed from the NIOS database. Be
aware that if you change the parameters of a vDiscovery Job, the last discovered data from this job will be
automatically cleaned up so that the appliance can continue to synchronize data from one discovery to the next. If
Note
For new installations, an IP discovery task is automatically created by default. You can choose to
disable the IP discovery after you have set up your appliance. However, you must configure and
manually schedule vDiscovery jobs in order for the appliance to detect and collect information about
virtual entities in the clouds. When you upgrade from a previous NIOS release to NIOS 7.2 and later,
former VM Discovery tasks are divided into separate vDiscovery jobs based on the server endpoints
defined in the VM Discovery tasks. All new vDiscovery jobs inherit the same discovery schedule from
the old tasks. You must manually enable the new vDiscovery schedules in order for the appliance to
perform vDiscovery jobs. For information about how to enable the vDiscovery schedule,
see Scheduling vDiscovery Jobs.
After a discovery, the appliance updates the database with the discovered data based on the discovery configuration. For
example, you can configure the appliance to merge newly discovered data, consolidate managed data, or update
unmanaged data. The appliance also identifies unmanaged and conflict data after a discovery. Unmanaged data is
discovered data that is not configured for DNS or DHCP and has no associated NIOS objects. Conflict data is discovered
data that is configured for DNS or DHCP and has associated NIOS object or objects, but certain key values are different
than those in the NIOS database. For information about guidelines the appliance uses to update discovered data, see
Guidelines Before Starting a Discovery and Guidelines for Configuring vDiscovery Jobs.
Grid Manager displays discovered data in the Discovered Data section of the IP address properties panel when you drill
down to individual IPs. For information about how to view and manage discovered data, see Viewing Discovered Data
and Managing Discovered Data. The appliance records admin operations in the audit log and discovery operations in the
syslog.
The figure High-Level Discovery Process shows a high-level perspective of the discovery processes. You can configure
and initiate an IP discovery from the Discovery Manager wizard and a vDiscovery from the vDiscovery Job wizard. You
must first select a Grid member that runs the discovery tasks. After you configure an IP discovery task and a vDiscovery
job, the Grid Master sends the discovery requests to the selected member. Based on the configuration of the discovery
tasks, the selected member runs the discovery and collects information about discovered hosts and virtual entities from
the specified networks and cloud platforms. The Grid member then reports the discovered results to the Grid Master.
Based on the discovery configuration, the Grid Master updates the database with discovered data.
High-Level Discovery Process
IP Discovery Process
Once an IP discovery starts, the Grid member reports the discovery status, such as Completed, Running, Paused,
Stopped, or Error, in the Discovery Manager wizard and the Discovery Status widget on the Dashboard. In the Discovery
Status widget, Grid Manager reports the time when the discovery status was last updated and the numbers of each type
of discovered data. For information, see Managing Discovery.
When an IP discovery starts, the appliance divides the IP addresses in a network into chunks, with each chunk
containing 64 contiguous IP addresses. The discovery process probes each IP address in parallel and in ascending
IP Discovery Process
ICMP
This method detects active hosts on a network by sending ICMP echo request packets (also referred to as pings) and
listening for ICMP echo responses. The ICMP discovery is a simple and fast discovery that detects whether an IP
address exists or not. It returns only the IP address and MAC address (only if the Grid member running the discovery is
on the same discovered network) of a detected host. The ICMP discovery might miss some active hosts on the network
due to security measures that are put in place to block ICMP attacks.
You configure the timeout value and the number of attempts in the Discovery Manager wizard. The ICMP discovery
method returns the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: The discovery returns the MAC address only if the Grid member running the discovery is on the
same discovered network.
To use the ICMP discovery method, the ICMP protocol between the Grid member performing the discovery and the target
networks must be unfiltered.
NetBIOS
The NetBIOS method queries IP addresses for an existing NetBIOS service. This method detects active hosts by
sending NetBIOS queries and listening for NetBIOS replies. It is a fast discovery that focuses on Microsoft hosts or non-
Microsoft hosts that run NetBIOS services.
You configure the timeout value and the number of attempts in the Discovery Manager wizard. This method returns the
following information for each detected host:
• IP address: The IP address of the host.
• NetBIOS name: This value is set to the name returned in the NetBIOS reply.
To use the NetBIOS discovery method, ports 137 (UDP/TCP) and 139 (UDP/TCP) between the Grid member performing
the discovery and the target networks must be unfiltered.
TCP
The TCP discovery probes each active host on a list of TCP ports using TCP SYN packets. This method detects all active
hosts that generate SYN ACK responses to at least one TCP SYN. The discovery can determine the OS on a host by
analyzing how the host reacts to the requests on opened and closed ports. It then uses the TCP fingerprints to guess the
OS. To obtain a TCP fingerprint, IP discovery provides two scanning techniques, SYN and CONNECT.
When you use the SYN technique, the discovery sends a TCP SYN packet to establish a connection on a TCP port. If the
port is open, the host replies with a SYN ACK response. The discovery does not close the port connection.
The CONNECT technique is a three-way TCP handshake. The discovery starts with the same process as the SYN
technique by sending the TCP SYN packet. If the host replies with a SYN ACK response, the discovery then sends a
RST packet to close the connection. If the response contains a RST flag, it indicates that the port is closed. If there is no
reply, the port is considered as filtered. The TCP discovery is a deliberate and accurate discovery method. It can
basically detect all active hosts on a network provided that there are no firewalls implemented on the network.
You can select the TCP ports, the TCP scanning technique, and configure the timeout value and the number of attempts
in the Discovery Manager wizard. This method returns the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: The discovery returns the MAC address only if the Grid member running the discovery is on the
same discovered network.
• OS: This is set to the highest probable OS reported in the response.
Full
The full discovery method is a combination of an ICMP discovery, a NetBIOS discovery, a TCP discovery, and a UDP
scan. This method starts by sending an ICMP echo request. If no IP address on the network responds to the ICMP
request, the discovery ends. If there is at least one response to the ICMP echo request, a NetBIOS discovery starts. A
TCP discovery then follows by skipping through the active hosts that the NetBIOS discovery detects. The TCP discovery
also handles the NetBIOS-detected hosts that have no MAC addresses. This method also performs a UDP scan to
determine which UDP ports are open.
You configure the timeout value and the number of attempts in the Discovery Manager wizard. The full discovery method
returns the following information for each detected host:
• IP address
• MAC address
• OS
• NetBIOS name
To use the full discovery, all the filter and firewall requirements in the ICMP, NetBIOS, and TCP discovery methods apply.
The following is a summary of the supported IP discovery methods:
ICMP • IP address Use ICMP for a rough and fast discovery ICMP echo request and reply
• MAC address
NetBIOS • IP address Use NetBIOS for discovering Microsoft NetBIOS query and reply
networks or
• NetBIOS name non-Microsoft networks that run some
NetBIOS services
TCP • IP address Use TCP for an accurate but slow discovery TCP SYN packet and SYN ACK packet
• MAC address
• OS
Full • IP address Use Full for a general and comprehensive 1. ICMP echo request and reply
discovery
• MAC address 2. NetBIOS query and reply
• OS
3. TCP SYN packet and SYN ACK packet
• NetBIOS name
The method you select to run an IP discovery determines the kind of information the discovery returns and the time it
takes to complete an IP discovery. If time is a concern, the following are factors you may consider when configuring an IP
discovery:
• The timeout value
• The number of attempts
• The number of ports the discovery scans
• The size of network you want to discover
Database Capacity
When the Grid Master database reaches its maximum capacity (the maximum capacity varies based on the appliance
model), the Grid Master stops updating the database and requests that the Grid member stop the discovery. When the
discovering Grid member database reaches its capacity, the Grid member pauses the discovery. The appliance displays
a dialog to inform you that the discovery pauses. The Grid member resumes the discovery once the database falls below
its capacity. When a discovery pauses because of capacity issues, you cannot resume the discovery or start a new
discovery. You can check the capacity of your appliance database before starting a discovery.
HA Failover
In an HA pair, if the Grid Master fails over to the passive node, the passive node takes over and continues with the
discovery from the last known state. If an independent appliance fails, the appliance stops the discovery process and
keeps the discovery in a paused state. The appliance resumes the discovery once it starts up again.
Configuring IP Discovery
You must have read/write permission to Network Discovery to initiate a discovery. After you start a discovery, you cannot
change the configuration of the discovery, but you can start the discovery process immediately or schedule it for a later
date. You can also configure a recurring discovery that repeats on a regular basis. For information, see Configuring and
Starting an IP discovery and Scheduling IP Discovery. The appliance saves the configuration of the last discovery.
When you start an IP discovery from the IPAM Home, Net Map or Network List panel, you can select the networks on
which you want the discovery to run. When you start an IP discovery from the IP Map or IP List panel, the discovered
Note
If you clear this checkbox, the appliance replaces the existing data with the newly discovered
data and if there are no newly discovered values for some fields, the appliance removes the
existing values for these fields and the fields become empty.
• Update discovered data for managed objects: Select this checkbox if you want the appliance to update
the data of existing managed objects such as A records, PTR records, host records, and fixed addresses,
with the discovered data. If you clear this checkbox, the appliance updates only the unmanaged objects.
This checkbox is selected by default.
3. Click Save to save the discovery configuration. Note that you must save the configuration before you can start a
discovery.
4. Click Start to start the IP discovery. You can also do one of the following:
• Restore to Defaults: Restore the discovery configuration using the default values.
• Pause: Stop a running discovery.
Note
Once you start a discovery, you cannot change the discovery configuration. After you click Start,
the button changes to Pause. You can click Pause to pause a discovery. When the discovery is
paused, the button changes to Resume. You can click Resume to continue the paused
discovery.
Scheduling IP Discovery
After you configure a discovery (as described in Configuring and Starting an IP discovery), you can schedule to run a
one-time IP discovery at a later date and time. You can also schedule a recurring IP discovery by configuring a
recurrence pattern. The appliance automatically starts a recurring discovery based on the configured schedule and
detects any newly added or removed networks. Note that you can only schedule the start of a discovery, you cannot
schedule it to pause, stop, or resume. After a scheduled discovery starts, you can then pause, stop, or resume it.
You can schedule only one IP discovery at a time. Once you schedule a discovery, you cannot change the configuration
until the task is cancelled or executed. You can however disable a recurring discovery. When you disable a recurring
discovery, it will not recur during the scheduled interval.
Note
After you upload a new certificate, wait for two minutes before running a vDiscovery job. This is because the
newly uploaded certificate takes some time to be reflected in the NIOS database.
Note that when you disable any virtual entities or interfaces on the CMP, the appliance excludes them from the
vDiscovery job. In situations where the discovering member you select to perform vDiscovery jobs is disconnected from
the Grid Master, the member continues to execute vDiscovery jobs based on the configured schedule. Newly discovered
data replaces previously discovered data. The last set of discovered data is considered the most up-to-date and is sent
to the Grid Master when the member reconnects with the Grid Master.
When you configure vDiscovery jobs, you can enable the Infoblox NIOS appliance to automatically create DNS records
for discovered IP addresses of VM instances that are served by the NIOS appliance. You can configure the appliance to
add DNS records for specific DNS views associated with the network view defined for public and private IP addresses of
VM instances served by the appliance. For more information about this feature, see Creating DNS Records for Newly
Discovered VMs.
Before you configure and start a vDiscovery job, there are a few guidelines to consider.
Note
You cannot update the job name after the vDiscovery job is run for the first time.
• Member: Click Select to choose the Grid member that will perform the vDiscovery job. If only a single
member is active, the appliance name automatically appears here. When you select a Cloud Platform
Appliance to perform vDiscovery, it communicates directly with the CMPs to obtain information that is not
available through the provisioning process from the cloud adapter.
• Comment: Enter information to describe this discovery.
The new job will not execute until you have completed all configuration steps in the wizard. You will not be
able to save this job until you have completed all job settings.
3. Click Next to select an endpoint server on which you want to perform the vDiscovery job, as described in
Selecting the Endpoint Server, or save the configuration after you have modified data in this tab.
Note
You might lose some discovered data if you modify any of the following parameters for an existing
vDiscovery job. To avoid this, create a new vDiscovery job instead.
• Server Type: Choose one of the following server types for this vDiscovery:
• AWS: Collects information available for the AWS service endpoint. You can perform vDiscovery jobs
through a proxy server in an AWS deployment, including Amazon Route 53. For more information, see
Configuring Proxy Servers.
• Azure: Collects information available for virtual entities in the specified VNets (Azure virtual networks)
within the Microsoft Cloud.
• OpenStack: When you select this server type, vDiscovery discovers network information stored in Neutron
servers, VM instance information in Nova servers, and tenant or project information in Keystone servers.
• VMware: Supports VMware vCenter and vSphere servers v5.0 and later. Collects information for all virtual
entities running on the specified servers.
• GCP: Collects information available for virtual entities in the specified GCP project.
Depending on the server type you select, other options in this step change accordingly, as follows:
For AWS, complete the following:
• Service Endpoint: This is typically the regional service endpoint for the desired Amazon region.
Example: ec2.us-west-1.amazonaws.com. For more information about AWS service endpoints, refer to the
Infoblox Installation Guide for vNIOS for AWS, available on the Infoblox Support site. For a list of available AWS
service endpoints, see https://docs.aws.amazon.com/general/latest/gr/ec2-service.html
• Port: Enter the port you want to use for the vDiscovery job.
• Protocol: The protocol used for AWS is always over SSL. AWS provides certificates that is linked to the CA. By
default, this certificate is embedded in NIOS and used as a reference for the CA when connecting to AWS. You
can also upload a new certificate as described in Managing Certificates. If you upload a new certificate, the
embedded certificate will be overwritten by the new one.
• Allow unsecured connection: This option is not applicable for AWS connection.
Credentials: Select the method you want to use to authenticate the connection between the Grid member and AWS for
discovery jobs. You can select one of the following:
• Use instance profile: An instance profile is a container for an IAM role that you use to pass role information to an
EC2 instance when the instance is up and running. Select this option if you want to collect information from AWS
by waiving a user's credentials and using configuration of a predefined IAM role to get a temporary token that
allows API calls. Note that you must first configure the option for "instance profile" in AWS, define an IAM role in
the instance profile, and then set permissions for this role before you can select this option. Otherwise, this option
is disabled. When you select this, you do not need to provide user credentials.
• Use IAM credential: Select this if you want to authenticate by using IAM roles to grant secure access to AWS
resources from your EC2 instances. Click Select to choose the IAM role and use its credentials to access AWS
resources from your EC2 instances when they are up and running.
• Access Key ID and Secret Access Key: Enter the Access Key ID and Secret Access Key for the AWS
service endpoint. This is the secret key pair for the administrator account that executes the discovery job.
For more information, refer to the Infoblox Installation Guide for vNIOS for AWS, available on the Infoblox
Support site.
For more information about instance profiles and IAM roles, refer to the AWS documentation.
For Azure, complete the following:
• Service Endpoint: This is the service endpoint for the desired VNet in the Microsoft Cloud. For more information
about Azure service endpoints, refer to the Infoblox Installation Guide for vNIOS for Azure.
• Port: Enter the port you want to use for the vDiscovery job.
Note
• Azure Government Cloud uses different service endpoints for its services. For more information about
Azure service endpoints, refer to the Infoblox Installation Guide for vNIOS for Azure.
• Updates to the root CAs of Azure services installed by Microsoft, can cause vDiscovery to fail.
If vDiscovery fails with ERROR: PycURL error: (60, 'SSL certificate problem: unable to get local issuer
certificate'):
a. Download the DigiCert Global Root G2 Certificate from DigiCert Root Certificates.
b. Upload the certificate to NIOS as described in Uploading CA Certificates.
Note
• NIOS 8.4.2 onward, each GCP vDiscovery job can utilize only one uniquely named service account file.
• You can use the same service account file for different GCP vDiscovery jobs in earlier NIOS releases
(such as 8.4.0, 8.4.1). However, deleting one vDiscovery job causes the other vDiscovery job with the
same name to be stuck in "Job in Progress" state. It is recommended to use only one uniquely named
service account file for each vDiscovery job.
• You cannot edit an existing GCP vDiscovery job to upload a different service account file.
• Auto created networks and VM instances having IP address of auto created networks cannot be
discovered by GCP vDiscovery.
Click Next to define the network views to which discovered data belongs for both public and private IP addresses,
as described in Defining Network Views.
Note
If you clear this checkbox, the appliance replaces the existing data with the newly discovered
data and if there are no newly discovered values for some fields, the appliance removes the
existing values for these fields and the fields become empty.
• Update discovered data for managed objects: Select this checkbox if you want the appliance to update
discovered data for all corresponding NIOS objects (if they exist in NIOS). If you do not select this
checkbox, the appliance updates only the discovered data for unmanaged objects. None of the managed
data will be updated. This checkbox is selected by default.
• For every newly discovered IP address, create: Select this checkbox to enable NIOS to automatically
create or update DNS records for discovered network entities and VM instances. It does not include cloud
adapters such as AWS or DDNS. This is applicable if the records were originally created by vDiscovery. If
you select this checkbox, NIOS considers all records created in a zone as one and calculate it as one
serial number change. For more information about this feature, see Creating DNS Records for Newly
Discovered VMs.
• Host: Select this to automatically create Host records for discovered entities.
• A & PTR Record: Select this to automatically create A and PTR records for discovered entities.
Note that the DNS zones and reverse-mapping zones to which the records belong must exist in
NIOS before the vDiscovery job is executed. Otherwise, vDiscovery does not create the records.
• The DNS name will be computed from the formula: Enter the formula that NIOS uses to create the
DNS records for each discovered VM address. For example, if there are two IP addresses
associated with a VM, NIOS creates two DNS records, or a host record with two IP addresses,
depending on your configuration. You must use the syntax of ${parameter name} for the formula.
For AWS, Azure, GCP, OpenStack, and VMware cloud platforms, this field supports the following
parameters:
vm_id, vm_name, discovered_name, tenant_id, tenant_name, subnet_id,
subnet_name, network_id, network_name, vport_name, ip_address, ip_address_octet1
or 1, ip_address_octet2 or 2, ip_address_octet3 or 3, ip_address_octet4 or 4.
Note that it does not support IPv6 addresses.
If you are changing the DNS view, ensure that the Merge the discovered data with existing data
checkbox is not selected.
Note that the Use this DNS view for public IPs and Use this DNS view for private IPs fields will be
disabled, if you select The tenant’s network view (if it does not exist, create a new one) option
when you define the network views to which discovered data belongs for both public and private IP
addresses, as described in Defining Network Views.
Under When discovered data is linked to managed data, select any combination of the following.
Note
• Tenants and VMs are managed objects when they have NIOS objects, such as
host records or fixed addresses, associated with them. Otherwise, they are
unmanaged objects. The appliance always updates properties for all unmanaged
objects.
• Auto-consolidate on managed Tenant's properties: When you select this checkbox, the appliance updates
properties with discovered data for managed tenants, as well as unmanaged tenants (NIOS always
update unmanaged tenants). When you clear this checkbox, the appliance does not update discovered
data for managed tenants. This checkbox is selected by default.
• Auto-consolidate on managed Tenant's properties: When you select this checkbox, the appliance updates
properties with discovered data for managed tenants, as well as unmanaged tenants (NIOS always
update unmanaged tenants). When you clear this checkbox, the appliance does not update discovered
data for managed tenants. This checkbox is selected by default.
• Auto-consolidate managed VM's properties: When you select this checkbox, the appliance updates
properties and extensible attributes with discovered data for managed VMs, as well as unmanaged
tenants (NIOS always update unmanaged tenants). When you clear this checkbox, the appliance does
not update discovered data for managed VMs. This checkbox is selected by default.
Note
The extensible attribute VM ID is not updated if you do not enable the Auto-
consolidate Cloud EAs on managed data checkbox, which leads to a conflict on that IP address.
The NIOS object does not link to the same VM as the newly discovered IP. In such cases, you
can use the Resolve Conflicts option to update either your NIOS objects or your discovered
data. For information about resolving conflicts, see Resolving Conflicting Addresses.
2. Click Next to schedule this vDiscovery job and specify when the job should start, as described in Scheduling
vDiscovery Jobs.
Note
vDiscovery updates only records that are created by the vDiscovery process. It does not create or update DNS
records that are originally created by other admin users.
• Add new VM (vma) on No data for vma 10.10.10.1 Zone: corpxyz.com Zone: corpxyz.com
vma.corpxyz.com Host record:
Cloud Platform vma.corpxyz.com
appliance (10.10.10.1)
• Automatic creation of
Host records
• In NIOS: existing zone
corpxyz.com; no DNS
records
• Add new VM (vma) on No data for vma 10.10.10.1 Zone: corpxyz.com Zone: corpxyz.com
vma.corpxyz.com Host record: Host record:
Cloud Platform vma.corpxyz.com vma.corpxyz.com
appliance (10.10.10.1) (10.10.10.1)
• Automatic creation of
Host records
• In NIOS: existing zone
corpxyz.com; existing
Host record (originally
created by vDiscovery
or admin)
• Remove existing VM 10.10.10.1 No data for vma Zone: corpxyz.com Zone: corpxyz.com
vma.corpxyz.com Host record:
(vma) on Cloud vma.corpxyz.com
Platform appliance (10.10.10.1)
• Automatic creation of
Host records
• In NIOS: existing zone
corpxyz.com; existing
Host record (originally
created by vDiscovery)
• Remove existing VM 10.10.10.1 No data for vma Zone: corpxyz.com Zone: corpxyz.com
vma.corpxyz.com Host record: Host record:
(vma) on Cloud vma.corpxyz.com vma.corpxyz.com
Platform appliance (10.10.10.1) (10.10.10.1)
• Automatic creation of
Host records
• In NIOS: existing zone
corpxyz.com; existing
Host record (originally
created by admin)
(vma-if2) on Cloud
Platform appliance
• Automatic creation of
Host records
• In NIOS: existing zone
corpxyz.com; existing
Host record (originally
created by vDiscovery)
(vma-if2) on Cloud
Platform appliance
• Automatic creation of
Host records
• In NIOS: existing zone
corpxyz.com; existing
Host record (originally
created by admin)
$
{vm_name}.corpxyz.co
m
• In NIOS: existing zone
corpxyz.com; existing
Host record (originally
created by vDiscovery)
$
{vm_name}.corpxyz.co
m
• In NIOS: existing zone
corpxyz.com; existing
Host record (originally
created by admin)
Note
The appliance might display an AMQP error when you first start a newly created vDiscovery job.
This is due to the start-on-demand mechanism experiencing a delay in executing the job. Wait a
few seconds and start the job again.
Stop: Stop and terminate the vDiscovery job that is in progress. You cannot resume this discovery once
you stop it. All discovered data remains intact in the database.
• Click Close to close the vDiscovery Job Manager.
Note
You cannot convert unmanaged IP addresses that are being served by Microsoft DHCP servers to host
records.
Note
Depending on the page size configuration, the search results are limited to the page size that you set. If
the search results exceed the page size limit, the appliance displays an error message to inform you to
refine your search criteria or to change the page size limit. In the Host Record editor, complete the
information.
3. Save the configuration, and then click Restart if it appears at the top of the screen.
Note
After the conversion, the status of the unmanaged address changes to Used.
Method 1
1. For IP addresses: From the Data Management tab -> IPAM tab, select an unmanaged IP address in the IPMap or
List panel.
For networks: From the Data Management tab -> IPAM tab -> IPMap or List panel, select a network in which you
want to clear all unmanaged addresses.
For Cloud tenants: From the Cloud tab -> Tenants tab, select a tenant for which you want to clear unmanaged
data.
For Cloud VMs: From the Cloud tab -> VMs tab, select a VM for which you want to clear unmanaged data.
2. Click Clear -> Clear Unmanaged Data or Clear All Unmanaged Data from the Toolbar.
3. In the ClearUnmanagedData confirmation dialog box, click Yes. The appliance clears data that has no
corresponding NIOS objects such as fixed addresses, DNS records, or host records.
Method 2
1. From the Cloud tab -> VM tab, select Discovery Manager from the Toolbar.
2. In the vDiscoveryJobManager dialog, click the Action icon next to the selected vDiscovery job, and then
select Clear Unmanaged Data.
3. In the ClearUnmanagedData confirmation dialog box, click Yes. The appliance clears data that has no
corresponding NIOS objects such as fixed addresses, DNS records, or host records.
Note
After you clear all the unmanaged data, you should navigate to the Data Management tab and clear all
the associated networks. When you clear unmanaged addresses in a given network view, all
unmanaged IPv4 and IPv6 addresses of all networks in the network view are cleared. When you select
an entire network or a specific network in the IP Map or List panel, all the unmanaged addresses in the
network are cleared. After you clear the unmanaged data, the status of the IP addresses changes
to Unused.
Note
After the conflict is resolved, the status of the IP address changes depending on how you resolved the conflict.
To resolve a conflict:
1. In the IP Map or List panel, select a conflicting address, and then click Resolve Conflict from the Toolbar.
2. The Resolve Conflict dialog box displays the reason of the conflict and lists the existing information and
discovered information of the address in the Description field. Depending on the type of conflict, the appliance
displays the corresponding resolution options. You can compare the existing and discovered data and decide how
you want to resolve the conflict.
Note
This action clears only the discovered data that is supported in the Discovered Data section for an IP address.
It does not clear any NIOS objects or information such as tenants, networks, or VMs for a cloud platform. If a
discovered IP address has the same IP as an existing NIOS object (such as a fixed address, DNS record, or
host record), the appliance removes this IP address.
Note
When you clear all discovered data in a given network view, all imported discovered data for managed
addresses, in all IPv4 and IPv6 networks in the network view, are cleared.
You can also clear discovered data for a specific discovery job, as follows:
1. From the Cloud tab -> VM tab, select DiscoveryManager from the Toolbar.
2. In the vDiscoveryJobManager dialog, click the Action icon next to the selected vDiscovery job, and then select
ClearDiscoveredData.
3. In the ClearDiscoveredData dialog box, click Yes. The appliance clears all the discovered managed data that is
collected by the specified vDiscovery job.
4. Navigate to the Data Management tab → DNS tab, and then delete all the associated zones.
5. After you clear all the discovered data, you should navigate to the Data Management tab and clear all the
associated networks.
Note
If you delete an associated zone before you clear the discovered data, the Clear option gets disabled
from the Cloud tab -> VM tab. The Clear option can be accessed from the Cloud tab -> Tenants tab.
This is applicable when you use WAPI calls to clear all discovery data.
Note
If the same data is collected by the specified vDiscovery job and another non vDiscovery job such as Network
Insight or IP discovery, the discovered data remains intact and will not be removed.
To clear all discovered data for a specific vDiscovery job, perform the following:
1. From the Cloud tab -> VM tab, select Discovery Manager from the Toolbar.
2. In the vDiscoveryJobManager dialog, click the Action icon next to the selected vDiscovery job, and then select
Clear All Discovery Data.
3. In the ClearDiscoveredData dialog box, click Yes. The appliance clears all the discovered managed and
unmanaged data that is discovered by the specified vDiscovery job.
Note
If you delete all the networks from the Data Management tab before you clear all the discovered data,
the data gets cleared only from the NIOS user interface and not from the NIOS database which results
in stale VM to be fetched when WAPI calls are made.
Note
• NIOS does not import IPv6 leases that contain prefixes and link-local IPv6 addresses. This data is
discarded during an import.
• After an IPAM synchronization, CSV import errors if any are logged in a separate file named
discovery_csv_error.log.xxxxxx located at /infoblox/var/discovery_csv_error
The appliance can import the following IPv4 and IPv6 data that NetMRI discovers:
• IP Address: The discovered IPv4 or IPv6 address.
• Discovered MAC Address: The MAC address of the discovered host.
• Last Discovered: The date and time the IP address was last discovered.
• NetBIOS Name: The name returned in the NetBIOS reply or the name that you manually register for the
discovered host.
• OS: The operating system of the detected host.
Network Insight appliances use SNMP and other protocols to discover and catalogue a diverse assortment of device
types, including the following: routers, enterprise switches, firewalls and security appliances, load balancers, enterprise
printers, wireless access points, VoIP concentrators, application servers, VRF-based virtual networks, and end hosts.
Network Insight provides a tool for administrators to gather key information about networks, including the discovery of
routed paths and the host clouds behind enterprise switches, even in organizations where an Infoblox deployment
already exists. In the figure Discovery in Action, an appliance running discovery connects to an enterprise router, and
uses its information to determine more about the networks that exist deeper within the unmanaged network, termed the
discovery domain in this example.
Discovery in Action
Note
For comprehensive coverage of port control features in Grid Manager,
see Port Control Features in Network Insight and its various subsections.
You can also exclude networks and IP addresses from discovery. The basic principle is that some devices do not need to
be discovered, perhaps because they are already managed as part of a Grid and hence should not be subjected to
discovery; because a device does not support SNMP; or for other organizational reasons. In the figure Discovery in
Action, networks 172.16.2.0/24 and 172.16.3.0/23 are excluded from discovery because they are already fully managed
by a Grid. For more information, see Excluding IP Addresses from Discovery.
You can define scheduled time periods in which Network Insight does not perform discovery operations in the network.
These time periods are called discovery blackouts. All protocols associated with discovery (SNMP, CLI through Telnet
and SSH, port scanning, fingerprinting and Ping sweeps) can be shut off during discovery blackout periods. This
prevents discovery protocols from occupying network bandwidth during periods of peak usage. Network Insight does not
communicate with devices in any way during a discovery blackout period. For more information on discovery blackouts,
see Defining Blackout Periods. Network Insight also provides a second type of blackout period for port configuration
tasks, during which no tasks to change device port settings will execute. For more information, see Defining Port
Configuration Blackout Periods.
Related topic
Infoblox Network Insight
Consolidator
The central repository of discovery data for the entire managed network. The Consolidator is a single appliance that
contains data about all devices detected through discovery. The Consolidator communicates with the Grid Master as a
normal Grid Member and transfers all its data to the Grid Master, as indicated in the figure Network Insight Appliances
Added as Grid members. The Consolidator compiles information from one or more associated Probe appliances. The
Probes
A Probe is a Network Insight appliance or virtual appliance that performs the direct querying, probing and polling of
network devices and the initial data collection. Probe appliances also require the Discovery license.
Infoblox recommends using one or more Probe appliances with the Consolidator. Each Probe can override the Grid level
discovery credentials with its own discovery credentials.
Data synchronization occurs continuously between the Consolidator and all associated Probe appliances and between
the Consolidator and the Grid Master.
Note
You assign each Probe appliance to a single network view, and multiple Probe appliances can share the same
network view. You can change network view assignments for Probe appliances at any time. On ND-1405,
ND-2205, ND-4000, ND-V1405, and ND-V2205 Network Insight appliances, you can assign multiple VLAN
interfaces on the same Probe to different network views.
SNMP
Note
Infoblox does not recommend using vendor default SNMP credentials on network devices. Should you need to
use vendor defaults for a given device type, you enter those values in the list of SNMP credentials on the Grid
Master.
Network Insight supports discovery of devices and networks through SNMPv1/v2c and through SNMPv3 protocols.
Discovery acquires information from standard SNMP MIB object IDs (OIDs) to correctly identify and catalogue devices.
You enter or import lists of SNMP credentials with which the appliances query devices on the network to perform
discovery.
SNMPv1 and SNMPv2c protocols are combined into a set termed SNMPv1/v2 for discovery. SNMPv1/v2 discovery
requires standard read community strings to be stored on the Grid Master.
Accounts using SNMPv3 use a standard suite of authentication and security protocols. If Network Insight uses SNMPv3
to collect data from devices supporting the protocol, you can define specific user credentials with combinations of
authentication and protocol support, and the unique keys for each protocol. Network Insight also supports multiple entries
for the same username string, enabling checking of similar SNMPv3 credentials that use different authentication and
security protocols.
Some devices found by discovery may not have known SNMP credentials or credentials that are entered into the sets of
SNMP credentials defined for discovery.
Note
SNMP Credentials from the Grid or from the Member credential list are always tried in the specified order
unless a credential is associated with a host, fixed address or reservation being discovered.
CLI
Note
CLI is optional for discovery but is required for all Port Control operations. Discovery can perform CLI data
collection to collect information for specific device types. SNMP is required for all device discovery.
ICMP
Discovery uses different variations of Ping traces to perform higher-performance, brute-force device discovery. ICMP is
the last resort when devices do not support SNMP management protocols or an SNMP credential is lacking.
The ICMP Smart Ping Sweep option enables brute-force subnet Ping sweeps on IPv4 networks. Subnet ping sweeps are
used as a last resort in the discovery process. A subnet ping sweep is performed if Network Insight is unable to identify
any network devices in a given subnet. Subnet ping sweeps are performed no more that once per day, and will end the
ping sweep on a given subnet once Network Insight discovers a network device and is able to collect data from it. You
can configure the timeout value (Ping Sweep Timeout) and the number of attempts (Ping Sweep Attempts).
Note
Smart subnet ping sweeps are not performed on subnets larger than /22. Ping sweeps of any kind do not apply
on IPv6 networks because of the greater scale of network addresses in the IPv6 realm.
Complete Ping Sweep differs from the Smart Subnet ping sweep in the following ways:
• The discovery ping sweep runs only against the specified range.
• The sweep runs regardless of the range size.
• The sweep runs regardless of the number of discovered devices within the specified range.
Discovery also performs automatic Ping traceroutes when needed for path collection. Path collections run without user
intervention or configuration.
TCP
TCP scanning probes each active host on a list of TCP ports using TCP SYN packets. This method detects all active
hosts that generate SYN ACK responses to at least one TCP SYN. The discovery can determine the OS on a host by
analyzing how the host reacts to the requests on opened and closed ports. It then uses the TCP fingerprints to guess the
OS. To obtain a TCP fingerprint, IP discovery provides two scanning techniques, SYN and CONNECT.
When you use the SYN technique, the discovery sends a TCP SYN packet to establish a connection on a TCP port. If the
port is open, the host replies with a SYN ACK response. The discovery does not close the port connection.
The CONNECT technique is a three-way TCP handshake. The discovery starts with the same process as the SYN
technique by sending the TCP SYN packet. A response containing a RST flag indicates that the port is closed. If the host
replies with a SYN ACK response, discovery sends a RST packet to close the connection. If there is no reply, the port is
considered filtered. TCP scanning is a deliberate and accurate discovery method, enabling detection of all active hosts
on a network provided that there are no firewalls blocking TCP packet exchanges.
You can choose the TCP ports and the TCP scanning technique in the Grid Discovery Properties editor. This method
returns the following information for each detected host:
• IP address: The IP address of the host.
• MAC address: The discovery returns the MAC address only if the Probe member running the discovery is on the
same discovered network.
• OS: This is set to the highest probable OS reported in the response.
To use the TCP discovery method, the TCP port and a specific set of ports between the Probe member and the
discovered networks must be unfiltered. The default set of ports is defined by the factory settings.
NetBIOS
The NetBIOS method queries IP addresses for an existing NetBIOS service. This method detects active hosts by
sending NetBIOS queries and listening for NetBIOS replies. It is a fast discovery that focuses on Microsoft hosts or non-
Microsoft hosts that run NetBIOS services.
NetBIOS discovery returns the following information for each detected host:
• IP address: The IP address of the host.
• NetBIOS name: This value is set to the name returned in the NetBIOS reply.
To use the NetBIOS discovery method, ports 137 (UDP/TCP) and 139 (UDP/TCP) between the Grid member performing
the discovery and the target networks must be unfiltered.
The following table summarizes the supported discovery methods:
Smart IPv4 • IP address Apply on known subnetworks on which ICMP echo request and reply.
Subnet no devices are readily found. Limited to
Ping Sweep
• MAC address networks of /22 and smaller.
Complete Ping • IP address Last resort for discovery. Use ICMP for a ICMP echo request and reply, ICMP
Sweep rough and fast discovery. Enables path traceroute.
• MAC address tracing.
NetBIOS • IP address Use NetBIOS for discovering Microsoft NetBIOS query and reply.
networks or non-Microsoft networks that
• NetBIOS name run some NetBIOS services
TCP • IP address Use TCP for an accurate but slow TCP SYN packet and SYN ACK
discovery packet.
• MAC address
• OS
Port Scanning/ • Open and Closed Disabled by default, use for non-SNMP Scans specified list of TCP ports,
Profile Device devices. using TCP SYN packet.
TCP ports
• IP Address
SNMPv1/v2 • Open and Closed Most important protocols for discovery. Queries and collects system OIDs
SNMPv3 Ensure you have the SNMP credentials such as SysDescr and sysUpTime.
TCP ports necessary for probing devices using
• IP Address SNMP.
• System Description
• System Up Time
• Routing Neighbors
• Routing and
Forwarding Tables
• ARP tables
• SNMP credentials
CLI (Device Command-Line • Similar data set to Requires correctly defined admin login Uses standard device-language
by Telnet or SSH) tuples and Enable passwords where scripts and configured Telnet or SSH
SNMP needed for device types. connection settings to collect
• May be used discovery data.
instead of, or in You may test credentials against
devices and assign CLI credentials to
combination with, individual objects, overriding Grid-level
SNMP and Network-level credential settings.
vDiscovery • IP address Add the VMware vSphere servers on The appliance communicates with the
which you want to perform the vSphere servers to collect discovery
• MAC address vDiscovery. data on virtual machine instances.
• OS For information about how execute a
• Discovered name vDiscovery, see Configuring vDiscovery
• Virtual entity type Jobs.
• Virtual entity name
• Virtual cluster
• Virtual datacenter
• Virtual switch
• Virtual host
• Virtual host adapter
Starting Discovery
To ensure a successful discovery, complete the following:
1. In the Grid, install valid Discovery licenses on the Network Insight supported members that will later become the
Consolidator and Probes. For information about how to install licenses, see Managing Licenses.
2. When you join the discovery members to the Grid, the first member automatically becomes the Consolidator
while the others become Probes. If you want to change the roles of these members after they join the Grid, you
can re-define their member types, as described in Defining the Discovery Member Type. If you have only one
discovery member, it automatically becomes the Consolidator-Probe appliance after it joins the Grid. For more
information about the Consolidator and Probes, see Consolidator and Probes.
3. Configure applicable admin permissions for managing discovery and discovered data. For more information, see
Administrative Permissions for Discovery.
4. Define discovery interfaces and map them to corresponding network views. This step is especially important for
discovering VRF virtual networks. For more information, see Mapping Discovery Interfaces to Network Views.
5. Configure Grid discovery properties such as defining polling settings, configuring SNMP and CLI credentials, and
configuring automatic VRF mapping. For more information, see Configuring Discovery Properties. Note that you
can override the Grid settings at the member and network levels, except for automatic VRF mapping which can
be configured only at the Grid level.
6. Optionally, you can configure seed routers and map them to the corresponding network views. You can also use
the default gateways for associated DHCP ranges and networks as seed routers for discovery by selecting the
Use DHCP Routers as Seed Routers in the General -> Advanced tab of the Grid Discovery Properties editor. For
Note
You must map each discovery interface, seed, and VRF to its respective network view in order to have a
successful discovery for virtual routing instances
7. Specify a network view, network container, or network to be discovered. For more information, see Discovering
Devices and Networks.
8. Optionally, define IP address exclusions when you want to exclude certain IPs from a discovery for various
reasons. For more information, see Excluding IP Addresses from Discovery.
9. Define blackout periods when you do not want the appliance to perform discovery. For information about how to
configure blackout periods, see Defining Blackout Periods.
10. Start the discovery service on the Consolidator and Probes to begin discovery, as described in Starting the
Discovery Service. The Probe members continue to discover network devices within the defined networks.
Managing Discovery
After you start the discovery service, you can do the following to manage the discovery and discovered data:
• Monitor the discovery status, as described in Viewing Discovery Status.
• Execute discovery diagnostics to test the connection of a discovery member, as described in ExecutingDiscovery
Diagnostics.
• Stop discovery on a specific network, as described in Disabling Discovery for a Network.
• View a complete list of discovered devices, their associated interfaces, networks, IP addresses, assets, and
components. For more information, see Viewing Discovered Devices and their Properties.
• Resolve conflicts for discovered data, as described in Conflict Resolution in Network Insight.
• Provision and de-provision networks and manage port configurations, as described in Port Control Featuresin
Network Insight.
Deploying Network Insight in VRF Network Type 1: All Devices on a Management Network
The following figure shows an example of integrating Network Insight with Network Type 1. In this network deployment
type, a single virtual discovery interface can manage all VRF instances' identification of ARP entries, because Network
Insight needs only one discovery interface into the Management VRF.
Deploying Network Insight in VRF Network Type 1: All Devices on a Management Network (Part 2)
The following figure shows the same topology for Network Type 1, but using multiple discovery interfaces and multiple
network views.
In this example, the switch must be configured with the trunk port 'facing' Network Insight to forward Network Insight's
tagged 802.1q traffic to the appropriate destination networks (VLAN 5, VLAN 10, VLAN 20 and VLAN 30 in this example).
The encapsulated sub-interfaces are defined using the correct values on each port; the virtual discovery interfaces on
Network Insight match these values.
Deploying Network Insight in VRF Network Type 2: All VRFs Reachable from a Shared Services VRF
This example illustrates the use of a shared service VRF between the distribution routers in the network and how
Network Insight integrates into such a topology.
All virtual networks are reachable through a shared VRF, to which Network Insight may connect using a single virtual
discovery interface and reach all other VRFs from the one to which it is connected. Each Router in this topology also
shares routes between the VRFs.
Deploying Network Insight in VRF Network Type 2: All VRFs Reachable from a Shared Services VRF (Part 2)
In this version of the VRF Network Type 2 deployment, you use multiple network views and multiple discovery interfaces
in a 1:1 ratio, with the same requirements for trunking and switch VLAN sub interfaces.
Deploying Network Insight in VRF Network Type 3: Devices Reside in Disconnected Networks
In the final example, trunking is in use between Network Insight and its facing gateway switch into the managed network.
This topology requires the use of multiple network views as all VRF networks are completely separate and cannot be
reached through any management virtual network.
Note
The discovery service can only be started on Grid members that are configured as the Consolidator or Probe
(i.e. the Grid members with valid Discovery installed).
Each discovery member requires separate Discovery licenses, and must have a running discovery service. Consider the
following before starting or stopping the discovery service:
• The Grid Master does not run the discovery service.
• Appliances running a Discovery license and the discovery service do not support HA pairs.
• Discovery Probe appliances appear as Grid members in Grid Manager.
• All appliances running discovery must have the Discovery license installed before starting the service.
• Appliances running discovery do not run core network services such as DNS and DHCP. Discovery appliances
may also run the NTP service.
• If you expect to run a single appliance in the Grid for discovery, the appliance is designated as a Consolidator,
and also performs Probe discovery operations.
• When you add a new Grid member with a Discovery license, the appliance is set automatically to the following:
• A Consolidator, if no other discovery member exists in the Grid.
• A Probe, when at least one discovery appliance exists in the Grid
Note
When a member joins the Grid and applies a Discovery license for the first time, the admin user needs to log off
and log in again to Grid Manager to see the discovery-enabled functionality.
For information about discovery configuration at the service level, see Configuring Discovery Properties.
Note
The Consolidator and Unassigned member types in the Grid mode are disabled if the member has
SDN/SD-WAN configurations on it. This is because SDN/SD-WAN configurations can be added to only
Probe or standalone member types. In the standalone mode all member types are available for
selection.
Note
The VLAN interfaces you configured on any Network Insight appliances are used for discovery only.
Other services are not supported on these appliances for VLANs. For information about how to define
network interfaces on the appliance, see Configuring Ethernet Ports.
The Discovery Interfaces table displays all interfaces you have configured on the member. To discover using
multiple interfaces, you must associate each interface with an available network view. A single default network
view exists in NIOS by default. All networks created or discovered for NIOS management must be part of a
network view. If more than one network view exists in the Grid, you can map a network view other than the default
view to the interface. This essentially serves to allow one or more discovery members to perform discovery on
separate routing domains, because a network view is comprised of a single routing domain with its own networks.
If you do not want to use a configured interface as the discovery interface, simply leave the network view empty
or unassigned for that interface. When you first set up an interface, no network view is assigned to the interface
by default.
The appliance displays the following for each interface you configure on the Probe member. To modify the
network view for an interface, click the Network View column and select the network view you want to associate
with the corresponding interface.
• Interface: Displays the name of the interface. You cannot modify this field. Discovery supports the LAN1, LAN2,
MGMT, and VLAN interfaces. You must first define these interfaces for the member before using them for
discovery.
• VLAN Tag: Displays the VLAN tag or ID for the corresponding VLAN interface. This field is left blank for all
physical interfaces. You cannot modify this field.
• Network View: Displays the current network view with which the interface is associated. An interface is not
associated with any network view and this field is left blank by default, which means the interface is not used as a
discovery interface. To modify the network view, click the Network View column for the corresponding interface
and select the network view you want to reassign to the interface from the drop-down list. The appliance
associates an interface with the default network view if you have not configured additional network views.
• Save the configuration.
Note
You must be a superuser to configure discovery properties for the Grid.
Note
When you disable SNMP collection on a network with enabled discovery, Network Insight still attempts
to authenticate the SNMP credentials of devices that are newly discovered under this network. All newly
discovered devices are automatically bound to a default group with enabled SNMP collection.
5. CLI Collection: Select this if you expect to use Network Insight to discover devices that support CLI connectivity
through Telnet or SSH, and that you possess admin account information. NIOS can use device admin account
logins to query network devices for discovery data collection, including IP configuration, port configuration, routing
and forwarding tables, and much more.
Note
For SNMP and CLI Collection methods, configure device polling credentials in the Credentials tab of
the editor. For more information, see Configuring Device Credentials.
6. Port Scanning: Select this to probe the TCP ports. Ensure that you go to the Advanced tab to configure more
settings for this option as described in the next section. If you disable Port Scanning, NIOS attempts no port
probes other than SNMP on any device.
Note
NIOS does not perform Smart Subnet Ping sweeps on subnets larger than /22. NIOS also does not
perform Ping sweeps on IPv6 networks, because of the dramatically greater scale of network addresses
in the IPv6 realm. The Complete Ping Sweep differs from the Smart Subnet Ping Sweep in the following
ways:
• The Complete Ping Sweep will run only against the specified range.
• The sweep will run regardless of the range size.
• The sweep will run regardless of the number of discovered devices within the specified range.
9. NetBIOS Scanning: Select this to enable NIOS to collect the NetBIOS name for endpoint devices in the network.
This feature can be enabled only by users with SysAdmin privileges. This feature is globally disabled by default
(and also for device groups) to prevent unexpected scanning of the network by a new collector.
10. Automatic ARP Refresh Before Switch Port Polling: Select this to enable refreshing of ARP caches on switches
and switch-routers in the managed network before NIOS performs polling of switch ports. Enabling this feature
applies only to switched Ethernet devices. This feature enables more accurate detection of all endpoint devices
on L2 switches. Without ARP refresh, some endpoint devices may not be detected. This feature is globally
disabled by default. Individual ARPs can also be set to enable or disable this feature.
11. Switch Port Data Collection: Select this to enable the Probe member to poll L2 enterprise switches. You can
completely disable switch port polling by deselecting this checkbox. You can also separately schedule polling for
switch port data collection as follows:
12. Periodic Polling: Define regular polling time periods. Choose a polling interval of 30 or more minutes or 1-24
hours.
13. Scheduled Polling: Schedule recurrent polling based on hourly, daily, weekly, or monthly time periods. Choosing
this option, click the Calendar icon and a Polling Scheduler appears; click the Edit icon to make scheduling
changes. Choose a recurrence pattern of Once, Hourly, Daily, Weekly, or Monthly. In all cases, you must choose
an Execution Time.
14. Save the configuration.
Note
Check for a list of configured DHCP seed routers for any discovery Probe member in
the Seed tab -> Advanced tab of the Member Discovery Properties editor.
• Log IP Discovery events in Syslog: Sends a message to the configured Syslog service when an IP
address of an active host is discovered.
• Log network discovery events in Syslog: Sends a message to the configured Syslog service when a
network discovery process takes place in the Grid.
7. Save the configuration.
Note
You can test username/password credentials or an Enable password credential. You can also combine a
username/password credential and an Enable password credential as part of the same test.
Note
Should you choose to use a Telnet-based credential, Network Insight requires both the
username and password for the login account. This also applies when you override the
CLI credentials on objects such as a fixed address, host, or IPv4 reservation. For more
information, see the section Defining CLI Credentials Settings for Objects.
Note
For each network, the IP list page provides a Type data column showing the IPAM object type that is
associated with any IP address. Also, check the MAC Address column in the IP List page for information
about associated objects.
3. Click the IP address. On the IP address page, click the Related Objects tab.
4. Select the checkbox for the object in the Related Objects panel and click Edit.
5. In the object editor, click the Discovery tab.
6. Click Override CLI Credentials.
By default, CLI credential definitions use SSH at the object level. Select Allow Telnet if you want to allow both
SSH and Telnet credential usage. Infoblox recommends SSH because of better security.
7. Enter the Name and Password values and the Enable Password value.
8. Click Test CLI Credentials to test the CLI discovery credential settings applied to the object.
9. When finished, click Save & Close.
Note
If the specified IP address is excluded from all discovery ranges, if it is not a part of the selected
network view, or if the credential is entered with missing information, a message appears at the top of
the editor after clicking Start. Otherwise, the test begins and its process and results appear in the lower
panel of the editor.
Note
The Name field does not support the Unicode encoding.
Note
All NIOS Probe members automatically use their default gateway as a seed router. These gateways are
automatically displayed in the table. For effective use of seed routers, you must also provide SNMP credentials
to NIOS to allow it to pull the key routing and connectivity information, including the IPv6 routing table and the
local Neighbor Discovery Cache, from the device. If you do not define a seed router, it is recommended that
you enable discovery for a network or DHCP range.
Note
For effective use of seed routers, provide SNMP credentials to the Probe member to allow it to pull the key
routing and connectivity information, including the IPv6 routing table and the local Neighbor Discovery Cache,
from the device. For more information, see Defining Seed Routers for Probe Members.
Note
To ensure successful SDN and SD-WAN discovery, use an admin user account.
Note
The Cisco APIC Configuration tab in the member discovery properties was renamed to SDN/SD-WAN. You can
find all previously configured Cisco ACIs in this tab that is described below.
Note
A network name in the mapping table is made up by combining the Meraki organization and network name. The
Source column displays the fabric name or config name that you previously defined for the SDN or SD-WAN
configuration. The network view name is made of the network and source values.
Note
This checkbox is available if a Consolidator exists in the Grid and the discovery service is working.
5. Network Interface: Specify one of the network interfaces of the Consolidator that runs Advisor. This interface is
used for the internet connection to obtain the lifecycle and vulnerability data.
Note
In fact, Advisor runs not at the exact hour specified, but at any minute of the specified hour.
8. If you do not want to expose your Grid member directly to the internet, select Use proxy server. Ensure that the
proxy server has access to the internet.
9. Specify the following information for the proxy server:
• DNS Name or IP Address
• Port
• Credentials to connect to Proxy Server (username and password)
10. Under Advisor Central, specify the following data:
• API Endpoint Address: The IP address of the Advisor API endpoint.
• API Endpoint Port: The port of the Advisor API endpoint.
• Authentication: Select Token or Credentials.
• If you selected token authentication, specify the authentication token value.
• If you selected credentials authentication, specify the username and password.
11. In Minimum Severity, specify the severity threshold for vulnerabilities data that you want to obtain for your
devices. To see possible values, hover the mouse over the field. The popup window displays the following values:
• Critical: 9.0-10.0
• High: 7.0-8.9
• Medium: 4.0-6.9
• Low: 0.1-3.9
• None: 0.0
12. Last Scheduled Execution Result: Displays the timestamp of the last successful or unsuccessful scheduled
execution result.
13. Last Run Now Result: Displays the timestamp of the last successful or unsuccessful immediate execution result.
14. Test connection to central: Central refers to the server where the application for Network Insight Advisor is
running, that is the Advisor server. NIOS sends a POST query to the Advisor server from Discovery Consolidator,
when you click Test connection to central. In the API Endpoint Address, the server address is specified. If the
query enters the Advisor server successfully and returns a correct response, then OK is displayed else Not OK is
displayed.
15. If you want to launch Advisor immediately, click Run Now.
16. Save the configuration.
Note
All the VRF mapping rules that are currently configured for the Grid are displayed in the VRF Mapping
Rules table.
You can also do the following in the VRF Mapping Rules tab:
• Select a specific rule and click the Delete icon to remove it from the table.
• Use the up and down arrows next to the rules table to reorder the rules.
• Use the Go to function to search for a specific mapping rule. With the autocomplete feature, you can just enter
the first few characters of a network view in the Go to field and select the network view from the possible
matches.
Note
You use the IPv4 Network or IPv6 Network editors to exclude IP addresses or ranges of IP addresses from
discovery within the specified network. For more information, see Disabling Discovery for a Network.
Note
You may create a network and choose not to discover it at that time, by disabling
both Enable Immediate Discovery and Enable Discovery. If you disable the Enable Discovery checkbox, the
network will never be discovered unless you change the setting again at a later time.
Conversely, you can explicitly exclude specific IPs or IP ranges from discovery. Discovery will never take place
on these IPs unless the admin specifically changes their exclusion setting.
Administrators can specify IPv4 and/or IPv6 addresses that must be immediately discovered by the appliance. Some
devices may need exclusion because they do not support SNMP, or for other organizational reasons.
Devices matching IP addresses selected for immediate discovery (using the Discover Now feature described in Using
Discover Now to Discover an Existing Object) are given one-time priority over other discovered devices, for data
collection and counting toward any device found matching the license limits.
A device specified through an IP address can also be excluded from discovery or management.
Note
You may also use the List page for the selected network to exclude IPs or selected ranges of IPs.
However, you have to page through or search through the pages comprising the list view to locate the
IPs you want to exclude. (If you know the IP address value in the List view but it does not appear on the
page, enter it in the Go to field to search for the IP.) The IP Map view allows you to view every IP
address in a selected network, such as a /24 prefix.
3. Select one or more IPs in the map. SHIFT+click to select a series of contiguous IPs. CTRL+click to select non-
contiguous IPs.
4. Expand the Toolbar and click Exclusion –> Enable Exclusion. The selected IP addresses are excluded from any
discovery actions.
Note
You can click the Action icon for any List record and choose Exclusion–>EnableExclusion.
Note
The network lists between IPAM and DHCP will likely differ, because networks can be set to be
Disabled from DHCP. IPAM provides a complete list of all networks configured or discovered by
Grid Manager.
Note
For adding a host record, the first step in the Add Host Wizard requires adding an IP address.
5. If the network of the IP address is served by a Grid member, Grid Manager displays the AssignIPAddressby section,
with its MACAddress, DHCPClientIdentifier and DHCPRelayAgent settings. Select the different options as needed to
define a fixed IP Address or another object.
6. Click Next to continue to the DHCP Options page in the wizard.
Note
For more information about DHCP Options configuration, see About the Next Available Network or IP Address.
7. If you do not wish to configure DHCP Options for this Fixed IP, click Next to go to the following Wizard step.
8. (Optional) In the DeviceInformation page, select the Device Type and the Device Vendor, or, if you do not wish to
configure device settings for the current object, click Next to go to the next Wizard step, for defining discovery settings.
Note
For more information about Device Information settings, see Creating Port Reservations for IPAM Objects.
Note
Clicking Schedule for Later is a navigational button to allow you to skip quickly to the scheduling step in
the Wizard. You can return at any time to complete remaining Wizard steps to finish creating the object.
You may click the Schedule for Later button at any time in the Wizard process. For more information,
see Scheduling New IPAM/DHCP Objects and Associated Port Configurations.
10. (Optional) Click Next to go to the sixth Wizard step, which governs Reserve Port and Configure Port settings. (For
more information, see Creating Port Reservations for IPAM Objects.) Click Next when finished with settings.
11. If necessary, add or apply any extensible attributes necessary for the new record. Click Next.
12. The final Wizard page governs scheduling of the object creation task and the optional port reservation task. Click
Save & Close.
Note
Individual IP addresses within a network, and specific object types (IPv4 reservation, fixed address, and host),
may be excluded from discovery. You must explicitly select Enable Discovery for other object types (IPv4 and
IPv6 Ranges, IPv4 and IPv6 Networks); you can optionally Enable Immediate Discovery.
If you choose not to perform immediate discovery, but do Enable Discovery, the new network or other object is
discovered at a normal time determined by Network Insight.
You can manually perform discovery on any object at any time by selecting the object and choosing
Discover Now from the Toolbar. For more information, see Object. When you do so, you see
a status icon appear in the Discover Now data column
for the object under IPAM, in the Data Management –> DHCP page and other locations.
By default, Grid discovery settings are the prevailing settings for all newly created objects. You can override basic
discovery polling options for networks and DHCP ranges allowing immediate discovery.
In such cases, local settings take priority. Credentials cannot be overridden for networks and DHCP ranges,
Note
If after you select a a network, object or IP and the Discover Now button is not enabled, make sure the network
or other object has a discovery Probe member assigned to it.
After you create any supported IPAM object, you may wish to perform discovery on it at a later time. You can simply
select the object and discover it.
Note
In a bulk conversion, if one or more of the selected entities are not eligible for conversion because they do not
have a discovered name (FQDN) or due to other reasons, Grid Manager displays a warning message indicating
only eligible entities are displayed in the conversion wizard and qualified for conversion. Those that cannot be
converted are ignored and will remain in unmanaged state.
For more information about how to convert unmanaged entities to managed objects, see the following sections:
• For unmanaged devices, see Converting Unmanaged Devices to Managed Devices.
• For unmanaged interfaces, see Converting Unmanaged Interfaces to Managed Status.
Note
For convenience, the home DataManagement–>Devices page
provides a quick filter to list only managed devices. In the
Devices page, all devices highlighted in yellow indicate a
device that is unmanaged.
Device discovery allows you to define a fully managed state for any
discovered routers, switches, firewalls, end hosts, and other network infrastructure devices. The process differs from
converting an unmanaged network, because you can bind a discovered device to a fixed address, a PTR Record, a host
record or an IPv4 reservation. Doing so offers the following benefits:
• Host Record – Infoblox hosts are data objects that contain DNS, DHCP, and IPAM data of the assigned
addresses. Host objects allow you to assign multiple IPv4 and IPv6 addresses to a host. When you create a host
record, you are specifying the name-to-address and address-to-name mappings for the IP address that you
assign to the host. The Infoblox DNS server then uses this data to respond to DNS queries for the host. This
establishes the identity of any infrastructure device or asset on the network. For more information, see About
Host Records.
• A Record – An A (address) record is a DNS resource record that maps a domain name to an IP address. A
records essentially tell DNS that a host exists inside a domain, as part of a forward-mapping zone. All traffic to a
domain or subdomain is directed to the IP address specified by the A record. The DNS zone must exist in the Grid
Manager before attempting to assign A records to devices. For more information about A records, see Managing
A Records.
• PTR Record – Maps a device IP address to a host name in a reverse-mapping zone. The zone must already be
defined before assigning the new PTR record object. For more information about PTR records, see Managing
PTR Records.
• Fixed Address – A fixed address represents a persistent link between an IP address and one of the following:
MAC address, Client identifier, or Circuit ID/remote ID in the DHCP relay agent option (option 82). Most
applications in the current context are for a MAC address. You can configure fixed addresses for network devices,
such as routers and printers, that do not frequently move from network to network. By creating fixed addresses
for network devices, clients can reliably reach them by their domain names. Some network devices, such as web
or FTP servers, can benefit from having fixed addresses for this reason. For more information about these object
types, see Configuring IPv4 Fixed Addresses and Configuring IPv6 Fixed Addresses.
Each object type has its own characteristics that you may apply to specific types of discovered devices. For many
infrastructure devices such as routers, or Assets such as servers, a fixed address is a likely choice.
Begin by examining the Data Management –> Devices page. The Managed column, as shown in Figure 15.4 , can list
one of three possible states for all discovered devices:
• Blank value–indicates that the device is not known to IPAM, because insufficient information is available to
identify and catalog the device at the present time;
• No–Shows that the device in the Devices table is not managed under IPAM or Grid Manager, but enough
information is collected and the device can be converted to the Managed state.
• Yes–The device in the table is a managed object with an IPAM object type (host, A record, PTR record or fixed
address).
Note
Network Insight creates the names of the new managed objects using the Discovered Name (FQDN) for
the entities being converted. In the wizard, Grid Manager displays the IP addresses of the selected
devices that are eligible for conversion in the Selected IP Addresses table. Entities that are not eligible
for conversion will not be converted and will not appear in this table.
Based on the selected conversion type, complete the following to start a bulk conversion:
a. To Host: You can select Enable in DNS and/or Enable in DHCP so the appliance can serve DNS and/or
DHCP for the selected IP addresses in the host record. When you enable DNS, you must select a DNS
zone for all entities that do not have an FQDN.
b. To A & PTR Record: Network Insight converts the selected entities to A & PTR records simultaneously.
You must select a DNS zone for all entities that do not have an FQDN.
c. To Fixed Address: Network Insight automatically converts all selected IP addresses to fixed addresses in
a bulk conversion. As with host record and A/PTR record conversions, entities without a Discovered Name
are not eligible for conversions to fixed addresses.
Note
For convenience, a device Interfaces panel provides a quick
filter to list only managed interfaces for the device. When a
device is converted to managed status, interfaces in the
device may remain in unmanaged state. If the interface has an
IP address that is recognized under IPAM, it may be converted
to managed state.
Interfaces that appear in the Interfaces table for a device may be converted to managed status, under specific
circumstances. If an interface is bound to an IP address that is present in an IPAM network (for example, a leaf network
inside a network container under IPAM), that interface can be converted to managed status.
For any device, any interface with a hotlink to IPAM may be converted. Examples are shown in Figure 15.5. Figure 15.5
Device Interfaces Available for Conversion
In Figure 15.5 , two interfaces provide a link to their respective IPAM interface pages, and show an IPAM Type of
Unmanaged. These ports may be converted to IPAM objects and managed under Grid Manager.
1. From the Data Management tab, select the Devices tab.
2. Click the Next Page and Last Page icons to locate the device through which you want to locate the interfaces to
convert.
3. Click the Name link of the device.
4. Click the Interfaces tab for the chosen device. This tab lists all ports discovered on the device.
5. To convert a single interface: Click the Action icon next to the interface you want to convert (this automatically
selects it), and then select Convert –> To Host, To A Record, To PTR Record, or To Fixed Address from the
menu.
Note
Network Insight creates the names of the new managed objects using the Discovered Name (FQDN) for
the entities being converted. In the wizard, Grid Manager displays the IP addresses of the selected
devices that are eligible for conversion in the Selected IP Addresses table. Entities that are not eligible
for conversion will not be converted and will not appear in this table.
Based on the selected conversion type, complete the following to start a bulk conversion:
a. To Host: You can select Enable in DNS and/or Enable in DHCP so the appliance can serve DNS and/or
DHCP for the selected IP addresses in the host record. When you enable DNS for the record, you must
select a DNS zone for all entities that do not have an FQDN.
b. To A & PTR Record: Network Insight converts the selected entities to A & PTR records simultaneously.
You must select a DNS zone for all entities that do not have an FQDN.
c. To Fixed Address: Network Insight automatically converts all selected IP addresses to fixed addresses in
a bulk conversion. As with host record and A/PTR record conversions, entities without a Discovered Name
FQDN are not eligible for conversions to fixed addresses.
In all bulk conversions, you can define extensible attributes for the selected IP addresses. After you have
configured the necessary settings, you can convert the discovered entities immediately or schedule the
conversion by selecting Later and entering the date and time.
7. Click Save & Close to make the conversion. The interface is associated with the new IPAM object.
In the IPAM Type column for all converted entities, Grid Manager displays Managed to indicate their managed
status. You can now manage these IPAM objects through Grid Manager.
Note
Networks inherit discovery setting from their parent networks. Discovery will be disabled for networks
that do not have a parent network.
a. If necessary, select the Disable for DHCP checkbox. When you convert a network to managed status,
Grid Manager uses the discovered Router IP for the network to automatically populate the Router IP value
in DHCP configurations for the selected network. Selecting this option disallows the converted network
from being usable under DHCP.
b. If necessary, click the Discovery tab and click Enable Discovery to start discovery on the network after it is
converted to Managed state. You can also elect not to discover the network, by leaving the checkbox
clear.
• Click Select Member to choose the Probe member through which the network may be discovered.
• If necessary, click Override under Polling Options, and modify the device discovery polling options
for the network. You can also specify Discovery Exclusions or a Discovery Blackout period.
• A number of associated DNS and DHCP services are also available for configuration for the new
IPAM network, including DHCP Forwarding, IPv4 DDNS settings, and an array of other DDI
service settings for the network. None of these configurations are required in order for the network
to be in Managed state, but may be required for other purposes.
7. Click Save & Close to make the conversion.
In the Managed column in the Networks tab, Grid Manager displays Yes for all converted entities to indicate their
Managed status. You can now manage the networks through Grid Manager.
Note
When you convert a network to managed status, Grid Manager uses the discovered Router IP for the network
to automatically populate the Router IP value in DHCP configurations for the selected network. Conversion for
DHCP is optional; you can choose to DisableforDHCP when you convert the network.
Note
Unmanaged IP addresses that are part of an unmanaged network cannot be independently converted to a
managed IP address.
Unmanaged networks can be converted at the IPAM main page and at the device level under Data Management –>
Devices, selecting a device and opening the Networks page.
Under IPAM, the Managed column for the Network tables can show one of two possible states for all discovered IPAM
networks:
• No–Shows that the network is not managed under IPAM/Grid Manager, but enough information is catalogued that
the device can be converted to Managed state. This state is required before a network can be converted to
managed status.
• Yes–The network shown in the table is now Managed under IPAM, converted to an IPAM network.
You can discover the network again after it is converted, or keep discovery disabled and execute it at another time, or
impose blackout periods that limit the time windows under which discovery can execute on the network. Other
management benefits include the ability to enable Infoblox services to the network;
1. From the Data Management tab, select the IPAM tab.
2. To convert a single network: Click the Action icon next to the network you want to convert to the Managed
state (this automatically selects it), and then select Convert from the menu.
To convert multiple networks (bulk conversion): Select the checkboxes of the networks you want to convert to the
Managed state. From the Toolbar, select Convert from the menu.
You do not need to take further action other than Save & Close to set the network as Managed.
3. If necessary, you can select the converted network and do the following in the Network editor:
4. Select the Disable for DHCP checkbox to disallow the converted network from being usable under DHCP.
• If necessary, click the Discovery tab and click Enable Discovery to start discovery on the network
immediately after it is converted to Managed state. You can also elect not to discover the network, by
leaving the checkbox clear.
• Click Select Member to choose the Probe member through which the network may be discovered.
• If necessary, click Override under Polling Options, and modify the device discovery polling options for the
network. You can also specify Discovery Exclusions, port control settings, or a Discovery Blackout period.
• A number of associated DNS and DHCP services are also available for configuration for the new IPAM
network, including DHCP Forwarding, IPv4 DDNS settings, and an array of other DDI service settings for
the network. None of these configurations are required in order for the network to be in Managed state,
but may be required for other purposes.
5. The IPAM main page shows Yes as the value for the network under the Managed column. The network is now
under management of IPAM and can participate in Infoblox services.
Note
Most conversion operations for networks and individual IP addresses are managed under IPAM and are
described in the section Managing IPv4 and IPv6 Addresses.
Note
Network Insight creates the names of the new managed objects using the Discovered Name (FQDN) for
the entities being converted. In the wizard, Grid Manager displays the IP addresses of the selected
devices that are eligible for conversion in the Selected IP Addresses table. Entities that are not eligible
for conversion will not be converted and will not appear in this table.
Based on the selected conversion type, complete the following to start a bulk conversion:
a. To Host: You can select Enable in DNS and/or Enable in DHCP so the appliance can serve DNS and/or
DHCP for the selected IP addresses in the host record. When you enable DNS for the record, you must
select a DNS zone for all entities that do not have an FQDN.
b. ToA&PTRRecord: Network Insight converts the selected entities to A & PTR records simultaneously. You
must select a DNS zone for all entities that do not have an FQDN.
c. ToFixedAddress: Network Insight automatically converts all selected IP addresses to fixed addresses in a
bulk conversion. As with host record and A/PTR record conversions, entities without a Discovered Name
FQDN are not eligible for conversions to fixed addresses.
Note
Network Insight creates the names of the new managed objects using the Discovered Name (FQDN) for
the entities being converted. In the wizard, Grid Manager displays the IP addresses of the selected
devices that are eligible for conversion in the Selected IP Addresses table. Entities that are not eligible
for conversion will not be converted and will not appear in this table.
Based on the selected conversion type, complete the following to start a bulk conversion:
a. To Host: You can select Enable in DNS and/or Enable in DHCP so the appliance can serve DNS and/or
DHCP for the selected IP addresses in the host record. When you enable DNS for the record, you must
select a DNS zone for all entities that do not have an FQDN.
b. To A & PTR Record: Network Insight converts the selected entities to A & PTR records simultaneously.
You must select a DNS zone for all entities that do not have an FQDN.
c. To Fixed Address: Network Insight automatically converts all selected assets to fixed addresses in a bulk
conversion. As with host record and A/PTR record conversions, entities without a Discovered Name
FQDN are not eligible for conversions to fixed addresses.
In all bulk conversions, you can define extensible attributes for the selected assets. After you have configured the
necessary settings, you can convert the discovered entities immediately or schedule the conversion for a later date by
selecting Later and entering the date and time.
7. Click Save & Close to make the conversion. You can return to the managed object at any time to make further
configuration changes.
In the Managed column for all converted entities, Grid Manager displays Yes to indicate the managed status. The
selected assets are associated with the newly converted IPAM objects. You can now manage these IPAM objects
through Grid Manager.
Note
Network Insight updates only records that are created by the Network Insight process. It does not create or
update DNS records that are originally created by other admin users.
1 vm${1}- vm172-example.com / The first octet (quad for IPv6) of the discovered asset. Alias for
192.168.1.1 "ip_address_octet1".
example.com
2 vm${2}- vm41-example.com / The second octet (quad for IPv6) of the discovered asset. Alias for
192.168.1.1 "ip_address_octet2".
example.com
3 vm${3}- vm13-example.com / The third octet (quad for IPv6) of the discovered asset. Alias for
192.168.1.1 "ip_address_octet3".
example.com
4 vm${4}- vm9-example.com / The fourth octet (quad for IPv6) of the discovered asset. Alias for
192.168.1.1 "ip_address_octet4".
example.com
ip_address $ b.example.com / The IP address octet (quad) substitution. Useful for IPv6 addresses.
[index] {ip_address[7] 2001:db8:acad::1 Throws an error if address have less octets (quads) than specified.
}.example.com
ip_address dev-$ dev-2.example.com / The first octet (quad) of the discovered asset.
_octet1 {ip_address_oc 2dba::db8::1
tet1}.example.
com
ip_address dev-$ dev-d.example.com / The second octet (quad) of the discovered asset.
_octet2 {ip_address_oc 2dba::db8::1
tet2}.example.
com
ip_address dev-$ dev-b.example.com / The third octet (quad) of the discovered asset.
_octet3 {ip_address_oc 2dba::db8::1
tet3}.example.
com
ip_address dev-$ dev-a.example.com / The fourth octet (quad) of the discovered asset.
_octet4 {ip_address_oc 2dba::db8::1
tet4}.example.
com
Supported Functions
dashed ${dashed(${ip_address})}- 1-2-3-4-vm.example.com / Replaces the dot "." and colon ":"
1.2.3.4 symbols with the hyphen symbol "-".
vm.example.com
underscored ${underscored(${ip_address})}- 1_2_3_4-vm.example.com / Replaces the dot "." and colon ":"
1.2.3.4 symbols with the underscore symbol
vm.example.com
"_".
Discovered by Network
Name Insight Description
method Y The method being used for network discovery: FULL, ICMP,
NETBIOS, TCP, or CSV.
network_component_type Y The type of network component, such as Switch, Router, and others.
port_speed Y Speed settings on the port on the network component: 10M, 100M,
1G, 10G, 100G, or Unknown.
vswitch_segment_type N/A Type of network segment on which the current virtual machine/vport
is connected.
vswitch_tep_ip N/A IP address of the virtual tunnel endpoint (VTEP) in the virtual switch.
vswitch_tep_port_group N/A Port group of the virtual tunnel endpoint (VTEP) in the virtual switch.
vswitch_tep_vlan N/A VLAN of the virtual tunnel endpoint (VTEP) in the virtual switch.
vswitch_tep_dhcp_server N/A DHCP server of the virtual tunnel endpoint (VTEP) in the virtual
switch.
vswitch_tep_multicast N/A Multicast address of the virtual tunnel endpoint (VTEP) in the virtual
switch.
vmhost_ip_address N/A IP address of the physical node on which the virtual machine is
hosted.
vmhost_name N/A Name of the physical node on which the virtual machine is hosted.
vmhost_mac_address N/A MAC address of the physical node on which the virtual machine is
hosted.
vmhost_subnet_cidr N/A CIDR subnet of the physical node on which the virtual machine is
hosted.
vmhost_nic_names N/A List of all physical port names used by the virtual switch on the
physical node on which the virtual machine is hosted. Represented
as: eth1,eth2,eth3.
first_discovered_timestamp Y The timestamp when this IP was first seen by the discovery station.
mgmt_ip_address Y Management IP address of the device if the device has more than
one IP.
is_end_host Y Whether this object is an end host or an infrastructure device for the
purpose of discovery.
vswitch_ipv6_enabled N/A Indicates whether the virtual switch has IPV6 enabled: true or false
vport_name N/A Name of the network adapter on the virtual switch connected with the
virtual machine.
vport_mac_address N/A MAC address of the network adapter on the virtual switch to which
the virtual machine is connected.
vport_link_status N/A Link status of the network adapter on the virtual switch to which the
virtual machine is connected.
vport_conf_speed N/A Configured speed of the network adapter on the virtual switch to
which the virtual machine is connected. Unit is Kib.
vport_conf_mode N/A Configured mode of the network adapter on the virtual switch to
which the virtual machine is connected: Unknown, Full-duplex, or
Half-duplex
vport_speed N/A Actual speed of the network adapter on the virtual switch to which
the virtual machine is connected. Unit is Kib.
cisco_ise_quarantine_status N/A Quarantine status for the IPAddress as coming from Cisco ISE:
NONE or QUARANTINE
LIKE variable string (regular expression in $ Evaluates as true if the lvaluevariable matches the given
extended format) regular expression rvalue; otherwise false
{discovered_name}
like "[vV]m-
[0-9]+.devnet.org
"
== variable string ${ip_address} == Evaluates to true if the lvalue variable equals to rvalue
string literal, false otherwise
"167.45.13.29"
!= variable string ${mac_address} != Evaluates to true if the lvalue variable is not equal to
rvalue string literal, false otherwise
"00:50:56:00:00:0
1"
Note
For information about managed and unmanaged devices,
see Converting Unmanaged Devices to Managed Devices. You can also use the "Unmanaged devices
and networks" filter in global search to locate all the unmanaged devices and networks discovered
through discovery. For more information, see Using Global Search.
Also, you can view VRF-based devices and map them to network views from the Data Management → Devices tab. See
Viewing Discovered VRFs and Mapping Network Views.
Note
Changing of management IP address may take some time.
Note
Administrators can access discovered and managed devices in Grid Manager. For tasks such as
provisioning networks, adding administrative permissions is advised to ensure that unauthorized
changes to device configurations cannot take place. For example, you can use accounts with
the Port Control permission to control and manage network provisioning tasks.
Note
The appliance displays a warning message when there are discovered VRFs that are not mapped to
network views. To ensure that discovered VRFs are mapped to network views, you can configure
automatic VRF mapping, as described in Configuring Automatic VRF Mapping.
• Provision Network : Available for managed networks and for unmanaged networks that are recognized by
IPAM. For information, see Provisioning and De-Provisioning Networks. Clicking this icon opens the Provision
Network feature, allowing you to provision the network onto the actual device by selecting a device interface, and
enabling DHCP Forwarding and/or assigning a VLAN. Grid Manager creates a new port control task under Task
Manager, and you can choose the interface on which the network is provisioned, along with VLAN configuration
and other settings.
• De-Provision Network : Available for discovered networks that are not visible under IPAM. A dialog box
appears summarizing the task.
• Show Active Users: For Microsoft Management only. Displays the Active Users dialog box. You can view all the
active users on the Active Directory domain for the selected device. For more information, see Viewing Active
Network Users.
Modifying Networks
Grid Manager enables the user to edit select DHCP configurations, including the following:
IPv4 DHCP Options/IPv6 DHCP Options: DHCP options provide specific configuration and service information to DHCP
clients. For more information, see About IPv4 DHCP Options.
DHCP Forwarding: Enables routers connecting multiple networks to act as a silent DHCP relay and forward DHCP
packets between them. The DHCP Forwarding page lists the interfaces on the currently selected network on which
DHCP Forwarding is enabled. If more than one device on the selected network also enables DHCP Forwarding, they
also appear here. DHCP Forwarding configuration involves simply enabling or disabling the service for a network
endpoint on the device. In order for DHCP forwarding to work, you must restart the DHCP service on the Grid member
that is serving the network; If you run DHCP service on both LAN1 and LAN2 of the Grid member, then both addresses
are written to the device.
1. From the Data Management tab, select the Devices tab.
2. Click the Name link for the device you want to inspect.
3. Click the Networks tab.
4. Click the Action icon for a network in the table, and choose Edit. This feature is enabled only for networks that
are managed under IPAM.
5. Click the DHCP Forwarding tab.
6. Select the checkbox for any listed instance and do the following if necessary:
• Click Configure. Grid Manager queries you to confirm that DHCP Forwarding are configured on the
selected network (A task will be created to configure DHCP forwarding for this network on these devices:
<device_name>. You can view the execution log for the task in the Task Manager to see the results).
• Click Delete to remove the selected DHCP Forwarding instance from the network.
Note
One useful trick for interfaces is to pick out an interface from the Interfaces page that has multiple IPs and open
the IPAddresses tab; or sort the IP addresses table by its IPAddress column, and locate the interface name that
bears multiple IPs. Frequently, an interface with multiple addresses can have IPv4 and IPv6 addresses bound
to it. Loopbacks are another example.
1. From the Data Management tab, select the Devices tab. The Devices Home page displays a list of all devices
currently found and catalogued by discovery.
2. Click the Action icon for a chosen device and choose Interfaces from the drop-down menu, or simply click the
device name to display the Interfaces list. Click Devices Home to return to the main Devices page.
3. Click the IP Addresses tab. Grid Manager displays all IP addresses associated with the chosen device. Grid
Manager displays the following information for each IP address:
• IP Address: The IP address for each discovered interface as managed by NIOS and IPAM. The table
supports IPv4 and IPv6 values. Each IP address is a link to the home IPAM page for the interface. If an IP
address does appear but is not a link, this indicates the discovered IP is not recognized under IPAM.
• VRF Name: The name of the VRF associated with the interface, if applicable.
• Network View: The name of the network view to which the VRF instance belongs, if applicable. If there is
only one network view in the Grid, which is the default view, the Network View column is hidden by
default.
• VRF Description: The description about the VRF instance, if applicable.
• VRF RD: The route distinguisher associated with the VRF instance, if applicable.
• Interface Name: The name of the interface (usually a switched interface) associated with the discovered
device.
• MAC Address: The hardware MAC address associated with the interface.
• VLAN Name/VLAN ID: The data VLAN name and VLAN identifier to which the interface is
bound, if applicable. In most cases, you see both the VLAN name and the VLAN ID as two
values in the same field. Multiple VLAN entries may be present for an interface or IP
Address.Some interfaces may have a large number of associated VLANs. By default,
Network Insight does not automatically show all of them, instead providing a Show all... link
for reference within the table cell. All VLAN ID/VLAN name values appear within the table cell, with a Hide... link
provided to shorted the list back to original length.
• AdminStatus: Lists whether the interface is administratively Up or administratively Down.
Note
The list of assets at this level may include devices that are trunked to the current device, including end-
user host computers or routers and switch-routers neighboring the currently selected device.
Note
To view information about the device, including its IPAM Type and the operating status of its ports, click
the Action icon for a chosen device and choose Device Details in the drop-down menu.
Note
Opening Discovery Status for viewing requires Superuser permissions under Grid Manager.
You can view the complete discovery status of all devices or of selected devices.
To isolate devices for evaluation, use filtering to reduce the list. Click Use Filter at the top of the table and choose IP
Address, Name, or Overall Status as the filter.
To view the discovery status, complete the following:
1. From the Data Management tab, select the IPAM or Devices tab.
2. In the Toolbar, click Discovery Status. The Discovery Status table is displayed.
The Discovery Status table lists detailed information about network devices and end hosts discovered through all
methods, including SNMP, ICMP ping sweeps, and other processes. It includes:
• IP Address: the IPv4 or IPv6 address of the discovered device. You can filter the table by this value.
• Name: The name of the discovered device as reported through SNMP. You can filter the table by this value.
• Type: The discovered device type. Examples include Router, NIOS, Switch-Router, Firewall, Load Balancer,
LWAP, and numerous others.
• Overall Status: Indicates the overall success or failure of the discovery task on the device. Hover the mouse over
the device to see more detailed information about the discovery status, including the timestamp of the last
discovery event, confirmation of detection ("Device Exists"), and the means of detection, which are usually
methods such as SNMP, reading the ARP table or location through a Seed router. You can filter the table by this
value.
• Reached Status: Indicates the reachability of the discovered device. Typically, devices are reported Passed for
Reached Status if they are reachable through SNMP, a path trace through ICMP, or UDP-based path tracing for
an IPv6 address.
You may see a Reached Status of Passed and still receive an Overall Status of Failed. This often occurs because
either the CLI credentials or SNMP credentials provided for discovering the device do not work, or another
problem occurs in some part of the discovery process.
• SNMP Collection Enabled: Indicates whether the managed device allows SNMP as a management protocol. This
value shows Yes or No. You do not see any SNMP collection status updates if this value shows No.
• SNMP Credential Status: Indicates whether the correct SNMP credential is used by discovery. Usually shows
simple Passed or Failed status. Passing the mouse over the Failed status reading for this column shows the
location in the SNMP data collection where information gathering failed. The typical message for a failure of this
type shows Failure to Authenticate, which simply means that the correct SNMP credentials have not been
provided for either SNMPv1, SNMPv2c, or SNMPv3 as required and defined for the device's discovery
configuration. The tooltip also displays the name of the credential group that was used to guess credentials for
the device.
If SNMP Credential Status shows Failed, you do not see a value under SNMP Collection Status, because that is
dependent on successful credential authentication. Should you succeed in SNMP Credential Authentication for a
device, this value shows Passed.
• SNMP Collection Status: Indicates whether managed device information has been successfully collected from the
device. If the current device shows an SNMP Credential Status of Failed, this field remains blank. Should you
succeed in SNMP Credential Authentication, SNMP Collection Status may or may not show a Passed outcome. If
the final outcome is successful, passing the mouse over the table value shows the SNMP data set that was
A successful authentication also shows which protocol was used for SNMP authentication; SNMPv1, SNMPv2c or
SNMPv3. This does not guarantee successful data collection through SNMP, however.
The SNMP Collection Status counter shows possible Passed and Failed values. Hovering the mouse over a Failed value
CLI credentials failure messages are straightforward and can be tested by verifying login tuples or Enable passwords
from the credential sets defined in discovery configuration.
If you receive a CLI Credential Status value of Passed, the correct command-line admin login information is specified in
the discovery configuration.
For more information about checking and diagnosing discovery behavior for devices listed in the status table, see the
following topic Executing Discovery Diagnostics.
Note: An Unmanaged IP cannot be converted to Managed unless the network that contains it, is converted to managed
status. For more information, see Converting Unmanaged Networks under IPAM to Managed Status.
Note
Adding Device Support Bundles, viewing and deleting them requires Superuser permissions.
Infoblox frequently provides support files for additional network devices that may not previously be supported by
discovery, and updates to support new operating system versions of existing devices. To add device support updates:
1. From the Grid tab, select the Device Support tab.
2. Expand the Toolbar and click Add.
3. Click Select and navigate to the file you want to upload.
4. Select the file, and then click Upload.
The Device Support table shows its installed library of files with the following data points:
• Name: The descriptive device name for the device support file.
• Version: The version of the currently active device support file.
• Author: The developer of the device support file.
• Type: The Type column lists two types of Device Support files: the System type indicates a support bundle that is
installed with the NIOS/Grid Manager system. The Downloaded type indicates device support bundles that are
installed by the administrator.
System bundles are read-only and cannot be removed or overwritten by administrators.
You may remove custom support bundles that you have installed on the Device Support Page. To do so, click the Action
icon for a chosen device and choose Delete from the popup menu.
Note
Port control involves two primary operations: network provisioning/de-provisioning and port configurations.
These operations are classified as port control tasks that can be monitored and viewed in the Task Manager
(Administration –> Workflow –> Task Manager).
Port control enables changes to the interface-level configurations of switches and switch-router devices, and assignment
of these resources to network objects defined and created within IPAM.
• Port configurations and network provisioning and de-provisioning use CLI admin credentials, supporting SSH and
Telnet. You may test credentials before use, against an IP address or a selected device;
• Port configuration consists of two primary operations: setting admin status for a port, and defining Data VLAN and
Voice VLAN assignments (where applicable), along with minor changes such as editing descriptions;
• You can define port configuration blackout periods using the same methods provided for discovery blackouts.
These blackout periods also apply to network provisioning and de-provisioning tasks;
• Configuring a port on a device always creates a new port control task that can be viewed and managed in the
Task Manager.
• You can separately schedule port control tasks using the same method as for object creation.
• You can edit multiple interfaces at a time.
• You can edit interfaces, inline, from the Interfaces, IP Addresses and Assets pages in Grid Manager. These
operations generally consist of setting the interface to be Administratively Up or administratively Down, and VLAN
assignments.
Network provisioning includes the following:
• If a user deletes a discovered network from the system, Grid Manager displays the list of interfaces on which the
network is currently provisioned;
Note
If you edit an object, you can only edit an associated port reservation.
Objects are completed in their configuration by Grid Manager before executing a port configuration.
If, for example, a fixed address object is subject to administrative approval, no port control task takes place for that object
until the approval is executed and the object is created. This has implications for scheduling: if you schedule the creation
of a new host, IPv4 reservation or fixed address, and wish to schedule a port control task for the same object, the
scheduled object creation must take place first, and must complete, before the scheduled port configuration executes.
All port configuration operations can be scheduled and subject to administrator approval. For more information, see
Configuring Approval Workflows.
Note
Voice VLAN settings are applicable only for Cisco devices.
To speed port configuration workflows, you can select one interface or multiple interfaces for a device to change the
admin status, description and VLAN settings. For example, this feature is handy if you want multiple interfaces to
participate in the same data VLAN. There are two ways to approach this feature: directly from the Devices page, or by
selecting a device on the Devices page, opening its Interfaces page and selecting ports from there.
Editing interfaces is done from the main Data Management –> Devices page.
1. From the Data Management tab, select the Devices tab.
2. Click the Action icon for a chosen device and choose Interfaces from the popup menu.
3. Select the checkbox for a specific interface, click the Action icon for the interface and choose Edit. The
interface editor appears as shown in the figure below.
Interface Editor, with editable Admin Status and Description settings
Editing VLANs
6. Choose a data VLAN to assign to the port from the Data VLAN drop-down menu.
7. If supported, choose a voice VLAN (Cisco only) from the Voice VLAN drop-down menu.
8. Click the Extensible Attributes tab to add any attributes that are necessary for the interface.
9. Click Save & Close to close the interface editor.
Note
Once you change Admin Status, Data VLAN or Voice VLAN settings for any selected port, no automatic
eversion exists to the original settings from the same editing session. You must cancel out of the Interfaces
editor to reject any changes and begin with a new editing session from the Interfaces page. Use
the Verify button to verify your changes.
5. Select the checkboxes for one or more ports and define the Port Configuration settings for the following:
a. Admin Status: Select Up or Down from the menu, depending on the current state of the port(s);
b. Description: Provide a brief description of the port configuration or other information;
c. DataVLAN: (Hidden if editing a VLAN is not supported) Drop-down list of all data VLANs actively
configured in the current device. One of the values can be chosen for the currently select interface(s);
d. VoiceVLAN: (Hidden if editing a voice VLAN is not supported) Drop-down list of all voice VLANs actively
configured in the current device. One of the values can be chosen for the currently select interface(s).
6. After making configuration changes to all ports, click Verify to check over your changes:
Double-clicking a table row opens the editable fields for the selected record.
If editable fields are not present in the table display, you cannot change their values in the Interfaces page.
After making inline changes, click Save on the selected row to commit them. To prevent using any changes, click Cancel.
This also de-selects the row.
Note
When you make inline changes to an interface, a new task is created under
Grid Manager, which you can view in the Task Manager page (for more
information, see Viewing Tasks). A status icon appears next to the interface
element you have changed, indicating the status of the new task and providing
a link to the Task Manager page. New tasks appear with a status icon of
Pending (||). When the new task completes, the icon changes to a green checkmark.
Note
If a port control task requires administrative approval, and it is not approved before its scheduled execution, the
task appears as unsuccessful in Task Manager.
Provisioning networks also allows for provisioning VLANs. If devices do not support VLANs, options for provisioning
VLANs do not appear for those devices and their associated interfaces.
If a network is already provisioned for an interface, regardless of its status under Grid Manager, you cannot provision
another network upon it.
Only available interfaces that support network provisioning are shown in Grid Manager for provisioning tasks. The
horizontal toolbar also provides related functions:
De-provision Network : Available for networks that are managed under IPAM, for de-provisioning on devices that are
managed under IPAM on the Data Management –> Devices page. A dialog box appears summarizing the task you are
instructing Grid Manager to perform. This action changes the configuration of the device.
To provision IPAM networks onto a device:
1. From the Data Management tab, select the Devices tab.
2. Click the Next Page and Last Page icons to locate the device whose interfaces you want to provision.
3. Click the Name of the device. The Devices page displays the five tabs of information associated with the device.
4. Click the Networks tab.
5. The Networks page lists all discovered networks (highlighted in grey), unmanaged networks (highlighted in
yellow), and any managed networks (highlighted in white, showing Yes in the Managed column) present on the
selected device.
6. Open the vertical toolbar and click Provision Network. The Provision network wizard appears.
7. Click Select Network to choose the network the you want to provision. If only one managed network is available
on the device, that network value is populated after clicking the button.
If more than one managed network is available under IPAM, the Network Selector dialog opens, listing all
networks managed under IPAM.
8. Choose the network to provision onto the device and click OK.
9. Enter the Router IP Address. This required field may be pre-populated with the DHCP router IP address if the
device already has a DHCP configuration. If not, enter the gateway router IP address for the current device.
10. If necessary, check the DHCP Forwarding checkbox. Check this checkbox to enable DHCP forwarding for the
newly provisioned network. If a DHCP failover is already present, the IP addresses from that failover are used for
DHCP forwarding information.
11. For choosing the Interface, you can choose one out of two options:
a. Interface drop down list: If you are provisioning the network directly onto an interface, select it from this
list. Only interfaces that are available for provisioning on the chosen device appears on this list; interfaces
that are already active in a network do not appear;
–or–
b. For a switch-router, select Create VLAN, and specify the VLAN Name and its new VLAN ID. Ensure that
the VLAN ID is not one that is already provisioned on the device.
De-Provisioning Networks
Note
De-provisioning a network changes the device configuration. As such, a separate task is created for the action
under Task Manager. However, you cannot schedule the de-provisioning of a network–once you confirm the de-
provisioning action in Grid Manager, the action takes place. Each managed and unmanaged device under Grid
Manager provides a Permissions page (DataManagement–>Devices–> Select Device –> click Edit–
>Permissions tab). By default, no admin group or Role is assigned to managed devices. Infoblox recommends
using caution when assigning rights to users that may be able to access devices and change device
configurations.
De-provisioning networks is a relatively straightforward task that can be performed for any selected network, whether it is
a non-NIOS network (a network that cannot be configured in IPAM), an unmanaged network, or a managed network.
Note
If the network is also managed under IPAM, de-provisioning the network from a device does not delete the
network from IPAM.
Note
A network may not be de-provisioned until after you set the interface for the network on the device(s),
to Down in Admin Status.
Note
Ensure that the de-provisioning of the network has administrative approval.
You can also select multiple network entries from the list on the same device and de-provision all of them in a single step.
Exercise caution when performing such actions.
Note
Deleting a network under IPAM creates a new Object Change task in Task Manager. You can check
the Administration–>Workflow–>TaskManager page to view its status.
You can simply delete a managed or unmanaged network in IPAM to de-provision it. Doing so opens a Delete
Confirmation dialog. IPAM also automatically prompts you to verify that you are deleting the network from all devices that
have interfaces connecting to the network, subject to verification and permissions.
By default, when you delete the network, all devices that connect to the network, that are also managed by IPAM, are
part of the new de-provisioning port control task created by Grid Manager. If you do not want the network
Note
Optionally, you can completely skip port reservation and port configuration by clicking Next.
2. Click the Device Name button to choose the device for which the port reservation is associated. You should know
the identity of the device to which the Infoblox appliance is connected before taking this step.
3. After choosing the device, choose the Interface with which the reservation is bound. The drop-down list shows
only interfaces that are most recently found to be available by Network Insight during the last discovery cycle.
This list does not include any ports that are Administratively Up and Operationally Up and are otherwise already
assigned to other networks or objects.
• The Wizard page also shows a list of any VLANs that are currently configured in the chosen device. This Wizard
page does not allow the definition of new VLANs for port configuration–only the assignment of an existing VLAN
in the device for port configuration.
• Select the Configure Port checkbox to define specific port control settings for the port reservation.
Note
If you do not take this action when you create the object, you cannot perform the configuration later
while editing the object.
• If the chosen device supports them, choose the Voice VLAN and/or the Data VLAN settings you may need for the
port assignment. You do not create new VLAN values in this step; you can select from VLANs that are
Note
Once a switch port or other device port is reserved, Network Insight prevents further port reservations
from using the same port for another reservation.
See the following sections for examples on how to create IPAM objects with port reservations:
• Adding Host Records
• Configuring IPv4 Networks
• Configuring IPv4 Fixed Addresses
• Configuring IPv4 Reservations
• Configuring IPv6 Networks
• Configuring IPv6 Fixed Addresses
• Adding Grid Members
• Defining Port Reservations for an Infoblox Grid Member
Unlike creating an object, editing an existing object's port reservation does not permit configuring the selected port. (You
can edit the port from the device's Interfaces page, including inline editing.) Physical interfaces with an Operational
Status of Down appear in the Interface drop-down list. Ports that are already active, that are reserved through a port
reservation, or that are administratively Up/Operationally Up do not appear in the Interface drop-down list.
For object editing, you can select interfaces but you cannot edit their settings, such as setting the Admin Status to Up or
choosing the Data VLAN or Voice VLAN.
Port reservation editable settings are as follows:
Note
Editing Grid members does not allow for port configuration when you create or change a port reservation. For
Grid member editing, you can select interfaces but you cannot edit them, such as setting
the Admin Status to Up or choosing the Data VLAN or Voice VLAN. This section applies only to creating and
defining port reservations and configurations for new Grid members. For the complete Grid member creation
procedure, see Adding Grid Members.
You can configure port reservations for a Grid member, including HA members, in the Add Grid Member wizard. All
interfaces on a member (LAN1, LAN2, HA and MGMT) may have independently defined port reservations. For Grid
members, port reservations are not subject to scheduling and workflow approval, and Grid Manager executes them
immediately.
11. Select the LAN2 port for each node and follow steps 6a through 6h above. If VLANs are provisioned on
the selected port, you can also select them.
12. Click Save & Close.
Editing an existing Grid member's port reservation does not permit configuring the currently selected port. You can select
ports from any device to change the port reservation. For any selected device, ports with an Operational Status of Down
appear in the Interface list.
For editing Grid member settings, you can select interfaces but you cannot configure them; setting the Admin Status to
Up or choosing the Data VLAN and changing the Description are not allowed when editing a Grid member.
Editing a Grid Member's Port Reservation Settings
Note
When editing Grid members and HA Grid members, Grid Manager does not allow changes to VLAN settings,
Admin Status or port description in the editor. You can change these values in the Interfaces table by double-
clicking the table row for the interface you want to edit.
During the process of configuring a port reservation for an IPAM object, you can define device information settings as
descriptive information for IPAM objects, as seen in the below figure.
Device Information Settings for IPAM Objects in the Wizard
Note
You can separately define blackout periods for discovery, and for port configuration. This section describes how
to use the blackout feature for discovery. For more information on blackouts for port configuration tasks, consult
the section Defining Port Configuration Blackout Periods.
Discovery protocols can occupy significant resources within the network when discovery is taking place. While you can
schedule any discovery or port control task for any single time period or recurring time period, you can also establish
time periods when Network Insight does not talk to devices or networks for discovery.
You can define blackout settings at two levels in Grid Manager:
• Under Grid Discovery Properties, applying across the entire Grid;
• All networks managed by the Grid inherit discovery blackout settings by default;
• For individual networks under IPAM and under DHCP.
• A network must be Managed before you can edit its discovery blackout settings.
• Under IPAM, you can define discovery blackout settings for Network Containers and for networks (for
DHCP, you can also set blackouts for DHCP Ranges);
• If a network is in Managed state, it can be edited under IPAM or under DHCP for discovery settings and
discovery blackout settings.
Discovery tasks may already be running when a blackout period takes effect. Current tasks are not interrupted and will
complete within their time. Network Insight does not activate new discovery tasks during the blackout period, however.
Network Insight offers considerable flexibility in how you apply blackout periods. You may choose to have discovery
allowed for most managed networks but elect to have a discovery blackout for selected networks that are traffic- or
latency-sensitive.
You can define extended time periods and regularly scheduled times when discovery and/or port configuration tasks is
not in progress on a specific IPAM network or within a network container. By default, the network inherits its discovery
blackout settings from the Grid level. Editing a network under IPAM or DHCP, blackout settings apply only to the specified
network. You also specify the scheduled time when the blackout period begins and the duration of the blackout period.
As noted, a network must be in managed status before editing discovery or blackout features. To define a discovery
blackout for a network under IPAM or DHCP:
1. Select a managed network from one of the following locations:
a. Data Management –> IPAM –> list view
–or–
b. Data Management –> DHCP –> Networks
2. Click the Action icon next to the network you want (this automatically selects it) and select Edit from the menu.
The Edit Network dialog appears.
3. Click the Discovery Blackout tab.
4. Click Override to change blackout settings for the chosen network.
5. Select the Enable Discovery Blackout checkbox and click the Scheduling icon to open a separate scheduling
window. (Because the settings are inherited, Enable Discovery Blackout may or may not already be enabled.)
The Blackout Scheduler dialog opens.
a. Select how often you want to execute the blackout period. You can select Once, Daily, Weekly, or
Monthly.
b. If you select Once, enter the day in the date picker and select a month from the drop-down list.
i. Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
ii. Choose the TimeZone.
iii. Specify the Duration: 1 or more Minutes, Hours or Days.
c. If you select Daily, click either Every Day or Every Weekday.
i. Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list
ii. Choose the TimeZone.
iii. Specify the Duration: 1 or more Minutes, Hours or Days.
d. If you select Weekly, complete the following:
i. Under Schedule every week on: Select the checkbox for any day of the week.
i. Enter a time in the hh:mm:ss AM/PM format. You can choose a time from the drop-down list.
i. Choose the TimeZone.
i. Specify the Duration: 1 or more Minutes, Hours or Days.
e. If! you select Monthly, complete the following:
• Schedule the day of the month: A discovery blackout can be executed monthly on a specific day,
or instances can be executed more than one month apart on a specific day, in the Day every
month(s) field.
• Enter a time in the hh:mm:ss AM/PM format. You can choose a time from the drop-down list.
• Choose the Time Zone.
• Specify the Duration: 1 or more Minutes, Hours or Days.
Note
When you execute discovery (Discovery -> Discover Now from the Toolbar), the appliance does not
send SNMP trap if it finds any conflicting information between the NIOS data and the discovered data.
The Conflict Resolution wizard automatically recognizes the object associated with the conflict (which is listed in the
Related Objects pane as noted in the figure Locating conflicts and beginning their resolution) and ensures that changes
you make during resolution are applied correctly to the object. An example appears in the below figure.
Note
In the Grid Discovery Properties –> Advanced tab, the Ignore Conflict Duration setting governs
the default time duration to ignore (clear) certain types of conflicts that may occur when defining
IPAM objects that are associated with discovered and managed devices, interfaces, or IP
addresses. Increments can be defined in Hours or Days. For more information,
see Defining Seed Routers for Probe Members.
Note
For other conflict examples, see Resolving Multiple Conflicts.
a. In this case, the MAC address specified in the last fixed address object configuration, for that object,
conflicts with the discoveredMACaddress associated with the IP. (You can verify this by checking the
RelatedObjects tab in the IPAM page for the IP address.) Choose from one out of two options:
• Change the configured MAC address to be the same as the discovered MAC address;
• Keep fixed address and ignore this conflict for the next 1 day(s).
In this example, the Discovered information for the MAC address associated with the Fixed
Address object is one digit off from the Existing MAC information, which was entered incorrectly by
the administrator. The DIscovered MAC, shown in red, is the correct value and should be used to
overwrite the record for the conflict.
6. Select the Update... with discovered data option and click Resolve.
The wizard updates with a return to the first step, in which you select the next conflict to resolve. A
banner shows the result of the first resolution.
7. Select the next conflict to resolve and click Next. As an example, the below figure shows a device configuration
conflict.
Device Information conflict for an object
Note
In the Polling tab –> Advanced page of the Grid Discovery Properties editor, the Ignore Conflict
Duration setting governs the default time duration to ignore (clear) certain types of conflicts that may occur
when defining IPAM objects that are associated with discovered and managed devices, interfaces, or IP
addresses. Increments can be defined in Hours or Days. This setting cannot be modified when resolving
conflicts.
Note
LEASE operations DOES NOT trigger any recomputation of the conflict.
When computing a conflict, the process lookup for the IP discovered and verify this against any DHCP Range that
includes the same IP:
• No Range : There will be no conflict with the Range (However, there can be other type of conflict see
documentation
• There is a Range, but there is nothing in that IP slot, neither Reservation, Fixed Addresses … or LEASE: this IP is
classified to be available for LEASE. If that IP is discovered, it means there is a device that uses that IP without
holding the LEASE and a RANGE conflict is raised.
• There is a Range and this IP slot is used by:
• Reservation or DHCP Reservation: no RANGE conflict.
• Fixed Address or Host Address: no RANGE conflict. (There can be a MAC Conflict.)
• LEASE:
• If the lease has currently no activity or never had any activity (eg BACKUP state). A RANGE
Conflict is raised because we consider there is no LEASE.
• If the lease includes dates of activity (eg ACTIVE, RENEW, ABANDONED, FREE, …) , the “last-
discovered” timestamp of the IP is checked against the dates of activity:
• If the “last-discovered” is BEFORE start of LEASE : we cannot say if there was a conflict or not. A
SYSLOG “Maybe conflict - IGNORED” is issued, but no RANGE, neither MAC ADDRESS conflict
is raised.
• If the “last-discovered” is DURING activity of LEASE, it is expected. No RANGE conflict.
However if the MAC does not match, a MAC ADDRESS conflict will be raised.
• If the “last-discovered” is AFTER the activity of the LEASE : a RANGE conflict is raised, as
there is no LEASE at time of the timestamp.
Note
Conflicts based on dates of “last-discovered” timestamp, depends on how the IP was discovered, with
timestamps more or less accurate. Then a FALSE POSITIVE conflict can get raised. This condition needs to be
manually verified along with the dates, assess the conflict and maybe resolve that conflict manually.
If there is a delay to collect the LEASE from the DHCP Member, a conflict is raised at the time of processing the
IP, because the corresponding LEASE was not yet consolidated on GM. This require a manual assessment of
the conflict, and needs to be resolved manually.
Note
Unlike regular extensible attributes that you can create to track NIOS objects, Grid Manager creates the
Advisor extensible attributes automatically to obtain and display device lifecycle and vulnerability data.
8.4
8.4.4
Checkpoint Yes No
8.6
Note
Users must have valid permissions to delete or disable a super host. A resource record can only belong to one
super host and cannot be a part of multiple super hosts. You can associate any number of records with a super
host.
DNS
This section describes how to configure the Grid to provide DNS services. It includes the following topics:
Decide if you want to configure DNS properties for the Grid and for individual members Infoblox DNS Service
Decide if you want to create a new DNS view, in addition to the default DNS view DNS Views
Decide which type of DNS zone you want to configure Configuring DNS Zones
Enable DNS service on the member Starting and Stopping the DNS Service
Inherited From <object> the DNS property has a definite value from an inheritance source.
Inherited From Upper Level the appliance cannot yet determine the inherited value or inheritance source for the DNS property.
Inherited From Multiple the DNS property has the same value that it inherits from multiple sources.
Settings Inherited from Multiple Ancestors, the DNS property has different values that it inherits from multiple sources, and you can view the
View Multiple Inheritance Scenarios values and their corresponding sources by clicking the View Multiple Inheritance Scenarios link.
Based on the information provided, you can then decide whether to override or keep the inherited values. You must have
read/write permissions to the DNS resources to override inherited values. You can only view inherited values and paths if
you have at least read-only permissions.
In the example in the below figure, the DNS zone is served by members with different query settings.
DNS Zone with Different Inherited Settings
Address Structures
IPv4 uses a 32-bit, 4-octet (each octet separated by decimals) addressing structure to designate sources and
destinations within a network. Since there are 32 bits that make up the address, IPv4 can support up to 4 billion unique
addresses.
An IPv6 address is a 128-bit number in colon hexadecimal notation. It consists of eight groups of four hexadecimal digits
separated by colons (example: 12ab:0000:0000:0123:4567:89ab:0000:cdef). Since there are 128 bits that make up the
address, IPv6 can support up to 3.4x1038 unique addresses. The increase in the number of unique IPv6 addresses is
one of the biggest advantages of an IPv6 implementation.
Create primary or secondary name servers and specify an IPv6 root server. • Configuring Authoritative Zones
• Specifying a Primary Server
• Specifying Secondary Servers
• Creating a Root Zone
You can configure general DNS service properties and change some default values. The DNS service is disabled by
default. To enable the member to provide DNS service, you must start the DNS service. For information about how to
start and stop the DNS service, see Starting and Stopping the DNS Service. The following topics describe the DNS
service properties that you can configure:
Specifying Max Cache TTL and Max Negative Cache TTL Settings
You can specify the maximum duration of time for which your name server caches positive responses using the Max
Cache TTL settings. The Max Cache TTL indicates the time limit for which the name server retains records in the cache.
When the Max Cache TTL for a record expires, the name server deletes the record from the cache.
You can also specify the maximum duration of time for which your name server caches negative responses through the
Max Negative Cache TTL settings. The Max Negative Cache TTL sets the time limit for which the name server retains
negative responses (NXDOMAIN/NXRRSET responses) in the cache. The name server deletes a negative response
from the cache when the Max Negative Cache TTL period for the entry expires.
You can define the Max Cache TTL value and the Max Negative Cache TTL value at the Grid DNS, Member DNS, and
DNS view levels.
To specify the Max Cache TTL and the Max Negative Cache TTL:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox ->
Edit icon.
DNS View: From the Data Management tab, select the DNS tab and click the Zones tab -> dns_view checkbox ->
Edit icon.
2. In the Grid DNS Properties, Member DNS Properties, or the DNS View editor, click Toggle Advanced Mode if the
editor is in the basic mode.
3. Click the Advanced subtab of the General tab and then complete the following:
• Max Cache TTL: Specify the maximum duration of time for which the name server caches positive
responses. Select the time period in minutes, hours, or days from the drop-down list. The default value is
To secure the identity of the internet-facing DNS servers, you can configure the hostname and server ID options for
specific Grid members that are internet-facing to return a user defined value instead of the real hostname. Alternatively,
you can disable the hostname and server ID options at the Grid level and configure them only for those members that
are not internet-facing.
To configure the hostname and server ID options:
1. Grid: From the Data Management tab, select the DNS tab, and then select Grid DNS Properties from the Toolbar.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox ->
Edit icon.
2. In the Grid DNS Properties or the Member DNS Properties editor, click Toggle Advanced Mode if the editor is in
the basic mode.
3. Click the Advanced subtab of the General tab and then complete the following:
• Hostname bind directive: Select either Hostname or None from the drop-down list. The default is None. If you
select Hostname, the appliance returns the hostname of the DNS name server that is currently answering
queries. Selecting None disables the Hostname bind directive option.
In the Member DNS Properties editor, you can also select User defined and specify any hostname of your choice.
The appliance returns the specified hostname instead of the real hostname of the DNS name server that is
currently answering queries.
To override an inherited setting from the Grid, click Override. To retain the same setting as the Grid, click Inherit.
• Server-id directive: Select either Hostname or None from the drop-down list. The default is None. If you select
Hostname, the appliance returns the hostname of the DNS name server that is currently answering queries, when
a client queries to identify the server ID of the name server that is answering queries.
Selecting None disables the Server-id directive option.
In the Member DNS Properties editor, you can also select User defined and specify a value of your choice. The
appliance returns the specified value when a client queries to identify the server ID of the DNS name server that
is answering queries.
To override an inherited setting from the Grid, click Override. To retain the same setting as the Grid, click Inherit.
• Save the configuration and click Restart if it appears at the top of the screen.
Warning
The DNS Health Check monitor might
not work properly if DNS blackhole feature is enabled or if any named ACL is blocking the query sent to
loopback interface.
Note
The appliance does not support IDN for the E-mail Address (for SOA RNAME field) field at the Grid
level. You can add an email address containing IDN for the SOA records at the zone level.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
The appliance supports IDN for the host name of the Email address (for SOA RNAME field) field. For
example, you can create admin@инфоблокс.рф but not админ@инфоблокс.рф.com.
Note
• IP is displayed only if you have additional IP addresses such as the loopback
address or VLANs configured.
• If you select IP addresses on the loopback or non-primary VLAN interface, then
you must add these IP addresses in
the Listen on these additional IP addresses table.
4. Save the configuration and click Restart if it appears at the top of the screen.
If you have enabled secondary name servers in the Grid to send notify messages to external secondary name servers,
you can specify the delay time for sending the notify messages. For information about enabling Grid secondary servers
to send notification messages to the external secondaries, see Notifying External Secondary Servers.
To specify the delay time for the Grid secondary servers to send notify messages to the external secondaries:
1. Member: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox ->
Edit icon.
DNS view: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox -
> Edit icon.
2. In the editor, click Toggle Advanced Mode.
3. Member: When the additional tabs appear, click the Advanced subtab of the General tab.
DNS view: When the additional tabs appear, click the Advanced subtab of the DNS Views tab.
4. Complete the following:
• Notify Delay: Specify the number of seconds that the Grid secondary servers delays sending notification
messages to the external secondaries. You can enter a value between 5 and 86400 seconds. The default
is five seconds.
5. Save the configuration and click Restart if it appears at the top of the screen.
The following information demonstrates how the appliance responds when EDNS0 is enabled by default and the end
server does not support EDNS0:
Packet 0954: 08:19:38.925 - query for www.google.com from Infoblox to forwarder (with EDNS0
support by setting the Extended Label Type to '01' and DNSSEC OK bit to '1')
Packet 1138: 08:19:47.927 - query for www.google.com from Infoblox to forwarder (with EDNS0
support by setting the Extended Label Type to '01' and DNSSEC OK bit to '0')
Packet 1504: 08:19:58.929 - query for www.google.com from Infoblox to forwarder (without
EDNS0 and DNSSEC support by sending a standard 512-byte query)
Packet 1505: 08:19:30:960 - query response for www.google.com from forwarder to Infoblox
Note
The UDP buffer size and EDNS0 buffer size attributes are available only for BIND resolvers and not for
unbound resolvers.
You can configure the EDNS0 buffer size and the UDP buffer size are configurable for a Grid, member, standalone
system, and a DNS view. To configure the EDNS0 buffer size and UDP buffer size, complete the following steps:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab, and then click the Members tab -> member
checkbox -> Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
Standalone system: From the Data Management tab, select the DNS tab, expand the Toolbar and click System
DNS Properties.
Note
If you want DNS query responses to use the configured EDNS0 buffer size in servers that
support EDNS0, then ensure that you do not disable EDNS0.
b. UDP Buffer Size: Specify the maximum packet size to be allowed in DNS query responses when
transferring DNS messages from DNS servers to DNS clients. The default buffer size is 1220 bytes. The
minimum buffer size that you can set is 512 bytes and the maximum is 4096 bytes.
Infoblox recommends that you configure the UDP Buffer Size value in the range of 512 to 1220 bytes.
DNS responses that exceed 1220 bytes can get fragmented and may result in unexpected behavior when
resolving queries.
4. Save the configuration and click Restart if it appears at the top of the screen.
Disabling EDNS0
To ensure that end servers that do not support EDNS0 can respond to recursive queries from the NIOS appliance and to
improve DNS performance, you can disable EDNS0 for the Grid and override the Grid settings for individual members.
Note that you cannot configure the maximum UDP packet size, which is set for 4096 bytes by default. When you disable
EDNS0, the appliance does not include OPT RRs for all outgoing recursive DNS queries. Thus remote end servers that
do not support EDNS0 can still respond to the queries. This feature is useful when your NIOS appliance is used as a
forwarder or a resolver for recursive queries, and the end servers in the configuration do not support EDNS0.
Warning
When you disable EDNS0, all outgoing DNSSEC queries to zones within trusted anchors will fail even if
DNSSEC validation is enabled. This is due to the restriction of the UDP packet length when you disable
EDNS0. For more information about DNSEC, see Configuring DNSSEC.
To disable EDNS0:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox ->
Edit icon.
2. In the Grid DNS Properties or Member DNS Properties editor, click the General tab -> Advanced tab, and
complete the following:
• Disable EDNS0: This checkbox is deselected and EDNS0 is enabled by default. To override the value inherited
from the Grid, click Override. To retain the same value as the Grid, click Inherit. Select this checkbox to disable
EDNS0. When you disable EDNS0, the appliance does not include OPT RRs for all outgoing recursive DNS
queries and all outgoing DNSSEC queries to zones within trusted anchors will fail even if DNSSEC validation is
enabled.
• Save the configuration and click Restart if it appears at the top of the screen.
Note
The entire name server recursive cache is cleared, if you do not specify a DNS view when you
clear cache using Clear View's Cache and Clear Domain Name features on the NIOS appliance.
Sample Output
include "/infoblox/var/named_conf/tsig.key";
options {
zone-statistics yes;
directory "/infoblox/var/named_conf"; version none;
hostname none; recursion yes;
listen-on { <loopback address>; 10.34.1.18; };
query-source address 10.34.1.18 port *; notify-source 10.34.1.18 port *; transfer-source
10.34.1.18;
minimal-responses yes; max-cache-size 536870912; infoblox-top-query yes;
infoblox-top-query-log-interval 60;
infoblox-top-query-client 500;
infoblox-top-query-name 500;
infoblox-top-query-rr-type 500;
infoblox-top-query-nxdomain 500;
infoblox-top-query-servfail 500;
infoblox-top-query-rpz 99;
infoblox-top-query-rpz-items-per-client 100;
lame-ttl 600;
Sample Output
;; Start view _default
;;; Cache dump of view '_default' (cache _default)
;$DATE 20121018180555
; authanswer a.test.com.23876IN A4.4.4.4
;; Address database dump
;; Dump complete
Viewing Statistics
The View Statistics feature enables you to view DNS Statistics of a Grid member. You can view statistics through a
browser.
To view statistics:
1. From the Data Management tab, select the DNS tab -> click the Members tab.
2. Expand the Toolbar, click View -> View Cache.
You can view statistics in the DNS Statistics for Member dialog box.
Using Forwarders
A forwarder is essentially a name server to which all other name servers first send queries that they cannot resolve
locally. The forwarder then sends these queries to DNS servers that are external to the network, avoiding the need for
the other name servers in your network to send queries off-site. A forwarder eventually builds up a cache of information,
which it uses to resolve queries. This reduces Internet traffic over the network and decreases the response time to DNS
clients. This is useful in organizations that need to minimize off-site traffic, such as a remote office with a slow connection
to a company's network.
You can select any Grid member to function as a forwarder. You must configure your firewall to allow that Grid member to
communicate with external DNS servers. You can also configure NIOS to send queries to one or more forwarders. You
can define a list of forwarders for the entire Grid, for each Grid member, or for each DNS view.
If your network configuration includes Infoblox BloxOne Threat Defense, you can configure NIOS Grid members (physical
or virtual appliance) to forward recursive queries to BloxOne Threat Defense. For more information about BloxOne
Threat Defense, see BloxOne Threat Defense. For information about how to configure NIOS members as DNS
forwarding proxies, see Forwarding Recursive Queries to BloxOne Threat Defense.
Specifying Forwarders
To configure forwarders for a Grid, member, or DNS view, complete the following:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member checkbox -> Edit icon.
DNS View: From the Data Management tab, select the DNS tab -> Zones tab -> dns_view checkbox -> Edit icon.
Note that if there is only one DNS view— for example, the predefined default view—you can just click the Edit
icon beside it.
To override an inherited property, select Override next to it and complete the appropriate fields.
2. Click the Forwarders tab.
3. Click the Add icon.
4. Enter an IP address in the text field. The field supports entry for both IPv4 and IPv6 values.
a. To remove a forwarder, select the IP address from the Forwarders list, and then click the Delete icon.
b. To move a forwarder up or down on the list, select it and click the Up or Down arrow.
5. To use only forwarders on your network (and not root servers), select the Use Forwarders Only checkbox.
6. Select the Add client IP, MAC addresses, and DNS View name to outgoing recursive queries checkbox to include
the client IP address, MAC address, and DNS view name of the client from which the DNS query was initiated, to
outgoing recursive queries. For information on recursive queries, see Enabling Recursive Queries. Selecting this
option includes EDNS0 custom options.
7. Select the Copy client IP, MAC addresses, and DNS View name to outgoing recursive queries checkbox to copy
and validate the client IP address, MAC address, DNS view name from incoming queries to outgoing queries. If
this checkbox is selected and:
• Only one custom option is present, the IP address or MAC address or DNS view name is copied to the
outgoing query without adding the missing option. An incoming query can contain only one IP address or
MAC address or DNS view name.
• No custom option is present, if the Add client IP, MAC addresses, and DNS View name to outgoing
recursive queries checkbox is selected, valid IP address, MAC address, and DNS view
name EDNS0 options are copied from incoming queries to outgoing recursive queries without any
change. If the Add client IP, MAC addresses, and DNS View name to outgoing recursive
queries checkbox is not selected, no options are added to outgoing recursive queries.
For more information about EDNS0 options, see Configuring DNS Traffic Control Properties and Using
Extension Mechanisms for DNS (EDNS0).
8. Save the configuration and click Restart if it appears at the top of the screen.
Note
Infoblox recommends that you do not include client IP addresses and MAC addresses in queries directed to
non-Infoblox DNS servers and that you include the addresses in only those queries directed at Infoblox DNS
servers.
Forwarder Limitations
• Forwarding zones (also known as conditional forwarders) do not support the Add client IP, MAC addresses, and
DNS View name to outgoing recursive queries and the Copy client IP, MAC addresses, and DNS View name to
outgoing recursive queries checkboxes.
• Only BIND-based DNS servers support these options. Unbound-based DNS servers do not support these
options.
Note
• If you have upgraded to NIOS 8.5.x with DNS forwarding proxy enabled on any node, Infoblox
recommends that you do not remove the on-prem hosts from the Cloud Services Portal. This is because
NIOS preserves the access key during the upgrade and the NIOS Grid member connects to the Cloud
Services Portal using the same access key.
• You must create a join token to authenticate a virtual DNS forwarding proxy for establishing a
connection to the cloud. For more information on creating a join token, see the Managing Join Tokens
for On-Prem Hosts section in the BloxOne Threat Defense documentation.
• If you have upgraded NIOS, the value of the Access Key field is the same as the API key that is
displayed in the Cloud Services Portal.
Specifying Queries
To configure a list of allowed queriers for the Grid or for a member:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox ->
Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click Toggle Advanced Mode, select the Queries
tab.
3. In the Allow queries from section, select one of the following:
• Any: Select this if you do not want to configure access control for DNS queries. The appliance allows
queries from all clients. This is selected by default.
• Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this, the appliance allows clients that
have the Allow permission to send and receive DNS queries. You can click Clear to remove the selected
named ACL.
• Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following
from the drop-down list. Depending on the item you select, Grid Manager either adds a row for the
selected item or expands the panel so you can specify additional information about the item you are
adding, as follows:
• IPv4 Address and IPv6 Address: Select this to add an IPv4 address or IPv6 address. Click the
Value field and enter the IP address of the remote querier. The Permission column displays Allow
by default. You can change it to Deny by clicking the field and selecting Deny from the drop-down
list.
• IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add
the network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to
the desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
• IPv6 Network: In the Add IPv6 Network panel, complete the following, and then click Add to add
the network to the list:
• Address: Enter an IPv6 network address and select the netmask from the drop-down list.
• Permission: Select Allow or Deny from the drop-down list.
• TSIG Key: In the Add TSIG Key panel, complete the following, and then click Add to add the TSIG
key to the list:
• Key name: Enter a meaningful name for the key, such as a zone name or the name of the
remote name server. This name must match the name of the same TSIG key on other
name servers.
• Key Algorithm: Select either HMAC-MD5 or HMAC-SHA256.
• Key Data: To use an existing TSIG key, type or paste the key in the Key Data field.
Alternatively, you can select the key algorithm, select the key length from the Generate
Key Data drop down list, and then click Generate Key Data to create a new key.
Enabling Recursion
To enable recursion and create a list of recursive queriers:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member checkbox -> Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click Toggle Advanced Mode, select the Queries
tab.
3. Click Allow recursion, and then in the Allow recursive queries from section, select one of the following:
• Any: Select this if you want to configure access control for recursive queries. When you select Any, the
appliance allows recursive queries from all clients. This is selected by default.
• Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this, the appliance allows clients that
have the Allow permission to send and receive recursive DNS queries. You can click Clear to remove the
selected named ACL.
• Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following
from the drop-down list. Depending on the item you select, Grid Manager either adds a row for the
selected item or expands the panel so you can specify additional information about the item you are
adding, as follows.
• IPv4 Address and IPv6 Address: Select this to add an IPv4 address or IPv6 address. Click the
Value field and enter the IP address of the remote querier. The Permission column displays Allow
by default. You can change it to Deny by clicking the field and selecting Deny from the drop-down
list.
• IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add
the network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to
the desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
Note: Queries with the source prefix length set to zero will be forwarded unchanged, regardless of
whether ECS forwarding is enabled or disabled.
Note
NIOS generates a new self-signed certificate when the host name or the IP address of the member is changed
or when a Grid Master Candidate is promoted. If the DNS over TLS or DNS over HTTPS feature is enabled on
a member, then every time a new self-signed certificate, HTTPS certificate, or a CA certificate is generated, the
DNS over TLS service or the DNS over HTTPS service (depending on which feature is enabled) automatically
restarts to upload the new certificate.
Warning
The numbers in the following tables are for IB-FLEX appliances only. For information about CPU and memory
requirements of NIOS appliances other than IB-FLEX, see the NIOS Release Notes.
The following table lists the maximum number of concurrent sessions supported by different NIOS appliance models
(physical and virtual). For information about CPU and memory requirements, see the NIOS Release Notes.
Note
If the available memory does not meet the requirement defined in the above table, you may observe
unexpected behavior. Infoblox recommends that you allocate slightly more memory to ensure that memory
associated with the hypervisor is also accounted for.
Note
In an HA setup, ensure that both the active and passive nodes have the memory configuration required to
enable the DNS over TLS or the DNS over HTTPS feature. If you enable the feature on an active node that has
the required memory footprint but the passive node does not, then in case of a failover, the DNS over TLS or
the DNS over HTTPS service does not start on the new active node. Therefore, requests coming to the DNS
over TLS or the DNS over HTTPS stream are not honored.
IB-FLEX Flavor Total CPU Total System Memory in Total System Memory in GB Maximum Number of Grid Master
Configuration GB (With virtual DNS (With virtual DNS Cache Concurrent Sessions Capable
Cache Acceleration only) Acceleration and virtual Supported
Advanced DNS Protection
Software)
Note
• When a NIOS appliance does not have the required base memory configuration, if you try to enable and
run DNS over TLS, DNS over HTTPS, and Parental Control features simultaneously, all of these
features will be disabled.
• For information about CPU and memory requirements of NIOS appliance models other than IB-FLEX,
see the NIOS Release Notes.
Limitations and Recommendations for DNS over TLS and DNS over HTTPS
Consider the following limitations and recommendations when you enable the DNS over TLS and/or the DNS over
HTTPS features:
• If an appliance configured with DNS over TLS or DNS over HTTPS has both vDCA and vADP running, the
configuration is set to the DCA-first mode.
• TSIG queries for which responses are larger than the max EDNS/UDP buffer size are not supported.
• DNS queries coming with EDNS padding over port 53 are dropped.
• DNS over TLS and DNS over HTTPS features are not supported on unbound-based DNS servers.
• When DNS over TLS or DNS over HTTPS is enabled, queries decrypted at DNS over TLS or DNS over HTTPS
that do not receive a response from the vDCA cache are forwarded to the recursive DNS engine over UDP.
Therefore, rules added for TCP requests over TLS or HTTPS may not be honored. Infoblox recommends that you
add the corresponding UDP-specific rules instead of only the TCP request rules.
• For NIOS 8.5.2 only: Infoblox recommends that you manually set the maximum packet size of both the UDP
buffer and the EDNS buffer to 4096 bytes. If the packet size exceeds 4096, packets are dropped by the DNS over
TLS or the DNS over HTTPS server. For more information about setting buffer sizes, see Configuring the EDNS0
Buffer Size and UDP Buffer Size.
• DNS over TLS only:
• The TLS versions that are currently supported by NIOS are TLS 1.2 and TLS 1.3.
• DNS over TLS supports queries and responses from both DNS and DNS Cache Acceleration services.
• DNS over TLS is not supported for recursive queries when performing upstream lookups.
• DNS zone transfer requests over DNS over TLS are not supported.
• For DNS over TLS clients that use systemd-resolved service, the Subject Alternative Name (SAN) must
point to the IP address of the DNS service. By default, the self-signed certificates issued to Infoblox
members do not meet this requirement. Therefore, for Infoblox to support systemd-resolved, you must
install certificates that include SAN IP address from a trusted certificate authority.
• DNS over HTTPS only:
• DNS over HTTPS is supported on the HTTP/2 protocol.
• DNS over HTTPS is supported only if the NIOS appliance has an MGMT interface set up. The DNS over
HTTPS module listens on port 443 for interfaces other than MGMT and any incoming UI request to the
MGMT interface is bypassed directly to the host.
• When DNS over HTTPS is enabled on a member, HTTP redirection from the member to its Grid Master is
disabled.
Note
The options for DNS over TLS feature are displayed only if the appliance has the memory footprint that
is required to support the feature and has the virtual DNS Cache Acceleration or Advanced DNS
Protection Software license installed. For more information, see Base Configuration Requirements.
4. In the Maximum Session Timeout field, specify the maximum time in seconds a session can remain idle before it
times out and closes. The default value is 60 seconds.
If your DNS forwarders are located at different geographical locations or if the network latency is high, you may
observe session timeouts. If so, Infoblox recommends that you set the Maximum Session Timeout to more than
60 seconds. Increasing the session duration may impact concurrent open sessions.
5. Save the configuration.
6. As prompted, manually reboot the member to enable the DNS over TLS feature.
Note
The DNS over TLS feature will not take effect until you reboot the member or the standalone system
and ensure that either the DNS Cache Acceleration or Advanced DNS Protection Software service is
running after the reboot.
Note
The options for DNS over HTTPS feature are displayed only if the appliance has the memory footprint
that is required to support the feature and has the virtual DNS Cache Acceleration or Advanced DNS
Protection Software license installed. For more information, see Base Configuration Requirements.
4. In the Maximum Session Timeout field, specify the maximum time in seconds a session can remain idle before it
times out and closes. The default value is 10 seconds.
If your DNS forwarders are located at different geographical locations or if the network latency is high, you may
observe session timeouts. If so, Infoblox recommends that you set the Maximum Session Timeout to more than
10 seconds. Increasing the session duration may impact concurrent open sessions.
5. Save the configuration.
6. As prompted, manually reboot the member to enable the DNS over HTTPS feature.
Note
The DNS over HTTPS feature will not take effect unless you reboot the member or the standalone
system and ensure that either the DNS Cache Acceleration or Advanced DNS Protection Software
service is running after the reboot.
Note
For a member with the DNS Cache Acceleration service running and the DNS over HTTPS feature enabled, if
you use the developer version of the Firefox browser (configured for DNS over HTTPS support) to initiate DNS
queries, you must set the network.trr.disable-ECS preference in the configuration editor (about:config) to false
for DNS data to be cached. DNS caching does not work if network.trr.disable-ECS is set to true.
Note
An AAAA record is filtered only when there is also an A record for the same domain name. In this case, the
appliance still sends a response, but without any AAAA or A record in it. When a client queries for an AAAA
record and there is no corresponding A record for it, the appliance returns the AAAA record even if you have
enabled AAAA filtering for this client.
Note
Be aware that when you select this option, DNSSEC configuration will no longer be in effect.
• No: Select this to disable AAAA filtering for queries over IPv4. When you select this, the appliance returns AAAA
records in response to all DNS queries issued over IPv4. This is selected by default.
• Yes: Select this to enable AAAA filtering for queries over IPv4. When you select this, the appliance removes
AAAA records in response to all DNS queries issued over IPv4, except for DNSSEC-signed requests.
• In the AAAA Filtering section, select one of the following:
• None: Select this if you want to configure access control for AAAA filtering. The appliance allows all clients
to issue DNS queries over IPv4 when they do not have the ability to use IPv6 addresses. This is selected
by default.
• Named ACL: Select this and click Select Named ACL to select a named ACL. Grid Manager displays the
Named ACLs Selector. Select the named ACL you want to use. If you have only one named ACL, Grid
Manager automatically displays the named ACL. When you select this, the appliance allows clients that
have the Allow permission can filter AAAA responses. You can click Clear to remove the selected named
ACL.
• Set of ACEs: Select this to configure individual ACEs. Click the Add icon and select one of the following
from the drop-down list. Depending on the item you select, Grid Manager either adds a row for the
selected item or expands the panel so you can specify additional information about the item you are
adding, as follows.
• IPv4 Address: Select this to add an IPv4 address. Click the Value field and enter the IP address of
the client. The Permission column displays Allow by default. You can change it to Deny by clicking
the field and selecting Deny from the drop-down list. When you select Allow, the appliance applies
AAAA filtering and removes AAAA records in response to queries sent by the specified IPv4
address. When you select Deny, the appliance does not apply AAAA filtering and thus returns
AAAA records.
• IPv4 Network: In the Add IPv4 Network panel, complete the following, and then click Add to add
the network to the list:
• Address: Enter an IPv4 network address and either type a netmask or move the slider to the
desired netmask.
• Permission: Select Allow or Deny from the drop-down list.
• Any Address/Network: Select to allow or deny AAAA filtering from any IP addresses.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the Create new
named ACL icon and enter a name in the Convert to Named ACL dialog box. The appliance creates a
new named ACL and adds it to the Named ACL panel. Note that the ACEs you configure for this operation
stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs for deletion.
Note
If you do not enter any addresses or networks in the table, the appliance applies AAAA filtering
to all IPv4 clients. In other words, the appliance removes AAAA records in responses to all
queries sent over IPv4.
Note that if both NXDOMAIN redirection and the blacklisting feature are enabled, the DNS member applies the blacklist
rulesets before the NXDOMAIN rulesets. For information about blacklisting domain names, see Blacklists.
Examples
The following example illustrates how the appliance applies NXDOMAIN rulesets. Ruleset 1:
Pattern Action
a1.corpxyz.com PASS
*.corpxyz.com REDIRECT
• If the DNS member receives a query for a1.corpxyz.com, it resolves the query and forwards the response, even if
it is an NXDOMAIN response, to the client. Note that if the order of the rules was switched, the DNS client would
have been redirected immediately, because the domain name a1.corpxyz.com matches the *.corpxyz.com
pattern.
• If the DNS member receives a query for b1.corpxyz.com, the member immediately redirects the DNS client to the
specified IP address because the domain name in the query matches the second rule.
• If the DNS member receives a query for b1.corp200.com, it resolves the query because the domain name does
not match any rule. If the DNS member receives an A record from an authoritative server, the member forwards
the response to the client. However, if the member receives an NXDOMAIN response, it redirects the DNS client
to the specified IP address.
In the following example, the rules redirect queries for dotted domain names that do not have ".com" As shown in the
example, an explicit PASS rule is required at the end.
Ruleset 2:
Pattern Action
*.com PASS
.*.$ MODIFY
* PASS
• If the DNS member receives a query for corpxyz.com which matches the pattern "*.com", the member resolves
the query and forwards the response, even if it is an NXDOMAIN response, to the client.
• If the DNS member receives a query for corpxyz.org, which matches the pattern ".*.$", the member resolves the
query. If the member receives an NXDOMAIN response, it redirects the client to the specified IP address. If the
member receives a non-NXDOMAIN response, it forwards the response to the client.
• If the DNS member receives a query for corp200, the member resolves the query and forwards the response to
the client.
Creating Rulesets
To create a ruleset:
1. From the Data Management tab -> DNS tab -> NXDOMAIN Rulesets tab, click the Add icon.
2. In the NXDOMAIN Ruleset wizard, complete the following and click Next:
• Name: Enter a name for the ruleset.
• Comment: You can enter additional information.
• Disable: You can disable this ruleset for use later on. The appliance ignores disabled rulesets.
3. Click the Add icon to add a rule to the ruleset table.
• In the Pattern column, enter a domain name or pattern, using the guidelines specified in About
NXDOMAIN Rulesets.
• In the Action column, select PASS, REDIRECT or MODIFY.
• In the Order column, NIOS automatically displays the number of the entry in the list.
The appliance applies the rules in the order they are listed. You can order the list as follows:
• Use the up and down arrows to move rules up or down on the list.
• Use the go-to-top or go-to-bottom arrow to move a rule to the top or bottom of the list.
• Change the Order number of a rule to move it to the desired location.
• Delete a rule by selecting it and clicking the Delete icon.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
You can add up to 12 IP addresses, combination of both IPv4 and IPv6, for NXDOMAIN
redirection.
• TTL: Specify how long the DNS client caches the A record with the redirected IP address.
• Log redirected queries: Select this checkbox to log the redirected queries to syslog.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
Updating the parameter values for mitigating phantom domain attacks takes effect immediately through Grid
replication. However, for these values to be updated in the named.conf file, you need to restart the DNS
service. To restart the member service, see Restarting Services.
To adjust the parameters to mitigate phantom domain attack parameters, complete the following:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member checkbox -> Edit icon.
To override Grid settings, click Override and complete the appropriate fields.
2. In the Grid DNS Properties or Member DNS Properties editor, click the Security tab and complete the following in
the Non-responsive servers section:
• Enable holddown for non-responsive servers: When you select this checkbox, the appliance stops
sending queries to non-responsive servers for a specified time interval (Hold down duration) when the
number of consecutive attempts to contact a non-responsive server exceeds the threshold value
(Timeouts to trigger). No service restart is required when you change this. Clear this checkbox to disable
the holddown. Note that disabling this does not clear any of the previously configured values. When you
enable this feature again, the appliance preserves the previously configured values.
• Minimum timeout: When the time taken for a timeout to happen exceeds this number, the timeout
is counted towards the number of consecutive timeouts (Timeouts to trigger). You can specify a
value between 0 and 5000 milliseconds. For example, if you set the minimum timeout to 1000
milliseconds, only timeouts that took longer than 1000 milliseconds are counted towards the
number of consecutive timeouts. The default is 1000 milliseconds.
• Timeouts to trigger: The number of consecutive timeouts before holding down a server. You can
specify a value between 0 and 4294967295. For example, setting the threshold value to 5 means
the appliance stops sending queries to the non-responsive server after five consecutive timeouts.
The default is 5.
• Hold down duration: The holddown duration for a server. You can specify a value between 1 and
86400 seconds. For example, if you set the holddown time to 60 seconds, the server stops
sending queries for 60 seconds. The default is 60 seconds.
Note
In order to get enough upstream queries and for the appliance to effectively identify non-
responsive servers and stop sending queries to them, do not set a high value for
the Minimum timeout field. The higher the value you configure for this field, the longer it
takes to capture a timeout and the harder it is to satisfy the total counts of consecutive
timeouts (Timeouts to trigger). Until the total count of consecutive timeouts is exceeded,
no mitigation happens against the non-responsive servers. As a result, it is less likely for
the appliance to identify phantom domain attacks when you set
the Minimum timeout field at a high value. Infoblox highly recommends that you keep the
default Minimum timeout value to achieve optimum protection against these attacks.
• Limit recursive queries per server: Select this checkbox to configure the maximum number of concurrent
recursive queries that the appliance sends to a single upstream name server. Queries above the limit will
be blocked and may result in a SERVFAIL response to the client. When you enable this option, the
appliance dynamically adjusts the concurrent query limit for a specific server based on the ATR (Average
Timeout Ratio). No service restart is required when you change this. Clear this checkbox to disable this
option. Note that disabling this does not clear any of the previously configured values. When you enable
this feature again, the appliance preserves the previously configured values.
• Maximum fetches per server: The maximum number of concurrent recursive queries that the
appliance sends to a single upstream name server before blocking additional queries to that
server. You can specify a value between 0 and 4294967295. The default value is 500.
Note
The default values for these configurable parameters are set at an optimum level for general operations.
Infoblox recommends that you keep the default values when using these features. Ensure that you understand
the ramifications if you want to change the default values.
Note
Changes made to the configuration for tracking NXDOMAIN responses take effect immediately on active DNS
service and do not require a service restart.
To configure the parameters for tracking NXDOMAIN responses, complete the following:
Total Responses per 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Second
250/s 0 250 500 750 1000 1250 1500 1750 2000 2250 2500
In this example, the total number of responses is 250 per second and the total number of responses hits the Minimum
responses per interval (default = 1000) at the 4th second of the detection interval. This meets the requirement for the
Minimum responses per interval and triggers an NXDOMAIN ratio calculation at the end of the detection interval (default
= 10 seconds). If the percentage equals or exceeds the high water threshold, the appliance sends an alert and logs the
Example Two: Total responses per second = 40 per second and parameters = default values
Total Responses per 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Second
Total Responses per 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Second
40/s 440 480 520 560 600 640 680 720 760 800
Total Responses per Second 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
40/s 840 880 920 960 1000 1040 1080 1120 1160 1200
In this example, the total number of responses is 40 per second. During the first detection interval of 10 seconds, the
total number of responses is 400, which does not reach the Minimum responses per interval (default = 1000); therefore,
no NXDOMAIN ratio calculation occurs and the response counters continue to accumulate into the second detection
interval. At the end of the second interval, the total number of responses still does not reach the Minimum responses per
interval; therefore, no NXDOMAIN ratio calculation occurs and the counters continue to accumulate. Finally, the total
number of responses meets the requirement of the Minimum responses per interval when the appliance receives 1000
responses at the 5th second during the third detection interval. This triggers an NXDOMAIN ratio calculation at the end of
the third detection interval, and the counters reset for the next detection interval. If the NXDOMAIN percentage equals or
exceeds the high water threshold, the appliance sends an alert and logs the event to the syslog to notify about possible
NXDOMAIN flood attacks.
Example Three: Total responses per second = 50000 and parameters = default values
Total Responses per Second 0 1st 2nd 3rd 4th 5th 6th 7th 8th 9th 10th
Note
The above configuration examples also apply to how the appliance tracks cache hit ratio of recursive queries,
as described in Tracking Cache Hit Ratio of Recursive Queries.
Note
Changes made to the configuration for mitigating possible NXDOMAIN attacks take effect immediately on
active DNS service and do not require a service restart.
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab -> Members tab -> member checkbox -> Edit icon.
To override Grid settings, click Override and complete the appropriate fields.
Blacklists
Your organization can prevent customers or employees from accessing certain Internet resources, particularly web sites,
by prohibiting a recursive DNS member from resolving queries for domain names that you specify.
You can create blacklist rules that specify how a DNS member responds to recursive queries for data for which it is not
authoritative. Each rule specifies a domain name and the action of the DNS member when the domain name in the query
matches that in the rule. Instead of resolving the query, the DNS member can redirect the DNS client to predefined IP
addresses or return a REFUSED response code indicating that resolution is not performed because of local policy.
When the DNS member receives a query for data for which it is not authoritative, it first tries to match the domain name
in the query with a domain name in any of its rules. If it finds a match, it responds according to the action specified in the
rule. If it does not find a match and the NXDOMAIN feature is enabled, the DNS member checks the NXDOMAIN
rulesets for a match and responds accordingly. If the NXDOMAIN feature is not enabled, the DNS member resolves the
query. (For information about the NXDOMAIN feature, see About NXDOMAIN Redirection.
Infoblox DNS members can modify their responses to queries for A records only. Therefore, if the matched query is for a
record other than an A record, including a query with a type of "ANY", the DNS member sends a REFUSED response if
the matched rule has an action of "Redirect".
In the figure Blacklist, a DNS client opens a web browser and tries to access xxx.domain.com. When the DNS member
receives the query for xxx.domain.com, it checks its blacklist rulesets and finds xxx.domain.com in a rule with an action
of "Redirect". The DNS client is redirected to the configured redirection destination IP address 10.1.2.3.
Blacklist
Pattern Action
a1.foo.com PASS
foo.com REDIRECT/BLOCK
• If the DNS member receives a recursive query for a1.foo.com, it resolves the query and forwards the response to
the client.
• If the DNS member receives a recursive query for the A record of b1.foo.com, it redirects the DNS client to the
specified IP address. If the query is for another record type, such as an MX record, the member sends a
REFUSED response to the client.
Blacklist Guidelines
The following summarizes how a DNS member responds to a DNS client when the blacklist feature is enabled:
• If the domain name in the query matches a domain name in a rule, the member does the following:
• If the query is for an A record, the member performs the action specified in the rule.
• If the action is "Redirect", the member performs the action specified in the Blacklist wizard.
• If the action in the wizard is to redirect, the DNS member redirects the client to the listed IP
addresses.
• If the action in the wizard is to return a REFUSED response, the DNS member sends a
REFUSED response to the DNS client.
• If the action in the rule is" Pass", the DNS member resolves the query and forwards the response
to the DNS client.
• If the query is for a non-A record, the member performs the action in the rule as follows:
• If the action is "Redirect", the DNS member returns a REFUSED response to the DNS client.
• If the action is "Pass", the DNS member resolves the query and forwards the response to the DNS
client.
• If the domain name in the query does not match a domain name in a rule:
• If the NXDOMAIN feature is enabled, the DNS member tries to find a match with the NXDOMAIN rules
and responds accordingly.
• If the NXDOMAIN feature is disabled, the DNS member resolves the query and forwards the response to
the DNS client.Note that if an A record with a dotted hostname is added to an authoritative zone through a
dynamic DNS update, and that A record should actually belong in an existing delegation, the appliance
may not redirect a query for that A record according to the Blacklist and NXDOMAIN guidelines.
Related topic
Configuring Blacklists
Configuring Blacklists
You can perform the following operations on the blacklist feature:
1. Add blacklist rulesets, as described in Adding a Blacklist Ruleset.
2. Create one or more CSV files that contain the rules for each ruleset and import the files to the Grid. For
information about importing CSV files, see Importing and Exporting Data using CSV Import.
3. Enable blacklisting, as described in Enabling Blacklisting.
Enabling Blacklisting
Only DNS members with recursion enabled can support this feature. You can enable this feature at the Grid level and
override it for a member or DNS view with recursion enabled.
You can also enable the DNS member to log queries that matched blacklist rules. The logs include the queried domain
name, source IP address, the pattern of the matched rule, and the name of the corresponding ruleset.
To enable blacklisting:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox ->
Edit icon.
DNS View: From the Data Management tab, select the DNS tab and click the Zones tab -> dns_view checkbox ->
Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. If the Grid DNS Properties or Member DNS Properties editor is in basic mode, click Toggle Advanced Mode.
3. Click Blacklist and complete the following:
Enable Domain Name Blacklist: Select this checkbox.
Blacklist Rulesets: To add a ruleset, click the Add icon. If there are multiple rulesets, select one from the Select
Ruleset dialog box. Use the up and down arrows to move rulesets up and down in the list. The appliance applies
rulesets in the order they are listed.
For blacklisted domain names,return: Select the action of the appliance when it receives a query for a record that
matches a rule with an action of Redirect/Block.
If you selected This list of IP addresses, add an IP address to the Redirect to table by clicking the Add icon and
entering the address. The addresses are listed in round robin fashion in the synthesized response of the DNS
member. You can enter up to 12 IP addresses.
Blacklist TTL: Specify how long the DNS client caches the A record with the redirected IP address.
Log queries for blacklisted domain names: Select this option to enable the appliance to log queries for blacklisted
domain names, including the source IP address of the query.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
The appliance includes only IPv4 and IPv6 addresses. It does not include network addresses, TSIG
keys, and denied addresses. When you configure a named ACL, all allowed IPv4 and IPv6 addresses in
the named ACL are added to the also-notify statement.
Note
The tcp-client value is unconditionally set to 1000 to control the total number of simultaneous TCP connections,
which cap the maximum inbound and maximum outbound transfer plus any DNS request made with the TCP.
The tcp-client value specifies the maximum number of simultaneous DNS clients that can be handled with TCP
Note
The hostname restriction limits the hostname of A, AAAA, Host, MX, NS, and bulk host records only.
You can define your own hostname restriction policy at the Grid level only. At the member and zone levels, you can
select a predefined policy or a policy that was defined at the Grid level. The appliance supports IDNs for DNS zones and
resource records. For more information about IDNs, see Managing Internationalized Domain Names. You can use UTF-8
characters when you configure your own hostname checking policy.
Note
The Strict Hostname Checking policy only allows alphanumeric characters and dashes ("-"). In addition,
this policy allows IDNs that are written in punycode. You cannot use other special characters, such as
underscore ("_"). Therefore, DDNS updates from Microsoft Active Directory controllers may not be
accepted.
7. Save the configuration and click Restart if it appears at the top of the screen.
After you specify a hostname restriction policy, if you create a record name that does not comply with this policy and try
to save it, an error message appears.
Note
The strict hostname checking policy only allows alphanumeric characters and dashes. It does not allow
for the use of other special characters, such as underscore ("_"). Therefore, DDNS updates from
Microsoft Active Directory controllers might not be accepted.
7. Save the configuration and click Restart if it appears at the top of the screen.
About DNS64
To support the increasing number of IPv6 and dual-stack networks, Infoblox DNS servers now support DNS64, a
mechanism that synthesizes AAAA records from A records when no AAAA records exist. When you enable DNS64 on an
Infoblox DNS server, it can operate with a third-party NAT64 device so IPv6-only nodes can communicate with IPv4-only
nodes without any changes to either of the devices.
As illustrated in the following figure, when an IPv6-only host requests the AAAA record of an IPv4-only server and none
exists, a DNS64-enabled server can retrieve the A record of the IPv4 server and synthesize an AAAA record. The IPv6-
only host can then use the synthesized AAAA record, which contains the IPv6 proxy address for the IPv4 address in the
original A record, to initiate communication with the IPv4 host.
Configuring DNS64
You can enable DNS64 on both authoritative and recursive DNS servers. You can configure DNS64 at the Grid, member
or DNS view level.
To configure DNS64 on Infoblox DNS servers:
1. Create at least one DNS64 synthesis group. A synthesis group specifies the IPv6 prefix of the synthesized AAAA
records. For more information, see Adding a DNS64 Synthesis Group.
2. Optionally, specify additional parameters for the synthesis group. For more information, see Setting DNS64
Group Properties.
3. Enable the DNS64 service and assign a synthesis group to the Grid, a member or a DNS view. For more
information, see Enabling DNS64 Service.
On the NAT64 device, you must specify the IPv6 prefixes that are configured on the DNS server.
Note
Membership in the DNS Admin group is required to complete scavenging operations. For details,
see Administrative Permissions for DNS Records Scavenging. See Forcing Creation Timestamp Initialization for
Unchanged Records for information on handling the creation timestamp of records that remain unchanged at
DDNS updates.
Scavenging Rules
You can configure the following match rules to identify reclaimable DNS resource records:
• Resource Record Type: This rule allows you to specify the record type to run scavenging on. A record is
reclaimable if its type matches or does not match the type specified in the rule. The record types that support
scavenging include the following:
• A
• AAAA
• PTR
• CNAME
• DNAME
• MX
• SRV
• NAPTR
• TXT
Note
In the case of an upgrade to NIOS 7.3, the creation time is not initialized. Therefore, the "Creation Time"
rule does not apply to the records created before the upgrade.
• Last Queried Time: This rule allows you to identify reclaimable records based on when they were last queried for
their DNS data. You can see the last queried time for the records in the DNS Resource Records viewer.
Note
If you use this rule, also select Enable last queried time monitoring for resource records in the Grid,
view, or zone scavenging properties, as described in the next section.
• Last Discovered Time: This rule allows you to identify reclaimable records based on the record's last discovered
timestamp. This rule is applicable to A, AAAA, and PTR records.
• Record Source: This rule allows you to specify the record source – static or dynamic – to be used as a filter when
identifying reclaimable records.
• Associated Records: This rule allows you to identify reclaimable records based on whether they have or do not
have associated records. Record associations are supported for address records (A, AAAA, and PTR).
Additionally, you can reclaim the associated records when reclaiming the original ones by enabling the option
When reclaiming A, AAAA, or PTR records, also reclaim the corresponding, symmetric A, AAAA, and PTR
records in the scavenging properties, as described in the next section.
• Extensible Attributes: You can specify extensible attributes that reclaimable records should match in addition to
the scavenging rules described above.
Note
Enabling monitoring for a zone does not enable monitoring for child zones.
6. You can configure the set of ACLs (Access Control Lists) to filter clients on DNS queries from updating the last-
queried timestamp, under Prevent the following ACLs or ACEs from updating the last queried timestamp. To
configure the ACLs, you should select either Enable last queried time monitoring for resource records or Enable
last queried time monitoring for zones option, these options are disabled by default.
7. Select one of the following:
Note
The extensible attributes rule is always combined with the rest of the match rules using the AND
operator.
• When reclaiming A, AAAA or PTR records, also reclaim the corresponding, symmetric A, AAAA and PTR records:
Select this if you want to reclaim records associated to the ones identified as reclaimable.
• To configure a schedule for automatic records scavenging, select Enable scheduled record scavenging. See
Scheduling Automatic Scavenging.
• Click Save & Close or Save.
Note
Infoblox recommends manually testing the configured scavenging settings before enabling scheduled
scavenging.
1. In the DNS record scavenging properties described in the previous section, select the Enable scheduled record
scavenging checkbox.
2. To enable automatic scavenging after records are marked as reclaimable, select After marking a record as
reclaimable, automatically reclaim the record.
3. Click the Scheduling icon and complete the following in the Scavenging Scheduler dialog:
• Select how often you want to execute the scavenging. You can select Once, Hourly, Daily, Weekly, or
Monthly.
• If you select Once, complete the following:
• Enter the day in the date picker and select a month from the drop-down list.
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
• Choose the Time Zone.
• If you select Hourly, complete the following:
• Schedule every hour(s) at: Enter the number of hours between each scavenging instance. You
can enter a value from 1 to 24.
• Minutes past the hour: Enter the number of minutes past the hour. For example, enter 5 if you
want to schedule the scavenging operation five minutes after the hour.
• Choose the Time Zone.
• If you select Daily, complete the following:
• Click either Every day or Every weekday.
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
• Choose the Time Zone.
• If you select Weekly, complete the following:
• Schedule every week on: Select any day of the week.
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-down list.
• Choose the Time Zone.
• If you select Monthly, complete the following:
• Schedule the day of the month: Enter the day of the month and the monthly interval. For
example, to schedule the rule update on the first day after every 2 months, you can enter
Day 1 every 2 month(s).
• Enter a time in the hh:mm:ss AM/PM format. You can also select a time from the drop-
down list.
Note
To start immediate scavenging of DNS records, you must first carefully define the scavenging properties, as
described in Configuring DNS Record Scavenging Properties.
Note
Static records are never reclaimed automatically even if they are marked as reclaimable. You
can only delete static records manually from the DNS Resource Records viewer.
4. Click Start.
To check the progress of the current scavenging task, you can use the DNS Record Scavenging widget in the
Dashboard. For more information, see DNS Record Scavenging. You can also view a scavenging report, as described in
DNS Scavenged Object Count Trend.
Note
Keep in mind that the Enable record scavenging property for a lower scavenging scope (e.g. view or zone) can
override this property for the upper scope (i.e., Grid or view respectively). For example, if you run scavenging
on the Grid with the scavenging option disabled, and there are some views or zones on which scavenging is
enabled, this results in the records of the affected views and zones being scavenged. Vice versa, if scavenging
is disabled for certain views or zones and you run scavenging on the Grid with the scavenging option enabled,
the corresponding views and zones are excluded from scavenging.
Note
Only a super user can restore records reclaimed during a recurring scavenging task.
Note
This report does not display the last queried information for automatically generated NS records.
To enable last queried time monitoring for resource records, do the following in the DNS scavenging properties for the
Grid, a view, or a zone:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
DNS view: From the Data Management tab, select the DNS tab and click the Zones tab -> dns_view checkbox ->
Edit icon.
DNS zone: From the Data Management tab, select the DNS tab and click the Zones tab -> click a DNS view ->
zone checkbox -> Edit icon.
2. If the properties editor is in basic mode, click Toggle Advanced Mode.
3. Click DNS Scavenging.
4. Select the Enable last queried time monitoring for resource records checkbox. For more information, see
Configuring DNS Record Scavenging Properties.
5. Click Save & Close.
Note
Exporting the query monitoring data may take longer than usual if the report contains a lot of records.
Also, if a Grid secondary server uses zone transfer to update zone data from a Grid primary server,
NIOS does not monitor queries made to the Grid secondary server and it does not update the last
queried timestamp for the resource records in a zone.
When multiple values are specified with the same filter, the filter applies or logic, e.g. 'a' or 'b'. Other perspectives in
NIOS UI apply and logic, e.g., 'a' and 'b'. You can use the following filters to get specific information in this report:
• DNS View: DNS view name.
• Not Queried: Specify a date when the last query was made. The only operator is "Since".
• Zone: FQDN of zone.
• Type: Only a single record type filter can be specified. This filter has the following resource records:
Note
NIOS does not monitor queries or update timestamp for DNSSEC records, except for DS records. As a result,
the QueryMonitoring tab displays "Not Monitored" in the Last Queried column for all DNSSEC records. In
addition, the Not Queried filter does not display any DNSSEC records.
The following sections explain how to configure DTC properties for the Grid or a Grid member.
Note
The enabled IPAM object for Extensible Attributes Source Types for Topology Rules depend on the
upgrade history of the Grid. In case, Grid is upgraded from the earlier NIOS version to a later version
which supports different IPAM object types, only IPAM Networks and IPAM Ranges types are enabled
by default. However, in a Grid that is created with the possibility to select different IPAM object types, all
the IPAM object types are enabled by default.
• When DNS Traffic Control is enabled, direct traffic according to EDNS0 Client Subnet when possible: Select this
checkbox to direct traffic according to EDNS0 client subnet option when DNS Traffic Control is processing DNS
queries.
You can enable the appliance to redirect traffic according to EDNS0 client subnet option when DNS Traffic
Control is processing DNS queries that contain the EDNS0 client subnet option. When you enable this feature,
DNS Traffic Control querying process uses the client address specified in the EDNS0 client subnet option of the
DNS query and the appliance includes the EDNS0 client subnet option in the response message. If there are
multiple EDNS0 client subnet options in a query, the appliance considers only the first option and ignores the
other options. When this feature is disabled, DNS Traffic Control querying process ignores the EDNS0 client
subnet option. For more information about EDNS0, see Using Extension Mechanisms for DNS (EDNS0).
• Specific behavior for DNS queries: Select one of the following options if you want the appliance to return DNS
responses when no DNS traffic control responses are available. The Return DNS response if there are no DNS
Traffic Control responses available option is selected by default.
• Return DNS response if there are no DNS Traffic Control responses available: Select this option if you
want the appliance to return DNS responses when DNS Traffic Control responses are not available.
• Drop LBDN matched DNS queries during full health update: Select this option to drop all LBDN
queries when the DNS service is waiting to receive a full health status update from the health monitor. The
appliance drops the LBDN queries and returns a SERVFAIL response.
• No specific behavior: Select this option when you do not want the appliance to return DNS responses
when DNS Traffic Control responses are not available.
• Return the following type of response from DNSSEC signed zones: Select one of the following response types for
DNSSEC-signed zones:
• Signed
• Unsigned
For more information on the Signed and Unsigned modes, see Managing LBDN Records.
• Save the configuration and click Restart if it appears at the top of the screen.
Note
For vNIOS appliances, some of the options may vary depending on your vNIOS configuration.
For example, if you are using a single network interface instance of vNIOS for GCP, you will see
choices specific to the LAN1 interface only. For more information, see the vNIOS documentation
specific to your product at Appliances.
•
ANY interface
•
VIP interface
•
LAN2
•
MGMT interface
•
IP (This is displayed only when you have configured additional IP addresses in the network
settings. Specify the IP address of the source.)
• Specific Behavior for DNS queries: Select one of the following options if you want the appliance to return
DNS responses when no DNS traffic control responses are available. The Return DNS response if there
are no DNS Traffic Control responses available option is selected by default. To override the Grid setting,
click Override.
• Return DNS response if there are no DNS Traffic Control responses available
• Drop LBDN matched DNS queries during full health update
• No specific behavior
For more information, see Configuring Grid DNS Traffic Control Properties.
• When DNS Traffic Control is enabled, direct traffic according to EDNS0 Client Subnet when possible: To
retain the same setting as the Grid, keep the inherited value. To override the Grid setting, click Override.
For information, see Configuring Grid DNS Traffic Control Properties.
3. Save the configuration and click Restart if it appears at the top of the screen.
DNS Views
DNS views enable the NIOS appliance to serve different versions of DNS data based on the host accessing it. The topics
in this section include:
DNS views enable the NIOS appliance to serve different versions of DNS data based on the host accessing it.
DNS views provide the ability to serve one version of DNS data to one set of clients and another version to another set of
clients. With DNS views, the NIOS appliance can provide a different answer to the same DNS query, depending on the
source of the query.
In the below figure, the appliance has two views: an Internal and an External DNS view. When the appliance receives
queries from DNS clients, it responds with data from either the Internal or External DNS view, depending on the source
IP address. When the appliance receives a query from Client A and determines that it can resolve the query from data in
the Internal view, the appliance responds with the IP address of the site in the Internal view. When the appliance receives
a query from Client B and determines that it can resolve the query from data in the External view, it responds with the IP
address in the External view.
Internal and External Views
You can control which clients access a DNS view through the use of a match list specifying IP addresses and/or TSIG
(transaction signature) keys. When the NIOS appliance receives a request from a client, it tries to match the source IP
address and/or TSIG key with its match list when determining which DNS view, if any, the client can access. After the
appliance determines that a client can access a DNS view, it checks the zone level settings to determine if it can provide
the service that the client is requesting. For information on TSIG keys or defining zone transfer settings, see Enabling
When you create more than one DNS view, as shown in the figure Query Resolution, the order of the views is important.
View order determines the order in which the NIOS appliance checks the match lists. In the figure Query Resolution, the
internal DNS view is listed before the external DNS view. If the views were reversed, no hosts would receive DNS replies
from the internal DNS view because the match list of the external DNS view allows replies to clients with any IP address.
For information on how to order views, see Managing the DNS Views of a Grid Member.
In a Grid, each Grid member can host its own set of views. A Grid member can serve as the primary or secondary server
for multiple views of a particular zone. For information about specifying primary and secondary servers, see Assigning
Zone Authority to Name Servers.
Note
This setting overrides the recursion setting at the Grid and member levels.
Note
You can also enable or disable the match-recursive-only option for a specific DNS view on a specific
member by using the CLI command set enable_match_recursive_only. For information about this
command, refer to the Infoblox CLI Guide.
Note
You cannot copy shared records and records that the NIOS appliance automatically creates, such as NS
records and glue A records.
Note
When you copy resource records between zones and there are pending scheduled tasks associated with these
records, the appliance allows the copying of zone records before it executes the scheduled tasks.
Note
The 255.255.255.255 limited broadcast address is reserved. The appliance does not
automatically create glue A records for this address. You can however create an NS record
without the associated glue records.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
Only superusers can change the order of the views.
Note
Only superusers can copy A, AAAA, shared A, and shared AAAA records with a blank name. Limited-access
users must have read/write permission to Adding a blank A/AAAA record in order to copy A, AAAA, shared A,
and shared AAAA records with a blank name, otherwise the copying records operation might fail. You can
assign global permission for specific admin groups and roles to allow to copy A, AAAA, shared A, and shared
AAAA records with a blank name. For more information,
see Administrative Permissions for Adding Blank A or AAAA Records.
Note
A single forward-mapping zone can map names to both IPv4 and IPv6 addresses.
Note
Before enabling RFC 2317 support for zones, disable forwarders for the zone, especially when any sort of
delegation (including RFC 2317) is being used. If you do not, reverse lookups may fail. For more information,
contact Infoblox Support for the Tech Note on RFC 2317 delegation.
Note
Throughout this documentation, the trailing dot indicating the root zone is not shown, although its presence is
assumed.
The procedure for adding a subzone is the same as that used to add an authoritative zone. The only difference is that
you specify the subzone name in the Name field. For information about adding authoritative zones, see Configuring
Authoritative Zones
Notes
• When you temporarily disable a zone that has an associated NS group, the appliance removes all the
automatically generated NS records, glue A or AAAA records, and PTR records from the zone. The
appliance automatically generates the NS records, glue A or AAAA records, and PTR records when you
re-enable the zone. Note that disabling a zone may take a longer time to complete depending on the
size of the data.
• Do not enable authoritative zones if your Grid members have smaller disk spaces and if you want to
perform DDNS or other updates on the authoritative zone. Infoblox recommends that you have a disk
space of 250 GB if you want to use authoritative zones with Grid members.
Note
DNS integrity check is not supported on authoritative zones configured to use primary DNS servers in stealth
mode.
Note
Once you configure a zone for DNS integrity check, you will not be able to add a parent zone above this
zone. You must disable DNS integrity check for this zone before you can add the parent zone.
2. In the Authoritative Zone editor, toggle to the Advanced Mode, select the DNS Integrity Check tab -> Basic tab
and complete the following:
• Enable: Select this checkbox to enable the DNS integrity check feature.
• Member: Click Select Member to select the Grid member you want to use for DNS integrity check. When
you select a member, ensure that the member is configured to send and receive DNS queries and
responses from Grid primaries (excluding stealth primaries) for the zone being monitored. Note that
queries generated by DNS integrity check for the first reachable internal Grid primary are logged in
relevant DNS reports. For information about reports, see Infoblox Reporting and Analytics.
• Check Frequency: Enter how often the appliance monitors DNS data for the authoritative zone. Select the
time unit from the drop-down list. The appliance periodically queries DNS data for the top-level zone
based on the time interval you configure here. The default value is one hour, and the minimum
configurable value is 15 minutes.
• Enable Verbose Logging: Select this to enable detailed logging of events related to DNS integrity check.
When you select this option, the appliance logs additional information in the syslog when DNS data
discrepancies are detected. It also logs a message when no data discrepancies are found during a DNS
data check. When you clear this checkbox, the appliance logs standard information in the syslog and
does not log an event when no data discrepancies are found during a DNS integrity check. This is
disabled by default. For information about the syslog, see Viewing the Syslog.
3. Save the configuration.
On the Infoblox appliance, you can configure and manage DNS zones and subzones.
The following table summarizes how the appliance displays IDNs at the DNS zone level:
Input NIOS Displays... NIOS DNS Domain (Punycode in the Conversion Guidelines
GUI)
Note
You can enter, modify, and remove zone data on the primary servers, which can then send new and modified
data in a read-only format to the secondary servers. Both primary and secondary name servers are
authoritative for the zone data they serve. The distinction between them is how they get their zone data.
In Grid Manager, you can specify the primary and secondary servers for a zone or you can specify a name server group.
A name server group is a collection of one or more primary servers and one or more secondary servers. For information
on name server groups, see Using Name Server Groups.
Note
On the appliance you configure as a secondary server for a zone, you must associate a TSIG key for each
primary server to which the secondary server requests zone transfers. On the appliance you configure as a
primary server for a zone, you can set a TSIG key at the Grid, member, or zone level. Because the secondary
server requests zone transfers, it must send a specific key in its requests to the primary server. Because the
primary server responds to the requests, it can have a set of TSIG keys from which it can draw when
responding. As long as the primary server can find the same TSIG key that the secondary sends it, it can verify
the authenticity of the requests it receives and authenticate the responses it sends. Use NTP to synchronize the
time on both name servers that use TSIG-authenticated zone transfers.
Note
To avoid an impact on your database performance, Infoblox recommends that you do not configure a
large number of external secondary servers in stealth mode. To ensure that these secondary servers
receive notifications about zone updates, you can allow zone transfers for these IP addresses and then
enable the appliance to add them to the also-notify statement. For information about how to configure
this feature, see Configuring Zone Transfers.
• Use TSIG: To authenticate zone transfers between the local appliance and the external secondary server using a
TSIG (transaction signature), select this checkbox. Infoblox TSIGs use HMAC-MD5 hashes. These are keyed
one-way hashes for message authentication codes using the Message Digest 5 algorithm. For details, see RFC
1321, The MD5 Message-Digest Algorithm, and RFC 2104, HMAC: Keyed-Hashing for Message Authentication.
• Key name: Type or paste the name of the TSIG key you want to use. This must be the same name as that of the
TSIG key for this zone on the external secondary server.
• Key: Type or paste a previously generated key. On the external secondary server, this key must also be present
and associated with this zone. You can generate a TSIG key, or you can obtain the TSIG key name and key from
the external name server, either by accessing the appliance yourself or by requesting the appliance administrator
to deliver them to you through some out-of-band mechanism. Then, type or copy-and-paste the name and key
into the appropriate fields.
Note
On the appliance you configure as a secondary server for a zone, you must associate a TSIG key for each
primary server to which the secondary server requests zone transfers. On the appliance you configure as a
primary server for a zone, you can set a TSIG key at the Grid, member, or zone level. Because the secondary
server requests zone transfers, it must send a specific key in its requests to the primary server. Because the
primary server responds to the requests, it can have a set of TSIG keys from which it can draw when
responding. As long as the primary server can find the same TSIG key that the secondary sends it, it can verify
the authenticity of the requests it receives and authenticate the responses it sends. Use NTP to synchronize the
time on both name servers that use TSIG-authenticated zone transfers.
Note
The Auto-populate option to add the domain controller list is only available while configuring the
AD-integrated zone. It is not available when you edit the domain controller list in
the Authoritative Zone editor.
Note
The appliance does not encode punycode when you import zone data containing punycode. For example, a
zone data containing IDNs in punycode is stored in punycode for the data being imported. The data is managed
in punycode only.
Note: Only superusers can import zone data that contains A, AAAA, shared A, or shared AAAA records with a blank
name. Limited-access users must have read/write permission to Adding a blank A/AAAA record in order to import zone
data that contains A, AAAA, shared A, or shared AAAA records with a blank name, otherwise the import zone data
operation might fail. You can assign global permission for specific admin groups and roles to allow to import A, AAAA,
shared A, or shared AAAA records with a blank name. For more information, see Administrative Permissions for Adding
Blank A or AAAA Records.
Note
If NIOS resolves the IP address of the imported zone data, an external secondary member is added to the list
of name servers with the exact IP address. If NIOS cannot resolve the IP address of the imported zone data, it
adds an external secondary member with the IP address 255.255.255.255 to the list of name servers.
Removing Zones
Depending on the configuration, you may or may not be able to delete or schedule the deletion of a zone and all its
contents. Superusers can determine which group of users are allowed to delete or schedule the deletion of a zone and
all its contents. For information about how to configure the recursive deletion of zones, see Configuring Recursive
Deletions of Networks and Zones.
If you choose to reparent the subzones, be aware of the following caveats and possible effects of the reparenting:
• You cannot remove a zone and reparent its subzones if at least one of the subzones is a delegated zone. You
must first remove any delegated subzones, and then you can remove the zone and reparent its subzones.
• If there are AD (Active Directory) subzones (_msdcs, _sites, _tcp, _udp, domaindnszones, foresetdnszones) and
you opt to remove the parent zone only, the NIOS appliance reparents all subzones except the AD subzones,
which it removes regardless of the removal option you specify.
• The subzone reparenting option is unavailable when you select multiple zones for removal.
• A record created under a top-level reverse-mapping zone is reparented when its immediate parent zone is
created. If that parent zone is deleted, the record is restored to the top-level reverse-mapping zone.
Examples:
Example 1:
Step 1 - Add 10.in-addr.arpa under . (root zone)
Step 2 - If you add 10.in-addr.arpa, it is created under . (root zone)
Step 3 - if you add in-addr.arpa, then 10.in-addr.arpa is reparented under in-addr.arpa
Example 2
• Deleting in-addr.arpa from the hierarchy might lead to 10.in-addr.arpa reparenting under . (root zone),
depending on the Remove zone only/ Remove all subzones option you select.
• If in-addr.arpa is restored, it is restored under . (root) zone with all its resource records.
Note
Instead of removing a zone, you can also disable it. For more information, see Enabling and Disabling Zones.
To remove a zone:
1. From the Data Management tab, select the DNS tab -> Zones tab.
2. Click the checkbox of the zones you want to delete.
3. Click the Delete icon.
4. Select one of the following. Note that these options appear only if you are allowed to delete zones and all its
contents. For information about how to configure this, see Configuring Recursive Deletions of Networks and
Zones.
• Remove zone only: Select this to remove the zone and all its content. The appliance reparents all
subzones to the parent zone of the zone that you want to remove, except for the automatically created AD
(Active Directory) subzones.
• Remove all subzones: Select this to remove the selected zone, all its subzones, and all the resource
records of the selected zone and its subzones.
5. Click Yes. Grid Manager displays a warning message. Click Yes to continue or No to cancel the process. Note
that this process may take a longer time to complete depending on the size of the data.
You can also schedule the deletion for a later time. Click Schedule Deletion and in the Schedule Change panel, enter a
date, time, and time zone. For information, see Scheduling Deletions. For information about scheduling recursive
deletions of zones, see Scheduling Recursive Deletions of Network Containers and Zones.
Configuring a Delegation
Instead of a local name server, remote name servers (which the local server knows) maintain delegated zone data.
When the local name server receives a query for a delegated zone, it either responds with the NS record for the
delegated zone server (if recursion is disabled on the local server) or it queries the delegated zone server on behalf of
the resolver (if recursion is enabled).
For example, there is a remote office with its own name servers, and you want it to manage its own local data. On the
name server at the main corporate office, define the remote office zone as delegated, and then specify the remote office
name servers as authorities for the zone.
You can delegate a zone to one or more remote name servers, which are typically the authoritative primary and
secondary servers for the zone. If recursion is enabled on the local name server, it queries multiple delegated name
servers based on their round-trip times. You can also add arpa as a top-level forward-mapping zone and delegate its
subzones.
You can also configure TTL settings of auto-generated NS records and glue A and AAAA records for delegated zones in
forward-mapping, IPv4 reverse-mapping, and IPv6 reverse-mapping zones. For information, see Specifying Time To Live
Settings.
The delegation must exist within an authoritative zone with a Grid primary server.
Note
The DNS server resolves the FQDN of the delegated name server and does not use the IP address that you
specify when assigning the delegated name servers.
Note
The DNS server resolves the FQDN of the delegated name server and does not use the IP address that
you specify when assigning the delegated name servers.
You can override the default forwarders for a forward-mapping zone at a Grid member level and configure custom
forwarders. In other words, each Grid member can have its own forwarders for the forward zone. For example: a forward-
mapping zone foo.com served by two Grid members M1 and M2 with M1 forwarding queries to 10.1.0.1 and 10.1.0.2 and
M2 forwarding queries to 90.3.3.3 and 90.4.4.1. Note that the Grid member uses the default forwarders unless you
override them at any level. For more information about domains and zones, see Configuring Authoritative Zone
Properties.
Note
The use of a forward zone is different from that of a forwarder. (A forwarder is a name server that performs
recursive lookups on behalf of the name servers that forward queries to it. For more information,
see Using Forwarders.) A NIOS appliance forwards queries to the name server of a forward zone because the
name server can resolve queries for the zone. A NIOS appliance forwards queries to a forwarder regardless of
zones.
Note
If you do not define any Grid members to serve the forward-mapping zone, then the named.conf file will
not contain the configuration of the newly created forward zone. Hence, the Infoblox DNS server will not
be authoritative to the forward zone and by default, the Infoblox DNS server will query the root servers
to resolve queries for the forward zone.
1. Select Use this name server group to assign a forwarding member NS group for the zone. You can select the
forwarding member NS group from the drop-down list. For information about forwarding member NS groups, see
Using Forwarding Member Name Server Groups.
Note
Skip the following two steps if you want to use the default forwarders.
Note
Skip the following two steps if you want to use the default forwarders.
Stub zone records are also periodically refreshed, just like secondary zone records. However, secondary name servers
contain a complete copy of the zone data on the primary server. Therefore, zone transfers from a primary server to a
secondary server, or between secondary servers, can increase CPU usage and consume excessive bandwidth. A name
server hosting a stub zone maintains a much smaller set of records; therefore, updates are less CPU intensive and
consume less bandwidth.
When a name server hosting a stub zone receives a query for a domain name that it determines is in the stub zone, the
name server uses the records in the stub zone to locate the correct name server to query, eliminating the need to query
the root server.
The figures Processing a Query without a Stub Zone and Processing a Query with a Stub Zone illustrate how the NIOS
appliance resolves a query for a domain name for which it is not authoritative. Figure 19.8 illustrates how the appliance
resolves a query when it does not have a stub zone.
The figure Processing a Query with a Stub Zone illustrates how the appliance resolves the query with a stub zone.
In the figure Processing a Query without a Stub Zone, a client sends a query for ftp.sales.corp200.com to the NIOS
appliance. When the appliance receives the request from the client, it checks if it has the data to resolve the query. If the
appliance does not have the data, it tries to locate the authoritative name server for the requested domain name. It sends
nonrecursive queries to a root name server and to the closest known name servers until it learns the correct authoritative
name server to query.
Processing a Query without a Stub Zone
Stub zones facilitate name resolution and alleviate name server traffic in your network. For example, the client in the
previous examples is in corpxyz.com. The corpxyz.com and corp200.com zones are partners, and send all their
communications through a VPN tunnel, as shown in the figure Stub Zone Configuration. The firewall protecting
corpxyz.com is configured to send all messages for the 10.2.2.0/24 network through the VPN tunnel. Infoblox_A hosts
the stub zone for corp200.com. Therefore, when the host in corpxyz.com sends a query for ftp.sales.corp200.com,
Infoblox_A obtains the IP address of Infoblox_B (10.2.2.7) from its stub zone records and sends the query to the firewall
protecting corpxyz.com.
Because the destination of the query is in the 10.2.2.0/24 network, the firewall (configured to encrypt all traffic to the
network) sends the request through a VPN tunnel to Infoblox_B. Infoblox_B resolves the query and sends back the
response through the VPN tunnel. All name server traffic went through the VPN tunnel to the internal servers, bypassing
the root servers and external name servers.
When you create a delegated zone, you must first specify the name servers in the delegated zone and manually maintain
information about these name servers. For example, if the administrator in sales.corp200.com changes the IP address of
a name server or adds a new name server, the sales.corpxyz.com administrator must inform the corp200.com
administrator to make the corresponding changes in the delegated zone records.
If, instead, you create a stub zone for sales.corp200.com, you set up the stub zone records once, and updates are then
done automatically. The name servers in corp200.com that are hosting a stub zone for sales.corp200.com automatically
obtain updates of the authoritative name servers in the child zone.
In addition, a name server that hosts a stub zone can cache the responses it receives. Therefore, when it receives a
request for the same resource record, it can respond without querying another name server.
The primary server and the name server hosting the stub zone can belong to the same Grid, as long as the authoritative
zone and the stub zone are in different DNS views. You cannot configure one zone as both authoritative and stub in the
same view.
After you create a stub zone, the NIOS appliance does the following:
1. It sends a query to the primary server for the SOA (Start of Authority) record of the stub zone. The primary server
returns the SOA record.
2. Then, it sends a query for the NS (name server) records in the zone.
The primary server returns the NS records and the A (address) records of the name servers. (These A records
are also called glue records.)
If the primary server is a NIOS appliance, you might have to manually create the A record and add it to the stub
zone. A NIOS appliance that is the primary server for a zone always creates an NS record, but does not always
create an A record.
• The appliance automatically creates an A record when its host name belongs to the name space of the zone. For
example, if the zone is corpxyz.com and the primary server host name is server1.corpxyz.com, the appliance
You can also add stub zones for Microsoft servers that are managed by Grid members. For information, see Managing
Microsoft Windows Servers.
You can configure a stub zone for forward mapping or reverse mapping zones.
The timer values in the SOA record determine when the zone data is updated. The MNAME field and the RNAME field of
the SOA record display the FQDN of the primary server and the administrative email address respectively. You can view
these default values and override them when necessary. For a zone that has multiple primary servers, Grid Manager
displays all configured primaries for the zone. You can click Override to override the Grid-level settings. If the primary
server is a Microsoft server however, the Override option does not appear. You can only change certain values in the
SOA record.
Note
If you change the serial number of the Grid Master, serial numbers for all primaries will be changed to
the same number. A warning is displayed when you try to decrement the serial number.
• Refresh: This interval tells secondary servers how often to send a message to the primary server for a zone to
check that their data is current, and retrieve fresh data if it is not. The default is three hours.
• Retry: This interval tells the secondary server how long to wait before attempting to recontact the primary server
after a connection failure between the two occurs. The default is one hour.
• Expire: If the secondary fails to contact the primary for the specified interval, the secondary stops giving out
answers about the zone because the zone data is too old to be useful. The default is 30 days.
Viewing Zones
To list zones, navigate to the Data Management tab -> DNS tab -> Zones panel. If there is more than one DNS view in
the Grid, this panel lists the DNS views. Select a DNS view to list its zones. (For information, see Listing DNS Views.)
• Click Toggle flat view to display a flat list of all the zones in the view.
• Click Toggle hierarchical view to display only the apex zones.
In the hierarchical view, you can see one entry for the host that represents the entire host object. In a host record, there
can be multiple DNS resource records (A, PTR, CNAME) and some DHCP data (fixed addresses) as well. In the flat
view, each of the DNS resource records in the host are listed separately.
For example, the host called server1.infoblox.com contains 2 A records and an ALIAS (which is a host naming
convention for CNAME records). If you view the infoblox.com zone using the hierarchical view option, you will see one
entry host for server1.infoblox.com. In the flat view, you will see three records (one for each IP address/A record, and one
host Alias for the CNAME). In the flat view, you cannot delete one piece of the host record. You can edit the host record
and you can remove information. Deleting host records deletes the entire host record only.
This panel displays the following information for each zone, by default:
• Name: The domain name of the zone.
• MS Sync Server: When a zone is served by multiple Microsoft servers, this column shows which Microsoft server
is actually performing the synchronization of that zone with the Grid.
• MS Zone Sync: Displays Yes if you have enabled zone synchronization, and displays No when the zone
synchronization is disabled. This column appears only when you have the Microsoft license installed.
• Grid Primary Server: The primary name server configured for an authoritative zone in the DNS view.
• Type: The zone type. Possible values are Authoritative, Forward, Stub and Delegation.
• Multi-master Zone: Indicates whether this zone has multiple primary name servers.
• Comment: Comments that were entered for the zone.
• Site: Values that were entered for this pre-defined attribute.
You can also display the following columns:
• Locked: Displays Yes when a zone is locked by an admin, and displays No when the zone is unlocked.
• Function: Indicates whether the zone is a forward-mapping, or an IPv4 or IPv6 reverse-mapping zone.
• ZSK rollover date: Displays the date when the ZSK is due for next rollover. The appliance performs a rollover
automatically at this time.
Note
Grid Manager does not generate an NS record when the DNS service for the member is disabled.
The performance of the following functions significantly improve when you assign an NS group to a zone instead of
specifying multiple name servers individually:
• Starting and Stopping the DNS service.
• Reparenting the zones after removing or restoring a zone.
• Modifying the zone data.
Note
Only superusers can create and manage name server groups
Note
If you apply a name server group to at least one zone or specify it as the default group, you cannot
rename or remove it. To rename or remove a group, you must first disassociate it from all zones and
unassign it as the default group.
Note
You will not be able to add a delegated name server group if DNS synchronization is enabled on any Microsoft
server configured in NIOS.
If you need to add a large number of A and PTR records, you can have the NIOS appliance add them as a group and
automatically assign host names based on a range of IP addresses and the host name format you specify. Such a group
of records is called a bulk host, which the appliance manages and displays as a single bulk host record.
This section provides general information about Infoblox host records and DNS resource records. The topics in this
section include:
If the bulk host uses the template -#2-#3-#4, the query returns:
foo-002-003-010.test.com foo-002-003-011.test.com
......
foo-002-003-020.test.com
foo-1-2-3-4 IN A 1.2.3.4
foo-1-2-3-5 IN A 1.2.3.5
Note
The NIOS appliance considers two bulk hosts that have the same prefix, start address, and end address as
duplicate hosts; even if they use different bulk host formats.
Rule Example
The suffix format cannot have more than four octets. $4-$5 is invalid.
The suffix format must contain at least the fourth octet. $4 is valid but $3 is invalid.
You must define at least one -$4 or #4.
The \ character is the designated escape character for For the IP address 10.19.32.133, the format #-#1-#2-#3-#4 expands to
the $, # and \ characters. #-010-019-032-133.
You cannot use the $ or # symbols as separators unless
you prefix them with an escape character \.
The bulk host name format must comply with its zone You cannot insert a bulk host name format -?-$4 in a zone that uses Allow
host name policy. Underscore as host name policy because the policy does not allow you to use the ?
character in the host name.
The bulk host name must comply with the maximum label The sum of the bulk host name prefix and suffix cannot be greater than 63
length. characters. When you enter a suffix format, the NIOS appliance determines the
length of the longest bulk host defined, and checks that the sum of the bulk host
prefix and suffix length does not exceed 63 characters; if it does, an error message
appears.
The NIOS appliance computes the maximum length of For the format string -$1-$2-$3-$4, the maximum length of the suffix is
the bulk host suffix by expanding the bulk host IP format -255-255-255-255; that is, 16 characters. Therefore, the maximum length of the host
using 255.255.255.255. prefix is 47 characters.
The bulk host name must not be the same as a CNAME/ If there is a CNAME record with alias foo-003-015, you cannot insert a bulk host foo/
DNAME. 1.2.3.10/1.2.3.20 using template #3#4 because
foo-003-015 is also one of the synthetic host names in the bulk host.
Each host name in the bulk host must be unique. You cannot insert a bulk host foo/1.2.3.10/1.2.4.20 using the template $4 because
the system resolves the host name foo-10 to both 1.2.3.10 and 1.2.4.10. To ensure
that the bulk host name is unique, use the template $3-$4.
You cannot insert a bulk host that violates the uniqueness If there is a bulk host foo/1.2.3.10/1.2.4.20 using the template
of two bulk hosts that have the same prefix and use the -$3-$4, you cannot insert another bulk host foo/1.3.4.10/1.3.5.20 using the same
same name format. template because the system resolves host name foo-4-15 to both 1.2.4.15 and
1.3.4.15. Instead, use the template
-$2-$3-$4 to ensure that the two bulk hosts are unique.
The appliance provides four predefined formats. You can define additional formats or change the default format at the
Grid level only. To define new bulk host name formats:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
2. Select the Host Naming tab of the Grid DNS Properties editor.
The Bulk Host Name Formats table displays four predefined name suffix formats. The following examples show
the host name that each format generates for the zone test.com:
Four Octets: $1-$2-$3-$4 (Default)—Generates foo-192-168-1-15.test.com. Three Octets: $2$3-$4—Generates
foo-168-1-15.test.com
Two Octets: -$3-$4—Generates foo-1-15.test.com One Octet: -$4—Generates foo-15.test.com
For the IP address 10.100.0.10, the format -$1$2-$3-$4 generates the host name suffix 10-100-0-10 . The format
#1#2-#3-#4 generates the host name suffix -010-100-000-010.
3. Click Add to enter the name and format of a new bulk host name format.
Managing A Records
An A (address) record is a DNS resource record that maps a domain name to an IPv4 address. To define a specific
name-to-address mapping, you can add an A record to a previously defined authoritative forward-mapping zone. If the
zone is associated with one or more networks, the IP address must belong to one of the associated networks. For
example, if the A record is in the corpxyz.com zone, which is associated with 10.1.0.0/16 network, then the IP addresses
of the A record must belong to the 10.1.0.0/16 network. For information about associating zones and networks, see
Associating Networks with Zones.
The appliance also supports wildcard A records. For example, you can use a wildcard A record in the corpxyz.com
domain to map queries for names such as www1.corpxyz.com, ftp.corpxyz.com, main.corpxyz.com, and so on to the IP
address of a public-facing web server. Note that wildcard names only apply when the domain name being queried does
not match any resource record.
NIOS allows superusers to add A records with a blank name. Limited-access users must have read/write permission to
Adding a blank A/AAAA record to add A records with a blank name. You can assign global permission for specific admin
groups and roles to allow limited-access users to add blank A records. For more information, see Administrative
Permissions for Adding Blank A or AAAA Records.
Note
If an A record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name field displays the record name in UTF-8 encoded format. For example, an A record with the
domain name 工作站 .test.com added through DDNS updates
displays \229\183\165\228\189\156\231\171\153.test.com in the Name field.
Modifying A Records
When you modify an A record, you can do the following:
• In the General tab, you can change the information you previously entered through the wizard.
• The Discovered Data tab displays discovered data, if any, for the record. For information, see Viewing Discovered
Data.
You can also enter or edit information in the TTL, Extensible Attributes, and Permissions tabs. For information on
modifying and deleting resource records, see Modifying, Disabling, and Deleting Host and Resource Records.
Managing NS Records
An NS record identifies an authoritative DNS server for a domain. Each authoritative DNS server must have an NS
record. Grid Manager automatically creates NS records when you assign a Grid member as the primary server for a zone
Adding NS Records
To add an NS record, perform the following steps:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Add -> Record -> Add NS
Record.
2. In the Add NS Record wizard, complete the following fields:
• Zone: The displayed zone name can either be the last selected zone or the zone from which you are adding the
NS record. If no zone name is displayed or if you want to specify a different zone, click Select Zone. When there
are multiple zones, Grid Manager displays the Zone Selector dialog box.
• DNS View: Displays the DNS view to which the selected zone belongs.
• Hostname Policy: Displays the host name policy of the selected zone.
• Name Server: Enter the host name that you want to configure as the name server for the zone. IDN is not
supported in this field. You can use the punycode representation of an IDN in this field.
• Click Next to enter IP addresses for the name server.
• In the Name Server Addresses panel, click the Add icon and complete the following fields:
• Address: Enter the IP address of the name server.
• Add PTR Record: This field displays Yes by default, enabling the automatic generation of a PTR record for
the IP address. You can select No to disable the generation of the PTR record.
• Click Next to define extensible attributes or save the configuration and click Restart if it appears at the top of the
screen.
Note
If an AAAA record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name field displays the record name in UTF-8 encoded format. For example, an AAAA record with
the domain name 工作站 .test.com added through DDNS updates displays
\229\183\165\228\189\156\231\171\153.test.com in the Name field.
Note
If a PTR record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name and Domain Name fields display the record name in UTF-8 encoded format. For example, a
PTR record with the domain name 工作站 .test.com added through DDNS updates
displays \229\183\165\228\189\156\231\171\153.test.com in the Name and Domain Name fields.
Note
When you add a PTR record to a forward-mapping zone, a message may appear on the top of the wizard if a
Grid member is configured to ignore DNS queries for PTR records in forward-mapping zones. Contact Infoblox
Technical Support for more information about this message.
You can use a wildcard MX record to forward mail to one mail exchanger. For example, you can use a wildcard MX
record in the corpxyz.com domain to forward mail for eng.corpxyz.com and sales.corpxyz.com to the same mail
exchange, as long as the domain names do not have any matching resource record. Wildcards only apply when the
domain name being queried does not match any record.
Note
If an MX record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Mail Destination and Mail Exchanger fields display the record name in UTF-8 encoded format. For
example, an MX record with the domain name 工作站 .test.com added through DDNS updates displays
\229\183\165\228\189\156\231\171\153.test.com in the Mail Destination and Mail Exchanger fields.
MX Records
Note
You must also create an A record for the host defined as a mail exchanger in an MX record.
Adding MX Records
To add an MX record from the Tasks Dashboard, see Add MX Record. You can also add MX records from the Data
Management tab -> DNS tab by clicking Add -> Record -> Add MX Record from the Toolbar.
Note
If an SRV record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name and SRV Target fields display the domain name in UTF-8 encoded format. For example, an
SRV record with the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Name and SRV Target fields.
Note
In addition, you need to define an A record mapping the canonical name of the host to its IP address.
Note
The appliance does not match the service and protocol names to exactly how they appear in the drop-down
lists. It only checks whether the first two parts of the names start with an underscore. If the first two parts do not
start with an underscore, the appliance assumes it is a free format. For example, _abc._xyz.name is considered
as RFC 2782 format even though _abc is not in the Service drop-down list, and _xyz is not in the Protocol drop-
down list. Grid Manger displays _abc in the Service field and _xyz in the Protocol field. On the other hand,
"abc.xyz.name" is considered as a free format because the first two parts do not start with underscores, and
Grid Manager displays this in its entirety in the Domain field.
You can also enter or edit information in the TTL, Extensible Attributes, and Permissions tabs. For information on
modifying and deleting resource records, see Modifying, Disabling, and Deleting Host and Resource Records.
Note
If a TXT record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Name field displays the domain name in UTF-8 encoded format. For example, a TXT record with
the domain name 电脑 .test.com added through DDNS updates displays \231\148\181\232\132\145.test.com in
the Name field.
SPF makes it easy for a domain to say, "I only send mail from these machines. If any other machine claims that I'm
sending mail from there, they're not valid." For example, when an AOL user sends mail to you, an email server that
belongs to AOL connects to an email server that belongs to you. AOL uses SPF to publish the addresses of its email
You can use TXT records to store SPF data that identifies what machines send mail from a domain. You can think of
these specialized TXT records as reverse MX records that e-mail servers can use to verify if a machine is a legitimate
sender of an e-mail.
SPF Record Examples
corpxyz.com. IN TXT "v=spf1 mx –all"
corpxyz.net. IN TXT "v=spf1 a:mail.corpxyz.com –all" corpxyz.net. IN TXT "v=spf1
include:corpxyz.com -all" corpxyz.net. IN TXT "v=spf1 mx -all exp=getlost.corpxyz.com"
corpxyz.com. IN TXT "v=spf1 include:corp200.com -all"
Note
If an SPF record goes beyond the BIND limit of 255 characters, Infoblox recommends that you break up the
record into two TXT records.
Note
When you select Strict format, Port and Protocol values are set to 443 (HTTPS) and _tcp, by default.
You can change these values. When you select Free format, you cannot edit the mentioned values.
• Name: Enter a name for the TLSA resource record. You can specify a name only when you select Free format.
• Select Zone: Click to select a zone. In NIOS 8.5, you must select only a signed zone to associate with a TLSA
resource record. In NIOS 8.5.1 or later, you can select a signed zone or an unsigned zone. For more information,
see Signing a Zone. Click Clear to clear the Name that you have entered.
• FQDN: This is displayed by default. You cannot modify the value. TLSA resource records are stored using the
domain name that you select. When you select Free format, name.domain is displayed as the FQDN. Example:
abc.example.com. When you select Strict format, _port._protocol.domain is displayed as the FQDN, where:
• _port indicates the port on which the TLS-based service is active.
• _protocol indicates the name of the transport protocol that you have selected.
Consider an example where you are the owner of the domain www.example.com and you have set the Port to
443(HTTPS) and Protocol to tcp , which indicates that the HTTP server is running TLS on port 443. To request
TLSA record for www.example.com, you must use __443._tcp. www.example.com. Similarly, to request a TLSA
resource record for an SMTP server running the STARTTLS protocol on port 25 at mail.example.com, you must
use _25._tcp.mail.example.com.
• DNS View: The DNS View associated with the selected DNS zone is displayed.
• Certificate Usage: Select a value from the drop-down list to indicate how the certificate or the public key
associated with the domain name is matched when the client queries for the domain name on the TLS server.
The values in the drop-down list are: PKIX-TA, PKIX-EE, DANE-TA, and DANE-EE.
• With PKIX-TA and PKIX-EE, you need additional Trust Anchors to validate peer certificate chains. These
Trust Anchors must be mutually trusted by both the TLS server and the client. For more information, refer
to RFC 6698 The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS)
Protocol: TLSA.
• When you select DANE-TA and DANE-EE, the TLSA records that you define using Grid Manager are
sufficient to verify the client's certificate chain and additional Trust Anchors are not required to
authenticate the public key or certificate data. For more information, refer to RFC 6698 The DNS-Based
Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA.
• Selector: Select a value from the drop-down list to indicate whether you are associating an entire certificate or
only the public key with the domain. When you select a value, it indicates which part of the TLS certificate
presented by the server is matched with the associated data. The values in the drop-down list are Full certificate
and Subject Public Key Info. NIOS builds a hexadecimal format for the entire certificate when you select Full
Note
When you enable threat protection on a member, you must configure either a pass rule or rate limiting rule for
CAA DNS resource record types. This is specific to record types that use threat protection rule templates to
allow incoming DNS queries for the respective CAA record. If you do not configure these rules, the threat
protection service that is running on the member blocks the DNS queries of the CAA record.
Note that the flags are unsigned integers between 0 and 255. Infoblox represents these integers in the
form of bits. When you select the checkbox for Bit 0 (Critical), the flag value is set to binary
10000000, which is decimal 128. Example: CAA 128 xyz “Unknown”.
Note
You can select only Bit 0 (Critical) as the flag value and the remaining checkboxes are reserved
for future use. The appliance displays a warning message when you select a checkbox other
than Bit 0 (Critical).
Note
Issue wild type takes precedence over Issue.
• Iodef: Select this to specify an email address or URL of the web service to report invalid certificate
requests or issued certificates that violate your CAA policy.
Infoblox allows you to enter a new CAA record type other than those displayed in the drop-down
list. The maximum length allowed is 255 characters.
• Certificate Authority: Indicates the CA that is authorized to issue a certificate for the domain. The
maximum length for certificate authority is 8192 characters. You can also specify the email address or the
URL to report CAA policy violation for the domain. This is valid for Iodef only. Infoblox recommends that
you add either the http:// or https:// prefix to the domain name. You must explicitly add "mailto" when
specifying the email address. For example, "mailto:admin@example.com".
• Comment: Optionally, enter a descriptive comment for the CAA record.
• Disable: Clear the checkbox to enable the record. Select the checkbox to disable it.
3. Save the configuration or click Next to define extensible attributes. For information, see Managing Extensible
Attributes.
4. Save the configuration or click Next to schedule this task. Click Now in the Schedule Change panel to
immediately execute this task or click Later and specify a date, time, and time zone. For information about how to
schedule a task, see Scheduling Tasks.
Note
Infoblox does not support shared CAA records and does not provide Windows 2016 MS Server support for CAA
records.
Note
If a CNAME record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the ALIAS and Canonical Name fields display the domain name in UTF-8 encoded format. For
example, a CNAME record with the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Canonical Name and ALIAS fields.
Note
A CNAME record does not have to be in the same zone as the canonical name to which it maps. In addition, a
CNAME record cannot have the same name as any other record in that zone.
To add a CNAME record to a forward-mapping zone from the Tasks Dashboard, see Add CNAME Record. You can also
add CNAME records from the Data Management tab -> DNS tab by clicking Add -> Record -> Add CNAME Record from
the Toolbar.
You add CNAME records in the parent zone on your name server. The ALIASes defined in those CNAME records point
to the addresses in PTR records in the child zone delegated to the other server.
When you define a reverse-mapping zone that has a netmask from /25 (255.255.255.128) to /31 (255.255.255.254), you
must include an RFC 2317 prefix. This prefix can be anything, from the address range (examples: 0-127, 0/127) to
descriptions (examples: first-network, customer1). On a NIOS appliance, creating such a reverse-mapping zone
automatically generates all the necessary CNAME records. However, if you need to add them manually to a parent zone
that has a child zone with fewer than 255 addresses.
Note
If a DNAME record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the ALIAS and Target fields display the domain name in UTF-8 encoded format. For example, a
DNAME record with the domain name 电脑 .test.com added through DDNS updates
displays \231\148\181\232\132\145.test.com in the ALIAS and Target fields.
When a request arrives for a domain name to which a DNAME record applies, the NIOS appliance responds with a
CNAME record that it dynamically creates based on the DNAME definition. For example, if there is a DNAME record:
corpxyz.com.
DNAME corp200.com.
and a request arrives for server1.corpxyz.com, the NIOS appliance responds with the following CNAME record:
server1.corpxyz.com.
CNAME server1.corp200.com.
If responding to a name server running BIND 9.0.0 or later, the NIOS appliance also includes the DNAME record in its
response, so that name server can also create its own CNAME records based on the cached DNAME definition.
The following are two common scenarios for using DNAME records:
• One company buys another and wants people using both the old and new name spaces to reach the same hosts.
• A virtual Web hosting operation offers different "vanity" domain names that point to the same server or servers.
There are some restrictions that apply to the use of DNAME records:
• You cannot have a CNAME record and a DNAME record for the same subdomain.
In the case of a domain structure consisting of a single domain (no subdomains), adding a DNAME record redirects
queries for every name in the domain to the target domain, as shown in the following figure.
Adding a DNAME Record for a Single Domain
When using a DNAME record, you must copy the resource records for the source domain to the zone containing the
target domain, so that the DNS server providing service for the target domain can respond to the redirected queries.
After copying these records to the zone containing the corpxyz.corp200.com domain, delete them from the zone
containing the corpxyz.com domain.
If DNS service for the source and target domain names is on different name servers, you can import the zone data from
the NIOS appliance hosting the source domain to the appliance hosting the target domain. For information about this
procedure, see Importing Zone Data.
If DNS service for the source and target domain names is on the same name server and the parent for the target domain
is on a different server, you can delegate DNS services for the target domain name to the name server that provided—
and continues to provide—DNS service for the source domain name (see the figure below). By doing this, you can
continue to maintain resource records on the same server, potentially simplifying the continuation of DNS administration.
Making the Target Zone a Delegated Zone
Note
This is a conceptual representation of domain name mapping and depicts the resulting hierarchical relationship
of corp200.com as the parent zone for corpxyz.corp200.com. The hosts are not physically relocated.
Note
Because you can only specify the records by type, not individually, you might have to copy some
records that you do not want and then delete them from the corpxyz.corp200.com zone.
3. In the corpxyz.com zone, delete all the resource records for the domain or subdomain to which the DNAME
record is going to apply.
4. Add a DNAME record to the corpxyz.com zone specifying "corpxyz.com" as the domain and
"corpxyz.corp200.com" as the target domain. Adding a DNAME record is explained in the next section.
5. On the ns1.corp200.com name server, add corpxyz.corp200.com as a delegated zone and specify
ns1.corpxyz.com as the name server for it. See Configuring a Delegation.
Note
If you specify a subdomain in the Domain Name field when configuring a DNAME record and the subdomain is
also a subzone, the DNAME record appears in the list view for the subzone, not in the list view for the parent
zone selected in the process of adding the record.
• ALIAS: If Grid Manager displays a zone name, enter the name of a subdomain here. If you are adding a DNAME
record for the entire zone, leave this field empty. This field is for adding a DNAME record for a subdomain within
the selected zone. The displayed zone name can either be the last selected zone or the zone from which you are
adding the CNAME record. If no zone name is displayed or if you want to specify a different zone, click Select
Zone. When there are multiple zones, Grid Manager displays the Zone Selector dialog box. Click a zone name in
the dialog box, and then enter the name of a subdomain.
• Target: Enter the domain name to which you want to map all the domain names specified in the ALIAS field.
• Comment: Enter identifying text for this record, such as a meaningful note or reminder.
• Disable: Clear the checkbox to enable the record. Select the checkbox to disable it.
• Save the configuration or click Next to define extensible attributes. For information, see Using Extensible
Attributes.
• Click Restart if it appears at the top of the screen.
RFC 2672, Non-Terminal DNS Name Redirection, includes an example showing the delegation of a subzone for an
address space with a 22-bit netmask inside a zone for a larger space with a 16-bit netmask:
8/22 NS ns.slash-22-holder.example.
8 DNAME 8.8/22
9 DNAME 9.8/22
10 DNAME 10.8/22
11 DNAME 11.8/22
The reverse-mapping zone 0.192.in-addr.arpa. applies to the address space 192.0.0.0/16. Within this zone is a subzone
and subdomain with the abbreviated name 8/22. (Its full name is 8/22.0.192.in-addr.arpa.) This subdomain contains its
own subdomains corresponding to the 1024 addresses in the 192.0.8.0/22 subnet:
• Subdomain 8/22 (8/22.0.192.in-addr.arpa)
• Subdomain 8.8/22 for addresses 192.0.8.0 – 192.0.8.255 (or 192.0.8.0/24)
• Subdomain 9.8/22 for addresses 192.0.9.0 – 192.0.9.255 (or 192.0.9.0/24)
• Subdomain 10.8/22 for addresses 192.0.10.0 – 192.0.10.255 (or 192.0.10.0/24)
• Subdomain 11.8/22 for addresses 192.0.11.0 – 192.0.11.255 (or 192.0.11.0/24)
The NS record delegates authority for the reverse-mapping subzone 8/22 to the DNS server ns.slash-22-holder.example.
Finally, the DNAME records provide ALIASes mapping domain names that correspond to the 192.0.8.0/24, 192.0.9.0/24,
192.0.10.0/24, and 192.0.11.0/24 subnets to the respective subdomains 8.8/22, 9.8/22, 10.8/22, and 11.8/22 in the
8/22.0.192.in-addr.arpa subzone.
Note
NIOS appliances support DNAME records in reverse-mapping zones that map addresses to target zones with a
classless address space larger than a class C subnet. However, NIOS appliances do not support such target
zones.
You might also use DNAME records if you have a number of multihomed appliances whose IP addresses must be
mapped to a single set of domain names. An example of this is shown in the below figure.
DNAME Records to Simplify DNS for Multihomed Appliances
Note
• If you specify a subdomain in the Domain Name field when configuring a DNAME record and the
subdomain is also a subzone, the DNAME record appears in the list view for the subzone, not in
the list view for the parent zone selected in the process of adding the record.
• ALIAS: If Grid Manager displays a zone name, enter the name of a subdomain here. If you are adding a
DNAME record for the entire zone, leave this field empty. This field is for adding a DNAME record for a
subdomain within the selected zone. The displayed zone name can either be the last selected zone or the
zone from which you are adding the CNAME record. If no zone name is displayed or if you want to specify
a different zone, click Select Zone. When there are multiple zones, Grid Manager displays the Zone
Selector dialog box. Click a zone name in the dialog box, and then enter the name of a subdomain.
• Target: Type the name of the reverse-mapping zone to which you want to map all the addresses specified
in the Domain Name field.
• Comments: Enter identifying text for this record, such as a meaningful note or reminder.
• Disable: Clear the checkbox to enable the record. Select the checkbox to disable it.
3. Save the configuration or click Next to define extensible attributes. For information, see Using Extensible
Attributes.
4. Click Restart if it appears at the top of the screen.
The DNS client then examines the fields in the NAPTR record as follows:
• If a DNS client receives multiple NAPTR records for a domain name, the value in the Order field determines
which record is processed first. It processes the record with the lowest value first.
• The DNS client uses the Preference value when the Order values are the same. Similar to the Preference field in
MX records, this value indicates which NAPTR record the DNS client should process first when the records have
the same Order value. It processes the record with the lowest value first.
In the example, the DNS client ignores the Order and Preference values because it received only one NAPTR
record.
• The Flag field indicates whether the current lookup is terminal; that is, the current NAPTR record is the last
NAPTR record for the lookup. It also provides information about the next step in the lookup process. The flags
that are currently used are:
U: Indicates that the output maps to a URI (Uniform Record Identifier).
S: Indicates that the output is a domain name that has at least one SRV record. The DNS client must then
send a query for the SRV record of the resulting domain name.
A: Indicates that the output is a domain name that has at least one A or AAAA record. The DNS client must
Note
If a NAPTR record with the domain name in its native characters is added to the Infoblox Grid through DDNS
updates, the Domain and Replacement fields display the domain name in UTF-8 encoded format. For example,
a NAPTR record with the domain name 电脑 .test.com added through DDNS updates displays
\231\148\181\232\132\145.test.com in the Domain and Replacement fields.
Note
Irrespective of the field type you select, there is an implementation-specific limitation on the
length of the record data. Specifically, the data is internally converted to a textual form that
appears in a standard DNS master file, and it is rejected if the converted text exceeds 8192
bytes. Although unlikely, some extremely large data can be rejected because of this limitation.
4. Click Add. The record details are added to the table below.
5. In the Comment field, optionally enter a descriptive comment for the record.
6. Clear the Disable checkbox to enable the record. Select the checkbox to disable it.
7. Save the configuration or click Next to define extensible attributes. For information, see Using Extensible
Attributes.
8. Click Save & Close.
Prohibited Records
The following record types are prohibited as part of a zone, irrespective of whether or not they are defined as Unknown
records:
• Type 0: Do not allocate it for ordinary use.
• Type 41 (OPT): Pseudo type
• Types 128-255: Meta type
• Types 55555, 55556, 55557, 65432, 65433: Used internally in NIOS
• Type 65533: Private use
• Type 3 (MD) and 4 (MF): Obsolete type
Note
The DNS record that is obscured by an LBDN record is indicated by a strikethrough, for example, an
obscured A record appears as A Record in Grid Manager.
Note
You cannot delete automatically-generated records, such as NS records and SOA records.
Note
DDNS updates is not supported by IPv6-only appliances.
To set up one or more NIOS appliances for DDNS updates originating from DHCP, you must configure at least one
DHCP server and one DNS server. These servers might be on the same appliance or on separate appliances. Three
possible arrangements for a DHCP server to update a DNS server are shown in the figure below.
Relationship of DHCP and DNS Servers for DDNS Updates
Note
For information about zone transfers, see Enabling Zone Transfers.
You can configure the DHCP and DNS settings for DDNS at the Grid level, member level, and network and zone level.
By applying the inheritance model in the NIOS appliance, settings made at the Grid level apply to all members in the
Grid. Settings you make at the member level apply to all networks and zones configured on that member. Settings made
at the network and zone level apply specifically to just that network and zone. When configuring independent appliances
(that is, appliances that are not in a Grid), do not use the member-level settings. Instead, configure DDNS updates at the
Grid level to apply to all zones and, if necessary, override the Grid-level settings on a per zone basis.
Note
Whether you deploy NIOS appliance in a Grid or independently, they send updates to UDP port 53. Grid
members do not send updates through a VPN tunnel; however, Grid members do authenticate updates
between each other using TSIG (transaction signatures) based on an internal TSIG key.
Note
When setting properties for DHCP objects other than the Grid, you must click Override and
select Enable DDNS updates for the DDNS settings to take effect. When turning on DDNS
updates, first verify if option 81 has been enabled and whether DNS is being updated. If DNS is
being updated, even if the DNS zone targets are not in the Grid, select Option 81 support and
the correct suboption. For more information, see Enabling FQDN Option Support.
When the Enable DDNS Updates checkbox is not selected, the default behaviour is to allow the
client to update DNS.
When the Enable DDNS Updates checkbox is selected, the default behaviour is to prevent
DDNS updates from the client.
Note
In a dual mode Grid, if IPv6 DDNS updates is enabled at the Grid level, then when you join an IPv6 Grid
member to the Grid, IPv6 DDNS updates is automatically disabled for the Grid member.
• DDNS domain name: Specify the domain name of the network that the appliance uses to update DNS.
For IPv4 clients, you can specify this at the network, network template, range, and range template levels.
For IPv6 clients, you can specify this at the Grid, member, network, shared network, and network template
levels.
• DDNS Update TTL: You can set the TTL used for A or AAAA and PTR records updated by the DHCP
server. The default is shown as zero. If you do not enter a value here, the appliance by default sets the
TTL to half of the DHCP lease time with a maximum of 3600 seconds. For example, a lease time of 1800
seconds results in a TTL of 900 seconds, and a lease time of 86400 seconds results in a TTL of 3600
seconds. For information about how to set the lease time, see Defining Lease Times.
• DDNS Update Method: Select the method used by the DHCP server to send DDNS updates. You can
select either Interim or Standard from the drop-down list. The default is Interim. When you select Interim,
TXT record will be created for DDNS updates and when you select Standard, DHCID record will be
created for DDNS updates. But in the IPv4 DDNS -> Advanced tab or the IPv6 DDNS -> Advanced tab, if
you have selected No TXT Record mode for the DHCP server to use when handling DNS updates, then
TXT record or DHCID record is not created for DDNS updates.
If you change the DDNS update method from Interim to Standard or vice versa, then the DHCP server
changes the DHCID type used from TXT record to DHCID record or vice versa as the leases are
renewed.
This is supported for clients that acquire both IPv4 and IPv6 leases. Infoblox recommends you to
configure different DDNS update method for IPV4 leases and IPv6 leases, Interim for IPv4 lease and
Standard for IPv6 lease.
• Update DNS on DHCP Lease Renewal: Select this checkbox to enable the appliance to update DNS
when a DHCP lease is renewed.
3. Save the configuration and click Restart if it appears at the top of the screen.
For DNS zones that have multiple primary servers, you can define a primary name server to be used as the default
primary server when performing DDNS updates from the appliance. Note that you cannot configure an external primary
as the default primary. For more information, see Defining the Default Primary for DDNS Updates to Zones with Multiple
Primaries.
Defining the Default Primary for DDNS Updates to Zones with Multiple Primaries
If you have configured multiple primary servers for an authoritative zone, you can define the default primary that the
appliance uses to perform DDNS updates for the zone. Note that you can configure a Grid primary, but not an external
primary, as the default primary. If you do not configure a default primary, the Grid Master becomes the default primary for
the zones that it serves. Otherwise, the appliance selects a primary server that serves the zone as the default primary.
For external zones that have multiple primaries, the first external primary server becomes the default primary.
Configuring a default primary for DDNS updates is useful when you have DHCP members that span across different
locations. Performing DDNS updates becomes more efficient when you configure a default primary that is close in
proximity to the DHCP member. For example, zone corpxyz.com has two primaries (usa.corpxyz.com and
japan.corpxyz.com) serving two locations (USA and Japan). Service performance is faster when you select
usa.corpxyz.com as the default primary for DDNS updates in the USA region and japan.corpxyz.com as the default
primary for the Japan region.
When you configure a preferred or default primary server for DDNS updates to a zone that has multiple primaries, ensure
that the following are in place:
• The zone that you select contains multiple primary servers.
• The primary server has DNS service enabled and is authoritative for the zone.
• The appliance has DHCP service enabled.
Note
You can define the default primary for the Grid and override the setting at the member level, and you must
restart service for the configuration to take effect. Primary selection is performed at service restart, not at
runtime.
Note
If you enable the policy at the Grid level, you can modify all information, including the policy
name. If you enable the policy at the member level, you can modify any information, except for
the policy name.
However, your DNS configuration might require that the NIOS appliance handle DNS record updates differently than
described in draft-ietf-dhc-dhcp-dns-12.txt. Your specific requirements might benefit from less-stringent verification of the
DHCID, or might require skipping verification entirely. Verification checks might cause complications in some specific
cases described below:
• Mobility: The TXT record is based on the DHCID unique to each client and is usually based on the MAC address
or DUID of the interface. Devices such as laptops that connect to both wired and wireless networks have different
MAC addresses or DUIDs and different DHCID values for each interface. In this scenario, after either one of the
network interfaces inserts a DNS record, updates are allowed from that interface only. This results in a disruption
of service for DDNS updates when roaming between wired and wireless networks.
• Migration: The second problem occurs during a migration from non-ISC based systems to ISC systems. For
example, if the user is migrating from a Microsoft-based system, the clients have A or AAAA and PTR records in
the DDNS updates but no TXT records. As a result, new DDNS updates fail after the migration.
• Mixed Environments: The final problem occurs in mixed ISC and non-ISC environments. For example, assume
that both Microsoft and ISC DHCP servers update DNS records on the appliance. In a mixed environment, since
the Microsoft DHCP server does not insert the TXT records, DDNS updates from ISC-based systems fail while
updates from the Microsoft DHCP server are committed into the database. This behavior is applicable only when
you select Standard ISC and Check TXT only DDNS update verification modes.
The NIOS appliance offers four modes to handle DDNS updates as described in DDNS Update Verification Mode :
DDNS Update Verification Mode
Mode If a Record at Lease Then TXT Record Lease Grant Action Lease Expire Action
Grant at Lease Grant
Standard ISC Exists Must match Delete A or AAAA, TXT if exists Delete PTR
Add A or AAAA Add PTR Delete A or AAAA, TXT if TXT
matches and no other A or AAAA
RRs
Check TXT only Exists Must exist Delete A or AAAA, TXT Delete PTR
Add A or AAAA, TXT Delete A or AAAA if TXT exists and
Add PTR no other A or AAAA RRs
ISC Transitional Exists No check Delete A or AAAA, TXT if exists Delete PTR
Add A or AAAA, TXT Delete A or AAAA, TXT if TXT
Add PTR matches and no other A or AAAA
RRs
No TXT record Exists No check Delete A or AAAA Add A or Delete PTR, A or AAAA
AAAA Add PTR
Depending on your expected usage, you must carefully consider the various options for update verification. The following
section illustrates recommendations for each verification option:
• Standard ISC: This method is the most stringent option for verification of updates. This is the default.
• ISC Transitional: This method is useful during migrations from systems that do not support the TXT record to
systems that are ISC-based.
• Check TXT only: This method is useful for the roaming laptop scenario. The NIOS appliance checks that a TXT
record exists, but does not check the value of the TXT record.
• No TXT record: This method should be used with caution because anyone can send DDNS updates and
overwrite records. This method is useful when both ISC and non-ISC-based DHCP servers and clients are
updating the same zone. Infoblox recommends that you allocate a DNS zone for this authentication method, as a
precaution.
Note
In certain situations, when a DHCP lease expires, the DHCP server might remove the TXT record even
if there is no A or AAAA record.
You can enable this feature at the Grid level. To configure TXT record handling on the DHCP server:
1. From the Data Management tab, select the DHCP tab, expand the Toolbar and click Grid DHCP Properties.
2. In the IPv4 DDNS -> Advanced tab or the IPv6 DDNS -> Advanced tab, select one of the following from the TXT
(DHCID) Record Handling drop-down list:
• Check Only: Select this checkbox to enable minimal checking of DDNS updates. Specifically, A or AAAA
records are modified only if a TXT record exists. The NIOS appliance checks that a TXT record exists, but
does not check its value.
• ISC: Select this checkbox to enable standard ISC (Internet Systems Consortium) handling for DDNS
updates. Specifically, A or AAAA records are modified or deleted only if the TXT records match. This
option is the default setting on the appliance.
• ISC Transitional: Select this checkbox to enable less stringent handling of DDNS updates. Specifically, the
NIOS appliance enables you to add or modify A or AAAA records whether or not TXT records exist. It
checks whether a TXT record exists and then processes the update. If the appliance does not find a TXT
record, it adds the record.
• No TXT Record: Select this checkbox to disable TXT record checking. Specifically, A or AAAA records are
added, modified, or deleted whether or not the TXT records match. No TXT records are added, and
existing TXT records are ignored.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
Whether you deploy NIOS appliances in a Grid or independently, they send updates to UDP port 53. Grid
members do not send updates through a VPN tunnel. Grid members do, however, authenticate updates
between them using TSIG (transaction signatures) based on an internal TSIG key.
Note
Ensure that you understand how the appliance handles match lists before you specify the list of IP
sources for DDNS updates, as described in You can use the following OpenStack cloud-
init template to configure an IB-V815 as a Grid Master.
Note
You must enable GSS-TSIG signed updates to receive DDNS updates from TSIG
key based ACEs. For information about how to enable this, see Accepting GSS-
TSIG Updates.
• Any Address/Network: Select this to receive DDNS updates from any IP addresses.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the
Create new named ACL icon and enter a name in the Convert to Named ACL dialog box.
The appliance creates a new named ACL and adds it to the Named ACL panel. Note that
the ACEs you configure for this operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs
for deletion.
• Allow GSS-TSIG signed updates: This checkbox is selected only if you have enabled GSS-TSIG signed
updates.
4. Optionally, you can:
• Modify an item on the list by selecting it and clicking the Edit icon.
• Remove an item from the list by selecting it and clicking the Delete icon.
• Move an item up or down the list. Select it and drag it to its new position, or click the up or down arrow.
The appliance applies permissions to items in the order they are listed.
5. Save the configuration.
Forwarding Updates
When a secondary DNS server receives DDNS updates, it must forward the updates to the primary server because it
cannot update zone data itself. In such situations, you must enable the secondary server to receive updates from the
DHCP server, and then forward them to the primary DNS server.
To configure the secondary server to accept and forward updates for all zones:
1. Grid: From the Data Management tab, select the DNS tab, expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the DNS tab and click the Members tab -> member checkbox ->
Edit icon.
Zones: From the Data Management tab, select the DNS tab and click the Zones tab-> dns_view -> zone
checkbox -> Edit icon.
To override an inherited property, click Override next to it and complete the appropriate fields.
2. In the editor, click Toggle Advanced Mode.
Note
You must enable GSS-TSIG signed updates to receive DDNS updates from TSIG
key based ACEs. For information about how to enable this, see Accepting GSS-
TSIG Updates.
• Any Address/Network: Select to allow or disallow the appliance to receive DDNS updates from
any IP address.
After you have added access control entries, you can do the following:
• Select the ACEs that you want to consolidate and put into a new named ACL. Click the
Create new named ACL icon and enter a name in the Convert to NamedACL dialog box.
The appliance creates a new named ACL and adds it to the Named ACL panel. Note that
the ACEs you configure for this operation stay intact.
• Reorder the list of ACEs using the up and down arrows next to the table.
• Select an ACE and click the Edit icon to modify the entry.
• Select an ACE and click the Delete icon to delete the entry. You can select multiple ACEs
for deletion.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
For information about GSS-TSIG,
see RFC 3645, Generic Security Service Algorithm for Secret Key Transaction Authentication for DNS (GSS-
TSIG).
A NIOS appliance can use GSS-TSIG authentication for DDNS updates for either one of the following:
• A NIOS appliance serving DHCP can send GSS-TSIG authenticated DDNS updates to a DNS server in an AD
domain or multiple AD domains whose domain controller is running Windows Server 2003, Windows Server
2008, Windows Server 2008 R2, Windows Server 2012, Windows Server 2012 R2, Windows Server 2016 or
Windows Server 2019. The DNS server can be in the same AD domain as the DHCP server or in a different
domain.
• For information about sending secure DDNS updates to a DNS server in the same domain, see Sending
Secure DDNS Updates to a DNS Server in the Same Domain.
• For information about sending secure DDNS updates to a DNS server in a different domain, see Sending
Secure DDNS Updates to a DNS Server in Another Domain.
• A NIOS appliance serving DNS can accept GSS-TSIG authenticated DDNS updates from DHCP clients and
servers in an AD domain or multiple AD domains whose domain controller is running Windows 2000 Server,
Windows Server 2003, Windows Server 2008, Windows Server 2008 R2, Windows Server 2012, Windows Server
2012 R2, Windows Server 2016 or Windows Server 2019.
• For information, see Accepting GSS-TSIG-Authenticated Updates.
Note
A NIOS appliance cannot support both of these features at the same time.
Infoblox recommends restarting the DHCP service on NIOS to avoid any update failures, if the encryption key type is
changed on the Microsoft server.
The following provides information about the traffic flow between the appliance and the KDC:
• Client uses keytab to get TGT for principal from KDC (AS-REQ/AS-REP).
• Client uses TGT to get session ticket from KDC (TGS-REQ/TGS-REP).
• Client uses session ticket to acquire TKEY from DNS server (TKEY/TKEY).
• Client uses TKEY to sign DNS updates (DNS-TSIG/DNS-TSIG).
The DNS server authenticates into the domain when the keytab file is generated on the KDC and its SPN (Service
Principal Name) is mapped to an account. The server's private key is known to itself and to the KDC. The KDC generates
the ticket and the DNS server allows the update.
Note the following when you upload multiple keytab files on the appliance:
• NIOS displays an error message and discards the keytab file if the file does not have a recognizable key, SPN,
version or encryption type, and it saves the error message in the syslog.
• NIOS considers duplicate keys as invalid keys if the keys have the same SPN, version, and encryption type.
• If NIOS encounters an invalid key during an upload, it will not upload the other keys in the keytab and the
operation fails. NIOS saves the warning and error message in the syslog and in Grid Manager.
Note
For GSS-TSIG authentication to work properly, the system clock times of the Infoblox DHCP server, AD domain
controller and DNS server must be synchronized. One approach is to use NTP and synchronize all three
devices with the same NTP servers.
To use an AD domain controller as a Kerberos Key Distribution Center, complete the following tasks on an AD/Kerberos
server:
1. Add a user account for the NIOS appliance to the AD domain controller. For information, see Creating an AD User
Account.
2. Generate the keytab file for the NIOS appliance account and export it from the AD domain controller to a local
directory on your management system. For information, see Generating and Exporting the Keytab File.
To configure a NIOS appliance to support AD and send GSS-TSIG secure DDNS updates to a DNS server, complete the
following tasks on a NIOS appliance:
1. Import the keytab file from your management system to the appliance and enable GSS-TSIG dynamic updates at
the Grid or member level. For information, see Enabling GSS-TSIG Authentication for DHCP.
2. Configure the appliance to send GSS-TSIG dynamic updates to forward-mapping and optionally, reverse-
mapping zones on the DNS server. For information, see Managing GSS-TSIG keys.
Note
The name that you enter in the User logon name is the name that you later use when exporting the keytab file.
This is also the principal name. The text in the First name, Initials, Last name, and Full name fields is irrelevant
to this task.
The AD domain controller automatically creates a Kerberos account for this user. Note the following:
• If you define an expiration date for the user account and you later create a new account when the first one
expires, the keytab for the corresponding Kerberos account changes. At that point, you must update the keytab
file on the NIOS appliance (see Generating and Exporting the Keytab File and Enabling GSS-TSIG Authentication
for DHCP). Optionally, if your security policy allows it, you can set the user account for the NIOS appliance so that
it never expires.
• If the AD domain controller is running Windows Server 2003, the user account must have the DES encryption
type enabled. You can enable this either in the Account tab of the AD domain controller when you create the user
account or by specifying +DesOnly when you use the Ktpass tool to generate the keytab file. For instructions, see
the next section, Generating and Exporting the Keytab File.
• The newly created AD user account must be a member of the DnsUpdateProxy group or an account that allows it
to update records that have potentially been added by another DHCP server, such as DNS Admins.
Note
The keytab file contains highly sensitive data for the NIOS appliance account. Ensure that you store and
transport its contents securely.
Infoblox strongly recommends the following encryption types for compatibility purposes:
Microsoft Windows 2008 and higher Specify /crypto RC4-HMAC-NT as the export keytab.
• You can also use AES, but RC4 is set by default for
Windows 2008 servers.
• Infoblox recommends that you do not use DES, but it is
supported if you need it for compatibility with non-
Windows systems.
Note
The values are case-sensitive.
where:
• service_name/instance: The AD user name for the NIOS appliance and a character string. The AD user
name must match the user logon name on the AD domain controller.
• REALM: The Kerberos realm in uppercase. It must match the realm (or domain name) specified in the –
mapuser option.
For example:
Note
The values are case-sensitive.
Note
Windows Server 2003 does not support AES encryption.
After you execute the command to generate the keytab file, the AD domain controller displays a series of messages
similar to the following to confirm that it successfully generated the keytab file:
Targeting domain controller: ibtest-xu5nxd56.corpxyz.local
Key created.
keylength 8 (0xbae610f11552c80b)
Example:
ktpass -princ DNS/ns1.corpxyz.com@GSS.LOCAL -mapuser jsmith@GSS.LOCAL -pass 37Le37 -out
ns1.keytab -ptype krb5_nt_principal -crypto RC4-HMAC-NT
where:
-princ = Kerberos principal. Note that this parameter is case sensitive. Specifies the principal name for the host or service
in this format: DNS/ns1.corpxyz.com@GSS.LOCAL
• DNS = Service name in uppercase format.
• ns1.corpxyz.com = Instance in FQDN (fully-qualified domain name) format; this is the same as the DNS name of
the NIOS appliance.
• GSS.LOCAL = The Kerberos realm in uppercase format. This must be the same as the AD domain name.
-mapuser = Maps the Kerberos principal name to the AD user account. If you omit the account name, mapping is deleted
from the specified principal. You can use ksetup without any parameters or arguments to see the current mapped
settings and the default realm. Example: ksetup /mapuser <Principal> <Account>. To create an AD user account, see
Creating an AD User Account.
• jsmith = The AD user name for the NIOS appliance.
• GSS.LOCAL = The Kerberos realm in uppercase. The realm (or domain name) must be the same as that
specified in the -princ option.
Note
You must not use +Desonly with /crypto all or other non-DES encryption types.
• +setpass = Sets a new AD user account password. This is required if the +DesOnly option is specified. When you
use this encryption type, you must change the user's password. Otherwise, the ticket issued for the principal
becomes unusable.
After you execute the command to generate the keytab file, the AD domain controller displays a series of messages
similar to the following to confirm that it successfully generated the keytab file:
Targeting domain controller: qacert.test.local
Key created.
keylength 32 (0xea8675d7abf13fd760a744088642fb917ceb6c9d267f5c54e595597846f06407)
Key created.
keylength 32 (0xea8675d7abf13fd760a744088642fb917ceb6c9d267f5c54e595597846f06407)
Key created.
keylength 32 (0xea8675d7abf13fd760a744088642fb917ceb6c9d267f5c54e595597846f06407)
dhcpd: Security context established with server 10.34.123.4 for principal[ jdoe/
anywhere@corpxyz.LOCAL|mailto:jdoe/anywhere@corpxyz.LOCAL] (good for 568s).
After you configure the Infoblox DHCP server and AD domain controller, the following occurs:
1. Kerberos – In Same Domain
The Infoblox DHCP server uses the TGT (ticket-granting ticket) from the AD/Kerberos server,
ad.child.corpxyz.com, to request a service ticket for DNS/ns1.corpxyz.com@corpxyz.COM. The Kerberos server
replies with a referral ticket for the Kerberos server in the corpxyz.com domain, ad.corpxyz.com.
2. Kerberos — In the Other Domain
The Infoblox DHCP server uses the referral ticket and requests a service ticket from ad.corpxyz.com for DNS/
ns1.corpxyz.com@corpxyz.COM. The Kerberos server replies with a service ticket for DNS/
ns1.corpxyz.com@corpxyz.COM.
3. TKEY Negotiations (GSS Handshake)
The Infoblox DHCP server sends the DNS server ns1.corpxyz.com a TKEY (transaction key) request, which
includes the service ticket. The DNS server replies with a TKEY response that includes a TSIG (transaction
Configuration Example
Following are the steps to configure the example shown in the figure Sending Secure DDNS Updates to a DNS Server in
Another Domain:
On the Active Directory domain controller:
1. Create a user account for the Infoblox DHCP server. The user account is ibdhcp.
2. Generate the keytab file and export it to your management system. If the domain
controller is running Windows Server 2003:
ktpass -princ ibdhcp/ib.child.corpxyz.com@CHILD.corpxyz.COM -mapuser
ibdhcp@CHILD.corpxyz.COM -pass infoblox -out ibdhcp.ktb -ptype krb5_nt_principal
-crypto des-cbc-md5 +desonly
Scheduled Upgrade
A scheduled upgrade with one or more keys in the keytab files that you have uploaded will operate the same as prior to
upgrade. NIOS will parse and extract keys from the uploaded keytab file. NIOS automatically assigns these keys to the
DNS member, DHCP member, Grid DHCP or Grid DNS to which the keytab file was uploaded before the upgrade. You
can assign these keys to Grid members after the upgrade is complete.
NIOS does not display an error message if the keys do not have an SPN with the DNS prefix, but it will record a warning
message in the syslog.
Logging Messages
The appliance saves the audit log entries for insert and delete operations. If you upload keys with encryption types other
than the ones that NIOS supports, the appliance displays a warning message in Grid Manager and in the syslog and also
it displays the encryption type as *other* in Grid Manager and in the syslog. For more information about the syslog, see
Using a Syslog Server.
The appliance generates an audit log when you upload a key, assign the key to a member, remove the key associated
with a member or delete a key. The audit log entries are based on each key that you have uploaded. For example, NIOS
saves the following in the audit log when you upload a key:
2014-02-14 18:17:30.531Z \[admin\]: imported DNS Kerberos key for
Configuring AD Support
You can configure a forward-mapping zone to support AD from the Active Directory wizard or from the Active Directory
tab of the Authoritative Zone editor. This section describes both methods.
To configure AD support using the Active Directory wizard:
1. From the Data Management tab, select the DNS tab, expand the Toolbar and click Configure Active Directory.
Note that from the Zones tab, you must select a zone before you click Configure Active Directory.
2. In the Active Directory wizard, complete the following, and then click Next:
Note
For explanations of the alphanumerically notated steps in Figure 21.10, see the section following the
illustration.
Note
Computer accounts have passwords that the AD domain controller and computer maintain
automatically. There are two passwords for each computer: a computer account password and a
private key password. By default, both passwords are automatically changed every 30 days.
Note
For GSS-TSIG authentication to work properly, the system clock times of the Infoblox DHCP server, AD domain
controller and DNS server must be synchronized. One approach is to use NTP and synchronize all three
devices with the same NTP servers.
Note
The name you enter in the User logon name is the name that you later use when exporting the keytab file.
This is also the principal name. The text in the First name, Initials, Last name, and Full name fields is irrelevant
to this task.
The AD domain controller automatically creates a Kerberos account for this user with an accompanying keytab. Note the
following:
• If you define an expiration date for the user account and you later create a new account when the first one
expires, the keytab for the corresponding Kerberos account changes. At that point, you must update the keytab
file on the NIOS appliance (see Generating and Exporting the Keytab File and Importing the Keytab File and
Enabling GSS-TSIG Authentication). Optionally, if your security policy allows it, you can set the user account for
the NIOS appliance so that it never expires.
• If the AD domain controller is running Windows Server 2003, the user account must have the DES encryption
type enabled. You can enable this either in the Account tab when you create the user account or by specifying
+DesOnly when you use the Ktpass tool to generate the keytab file.
• The newly created AD user account must be a member of the DnsUpdateProxy group or an account that allows it
to update records that have potentially been added by another DHCP server, such as DNS Admins.
For example:
For example:
ktpass -princ DNS/ns1.corpxyz.com@corpxyz.COM -mapuser ns1@corpxyz.com -pass 37Le37 -out
ns1.keytab -ptype KRB5_NT_PRINCIPAL -crypto des-cbc-md5 +DesOnly
where:
-princ = Kerberos principal
• DNS = Service name in uppercase format
• ns1.corpxyz.com = Instance in FQDN (fully-qualified domain name) format; this is the same as the DNS name of
the NIOS appliance
• corpxyz.COM = The Kerberos realm in uppercase format; this must be the same as the AD domain name
-mapuser = Maps the Kerberos principal name to the AD user account
• ns1@corpxyz.com = The AD user name for the NIOS appliance
-pass = The AD user account password
• 37Le37 = The password of the user account for the NIOS appliance
-out = Exports the keytab file
• ns1.keytab = The name of the keytab file
-ptype = Sets the principal type. This must be krb5_nt_principal.
-crypto = Specifies the encryption type. This must be des-cbc-md5.
+DesOnly = Specifies DES encryption for the account. Include this if you did not enable DES encryption for the account.
For example:
ktpass-princDNS/ns1.corpxyz.com@corpxyz.COM-mapuserns1@corpxyz.com-pass37Le37-
outns1.keytab-ptype krb5_nt_principal-cryptoAES256-SHA1
where:
-princ = Kerberos principal
• DNS = Service name in uppercase format
• ns1.corpxyz.com = Instance in FQDN format; this is the same as the DNS name of the NIOS appliance
Key created.
keylength 32 (0xea8675d7abf13fd760a744088642fb917ceb6c9d267f5c54e595597846f06407)
Note
The keytab file contains highly sensitive data for the NIOS appliance account. Ensure that you store and
transport its contents securely.
Sometimes when the updating record has the same data as the existing record, you may need to initialize the record
creation timestamp to avoid unwanted DNS record scavenging. For more information, see Forcing Creation Timestamp
Initialization for Unchanged Records.
Failed attempts to dynamically update secured records are recorded in the NIOS syslog. You can view it, as described in
Viewing the Syslog and Searching in the Syslog.
You can use Smart Folders to organize data by record source, principal, or protection state. For more information, see
Smart Folders.
In addition, you can use Global Search to search for records by principal name. For more information, see Using Global
Search.
Note
To use the secure dynamic updates feature, you must have a DNS license installed in the Grid Manager.
This method prevents updates to all RRsets containing static records at once in the Grid, DNS view, or zone. To prevent
updates to specific static records, see Restricting Updates to Protected Records.
Note
When you upgrade from a previous NIOS version to NIOS 7.3 or later, all dynamic updated records are labelled
as static records if you enable the Secure Dynamic Updates feature. Infoblox suggests that you enable this
feature only after all records are changed to Dynamic. NIOS tags the RRsets that are not auto-generated as
static records.
To restrict updates to all static records in the Grid, DNS view, or zone:
1. In the Grid DNS, view, or zone properties, click Updates -> Advanced.
2. To override the inherited properties, click Override.
3. Under Secure Dynamic Updates, select Prevent dynamic updates to RRsets containing static records.
4. Click Save & Close.
Note
For this option to work, ensure that you have selected Enable GSS-TSIG authentication of clients in the GSS-
TSIG properties of the Grid or the corresponding zone or view.
4. Select Require the appropriate GSS-TSIG principal to update RRsets that track principals.
5. Optionally, specify an active dynamic update group.
6. Click Save & Close.
Note
Viewing and modifying the configuration of a dynamic update group requires Grid DNS permissions. Selecting a
group as active for the Grid, a view, or a zone requires read permission on the Grid DNS, as well as write
permission on the object being modified.
Note
Use the DNS Traffic Control LBDN wild cards to specify FQDN patterns. For more information,
see Configuring LBDN Patterns.
• To delete an FQDN pattern, select the checkbox next to the pattern and click the Delete icon.
4. Click Save & Close.
Configuring DNSSEC
This section provides general information about DNSSEC. The topics in this section include:
DNSSEC
DNSSEC (DNS Security Extensions) provides mechanisms for authenticating the source of DNS data and ensuring its
integrity. It protects DNS data from certain attacks, such as man-in the middle attacks and cache poisoning. A man-in-the
middle attack occurs when an attacker intercepts responses to queries and inserts false records. Cache poisoning can
occur when a client accepts maliciously created data. DNSSEC helps you avoid such attacks on your networks.
DNSSEC provides changes to the DNS protocol and additional resource records (RRs) as described in the following
RFCs:
• RFC 4033, DNS Security Introduction and Requirements
• RFC 4034, Resource Records for the DNS Security Extensions
• RFC 4035, DNSSEC Protocol Modifications
• RFC 4641, DNSSEC Operational Practices
• RFC 4956, DNS Security (DNSSEC) Opt-In
• RFC 4986, Requirements Related to DNS Security (DNSSEC) Trust Anchor Rollover
• RFC 5155, DNS Security (DNSSEC) Hashed Authenticated Denial of Existence
• RFC 5702, Use of SHA-2 Algorithms with RSA in DNSKEY and RRSIG Resource Records for DNSSEC
Warning
When you disable EDNS0 on the appliance, all outgoing DNSSEC queries to zones within trusted anchors will
fail even if DNSSEC validation is enabled. To ensure that
DNSSEC functions properly, do not disable EDNS0 on the appliance. For more information, see Using
Extension Mechanisms for DNS (EDNS0).
DNSSEC also supports new data in the packet header, the CD (Checking Disabled) bit and the AD (Authenticated Data)
bit. The CD bit is used by resolvers in their DNS queries and the AD bit is used by recursive name servers in their
responses to queries.
A resolver can set the CD bit in its query to indicate that the name server should not validate the DNS response and that
the resolver takes responsibility for validating the DNS data it receives.
A name server that has successfully validated the data in a DNS response sets the AD (Authenticated Data) bit in the
message header to indicate that all resource records in its response have been validated and are authentic. Note that
unless the connection between the DNS server and client has been secured, such as through TSIG, the client cannot
rely on the AD bit to indicate valid data. The data could have been changed in transit between the server and client.
Resolvers can trust a response with the AD bit set only if their communication channel is secure.
You can also configure the NIOS appliance to always apply RPZ policies, DNS blacklists, or NXDOMAIN rules to DNS
responses, regardless of whether the queries request DNSSEC data. For more information about how to configure this,
see Applying Policies and Rules to DNS Queries that Request DNSSEC Data. For information about RPZ policies, DNS
blacklists, and NXDOMAIN rules, see their respective sections in this guide.
Related topic
Configuring DNSSEC
Note
For the remainder of this chapter, the DNSKEY record that holds the public key of the ZSK pair is referred to as
the ZSK and the DNSKEY record that holds the public key of the KSK pair is referred to as the KSK.
The purpose of the KSK is two-fold. First, it is referenced in the Delegation Signer (DS) RR that is stored in a parent
zone. The DS record is used to authenticate the KSK of the child zone, so a resolver can establish a chain of trust from
the parent zone to its child zone. For more information about the DS RR, see DS Resource Records.
Second, if a zone does not have a chain of trust from a parent zone, security aware resolvers can configure the KSK as a
trust anchor; that is, the starting point from which it can build a chain of trust from that zone to its child zones.
Note that though the two key pairs, KSK and ZSK, are used in most DNSSEC environments, their use is not required by
the RFCs. A zone administrator can use a single private/public key pair to sign all zone data. (Note that Infoblox
appliances require two key pairs.)
The first four fields specify the domain name of the zone that owns the key, the resource record TTL, class, and RR type.
The succeeding fields are:
• Flags Field: In its wire format, this field is two bytes long. (The wire format is used in DNS queries and
responses.) Bits 0 through 6 and 8 through 14 are reserved, and have a value of 0. Bit 7 indicates if the record
Given the currently defined flags, in its text format, the flags field is represented as an unsigned decimal integer
with the possible values of 0, 256 and 257. A value of 256 indicates that the DNSKEY record holds the ZSK and a
value of 257 indicates that it contains the KSK. In general, this field contains an odd number when the DNSKEY
record holds the KSK.
• Protocol: This always has a value of 3, for DNSSEC.
• Algorithm: Identifies the cryptographic algorithm of the public key. The available types are:
• 1 = RSA/MD5
• 2 = Diffie-Hellman (This is not supported by BIND and Infoblox appliances.)
• 3 = DSA
• 4 = Reserved
• 5 = RSA/SHA1
• 6 = DSA/SHA1/NSEC3
• 7 = RSA/SHA1/NSEC3
• 8 = RSA/SHA-256
• 10 = RSA/SHA-512
• 13 = ECDSAP/SHA-256
• 14 = ECDSAP/SHA-384
• Public Key: The public key encoded in Base64.
The first four fields specify the owner name, TT, class and RR type. The succeeding fields are:
The first field contains the hashed owner name. It is followed by the TTL ,class and RR type. The fields after the RR type
are:
• Algorithm: The hash algorithm that was used. The currently supported algorithm is SHA-1, which is represented
by a value of 1.
• Flags Field: Contains 8 one-bit flags, of which only one flag, the Opt-Out flag, is defined by RFC 5155. The Opt-
Out flag indicates whether the NSEC3 record covers unsigned delegations.
• Iterations: The number of times the hash function was performed.
• Salt Field: A series of case-insensitive hexadecimal digits. It is appended to the original owner name as protection
against pre-calculated dictionary attacks.
• Next Owner Name: Displays the next hashed owner name.
• RRsets: The RR types that are at the owner name.
DS Resource Records
A DS RR contains a hash of a child zone's KSK and can be used as a trust anchor in some security-aware resolvers and
to create a secure delegation point for a signed subzone in DNS servers. As illustrated in Figure 22.1, the DS RR in the
parent zone corpxyz.com contains a hash of the KSK of the child zone sales.corpxyz.com, which in turn has a DS record
that contains a hash of the KSK of its child zone, nw.sales.corpxyz.com.
Figure 22.1
The first four fields specify the owner name, TTL, class and RR type. The succeeding fields are as follows:
• Key Tag: The key tag value that is used to determine which key to use to verify signatures.
• Algorithm: Identifies the algorithm of the DNSKEY RR to which this DS RR refers. It uses the same algorithm
values and types as the corresponding DNSKEY RR.
• Digest Type: Identifies the algorithm used to construct the digest. The supported algorithms are:
• 1 = SHA-1
• 2 = SHA-256
Enabling DNSSEC
You can enable DNSSEC on a Grid, individual members, and DNS views. Because only Grid Masters can serve as
primary servers for signed zones, you must enable DNSSEC on the Grid Master before you can sign zones. You must
also enable DNSSEC on any Grid member that serves as a secondary server for signed zones.
When you enable DNSSEC on a Grid, you can set certain parameters that control the DNSSEC RRs, as described in
Setting DNSSEC Parameters.
When you enable DNSSEC on a Grid member or DNS view, you can set parameters that affect its operations as a
secondary server, as described in Configuring Grid Members to Support DNSSEC as Secondary Servers.
To enable DNSSEC on a Grid, member or DNS view:
1. Grid: From the Data Management tab, select the DNS tab. Expand the Toolbar and click Grid DNS Properties.
Member: From the Data Management tab, select the Members tab -> member checkbox and click the Edit icon.
DNS View: From the Data Management tab, select the Zones tab -> dns_view checkbox and click the Edit icon.
2. In the editor, click Toggle Expert Mode.
3. When the additional tabs appear, click DNSSEC.
Note
When you disable EDNS0, all outgoing DNSSEC queries to zones within trusted anchors will fail even if
DNSSEC validation is enabled. This is due to the restriction of the UDP packet length when you disable
EDNS0. For information about EDNS0, see Using Extension Mechanisms for DNS (EDNS0).
5. Save the configuration and click Restart if it appears at the top of the screen.
RRSIG Signatures
As shown in the sample RRSIG record in RRSIG Resource Records, the signatures have an inception and an expiration
time. The default validity period of signatures in RRSIG records on the Grid Master is four days. You can change this
default as long as it is not less than one day or more than 3660 days. The Grid Master automatically renews signatures
before their expiration date.
Note
You can select the Zone-signing Key rollover method only after you enable DNSSEC.
5. Save the configuration and click Restart if it appears at the top of the screen.
When you modify the algorithms for a signed zone, you can apply the algorithm changes to the zone, as described
later or you can unsign the zone and sign it again. For an unsigned zone however, you can apply the algorithm changes
by signing the zone. For information about signing a zone, see Signing a Zone.
When you re-sign a zone after adding an algorithm, the DNSKEY key pairs of the old algorithms are rolled over and all
the old RRSIG records are removed. The zone is re-signed with the new DNSKEY key pairs. When you re-sign a zone
after removing an algorithm, the DNSKEY key pairs of the remaining algorithms are rolled over and the DNSKEY key
pairs of the removed algorithm is removed. All old RRSIG records are removed and the zone is re-signed with the new
DNSKEY key pairs.
Note
If you add or remove a KSK algorithm from a zone, you must update the DS RRsets at the parent zone when
the parent zone is managed by a non-Infoblox DNS server or by an Infoblox server that is part of a different
Grid. For information, see Importing a Keyset.
Signing a Zone
When it signs a zone, the Grid Master generates new DNSKEY key pairs. As shown in the below figure, it uses the
private key of the ZSK to sign the authoritative RRsets in the zone, and stores the corresponding public key in a
DNSKEY record. It then uses the private key of the KSK to sign the DNSKEY records and stores the corresponding
public key in another DNSKEY record. It stores the private keys in the Grid database and stores the public keys in the
DNSKEY records in the database.
Importing a Keyset
A keyset is a DS RRset, or a DNSKEY RRset which is used as input to generate the DS RRset. To import a keyset:
1. From the Data Management tab, select the DNS tab.
2. Expand the Toolbar and click DNSSEC -> Import Keyset.
3. In the Import Keyset dialog box, the displayed zone name can either be the last selected zone or the zone from
which you are importing the keyset. If no zone name is displayed or if you want to select a different zone, click
Select Zone. When there are multiple zones, Grid Manager displays the Zone Selector dialog box from which you
can select a zone.
4. Paste the KSK or DS record being imported. It must be a KSK or DS record, and must belong to an immediate
subzone of the zone to which the record is being imported.
5. Click Import.
If you imported a DNSKEY RRset, the Grid Master uses the SHA-1 algorithm to generate the DS RRset, which it adds to
the parent zone. If you imported a DS RRset, the Grid Master adds it to the parent zone. The Grid Master incrementally
signs the DS RRset.
Unsigning a Zone
When you unsign a zone, the Grid Master permanently removes all automatically generated DNSSEC records in the
zone and parent zone. It does not remove any DS records associated with a child zone. You can unsign a single zone or
multiple zones at the same time.
To unsign a zone:
1. From the Data Management tab, select the DNS tab.
2. Expand the Toolbar and click DNSSEC -> Unsign Zones.
3. In the Unsign Zones dialog box, the displayed zone name can either be the last selected zone or the zone from
which you are unsigning. If no zone name is displayed or if you want to select a different zone, click the Add icon.
When there are multiple zones, Grid Manager displays the Zone Selector dialog box. The appliance displays
signed zones only. Select a zone. To add multiple zones, click the Add icon and select a zone.
You can click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel,
either select Now and click Save or select Later and enter a date, time, and time zone. For information, see
Scheduling Tasks.
4. After you have selected the zones, click Unsign Zones.
5. When the confirmation dialog displays, click Yes.
To remove a zone from the list, select the checkbox adjacent to the respective zone and click the Delete icon.
Note
The appliance enables notifications and automatic KSK rollover by default for NIOS 6.11.0 and later
releases.
These are not available for earlier releases. Similar to automatic ZSK rollover, the appliance
automatically restarts the DNS service after a KSK is rolled over.
Note
The above fields are displayed only when you select NSEC3 record type.
Note
• Make sure that the common name used in the certificates is distinct when you configure HSM servers in
HA mode.
Note
In the unlikely event that the Grid Master Candidate was registered with the Thales HSM after the Grid Master
promotion, you must restart the DNS service on the newly promoted Grid Master.
In addition, you must also set up client cooperation to allow both the Grid Master and Grid Master Candidate access to
the Remote File Server (RFS). Note that anytime you add a new Grid Master Candidate, you must enroll its IP address
and set up a client cooperation to allow it access to the RFS. For more information on these procedures, refer to your
HSM documentation.
Note that DSA cannot be used as the DNSSEC cryptographic algorithm for Thales HSMs. Therefore, migrating to Thales
HSMs is not allowed if the Grid Master uses DSA as the DNSSEC cryptographic algorithm.
You can create one Thales HSM group in the Grid, and then add HSMs to the group. The appliance tries to connect to
The status icon for each HSM can be one of the following:
Green: The HSM is functioning properly. For SafeNet Luna SA 5 or SA 6 devices, the status icon can also display
x%used which refers to the storage capacity of the HSM partition that is assigned to the Grid. Note that when the
capacity reaches 100%, new zone signings and key rollovers for existing zones cannot be performed.
Red: The HSM is not functioning properly. For a SafeNet HSM, this indicates that the Grid Master was able to
connect to the HSM, but no partition was assigned to the Grid Master.
Black: The status of the HSM device is unknown.
• FIPS: This applies to a SafeNet HSM only. It indicates if the HSM is in FIPS compliant mode.
• Comment: Any comments that were entered about the HSM group.
You can also do the following in this tab:
Applying Policies and Rules to DNS Queries that Request DNSSEC Data
You can configure the NIOS appliance to always apply RPZ policies, DNS blacklists, or NXDOMAIN rules to DNS
queries, regardless of whether the queries request DNSSEC data. You can also configure the appliance to generate
synthesized AAAA records for DNS queries that request DNSSEC data.
Warning
When you enable this feature, NIOS applies the selected policies and rules even when it responds to DNS
clients that support DNSSEC.
Note that responses to these clients may result in resolution failure. Infoblox recommends that you use caution
when enabling this feature and DNSSEC validation at the same time.
To achieve load balancing results for DNS Traffic Control, you can configure DTC objects in the following order:
1. Create DNS Traffic Control servers for each data center or server you want to manage. For information, see
Configuring DNS Traffic Control Servers.
2. Optionally, if you want to monitor server health, configure health monitors and add them to your pools when you
create them. For information, see Using DNS Traffic Control Health Monitors.
3. Configure any topology rulesets that will be used by DTC pools. For information, see Defining Topology Rulesets
All Available - +
Global Availability + +
Source IP Hash + +
Round Robin + +
Ratio: Fixed + +
Topology + +
Based on the load balancing method defined for an LBDN, the DNS Traffic Control selects an available pool. Based on
the method selected for a pool, it selects an available server.
The following is a description of the load balancing methods with examples for pools or LBDNs:
• Using the All Available method, the appliance responds to the query with all the available servers in the DTC pool
for the appropriate record type. The responses are returned in the same order in which the servers are listed in
the DTC pool, eliminating the unavailable servers.
Consider the following example for all available records load balancing method with an LBDN x.abc.com:
Pool= Pool_1; load balancing method= all available records; health check= HTTPS
10.10.1.1; Availability = up
2001:db8:a22:a00::29; Availability = up
10.10.2.2; Availability = down
2001:db8:a22:a00::32; Availability = up
10.10.3.3; Availability = up
In this example, the appliance responds with 10.10.1.1, 10.10.3.3 for each A record query. For each AAAA record
query, NIOS responds with 2001:db8:a22:a00::29, 2001:db8:a22:a00::32. The unavailable servers are eliminated.
Note that the system considers only the order of the servers in the DTC pool and ignores the weight of available
servers.
• Using the Global Availability method, the appliance creates the response to the query, so that the clients are
directed to the first available pool and server.
Consider the following example for global availability load balancing method with an LBDN x.abc.com:
• Pool= Pool_1; load balancing method= global availability; health check= HTTPS 10.10.1.1
10.10.2.2
10.10.3.3
• Pool= Pool_2; load balancing method = global availability; health check = HTTPS 10.10.4.4
10.10.5.5
10.10.5.5
In this example, the appliance always responds with 10.10.1.1 (A record) for all x.abc.com queries assuming that all
servers are available. The DNS Traffic Control LBDN determines which pool to use based on the health check
response and adjusts the response accordingly. The appliance responds with 10.10.4.4 from Pool_2 if health check
for all servers associated with Pool_1 fails.
• Using the Source IP Hash method, NIOS matches an IP address from an incoming query with the health statuses
of pools and servers to address the responses by the client. When multiple pools or servers are configured, NIOS
uses the source IP hash load balancer method, a load-balancing pattern in which requests are distributed based
For information on the Limitations and Warnings of Source IP Hash Load Balancing Method, see the following
section, Limitations of Source IP Hash Load Balancing Method.
• Using the Ratio: Fixed method, NIOS adjusts the response to the query so that the clients are directed to servers
in a pool or among pools. When multiple pools or servers are configured, the appliance uses the weighted round
robin method, a load-balancing pattern in which requests are distributed among several pools or servers based
on a weight assigned to each pool or server. Note that the system considers the weight of available servers only.
Consider the following example for ratio load balancing method with an LBDN x.abc.com, load balancing method
= Ratio and two linked pools: Pool_1 with weight = 70 and Pool_2 with weight = 30.
• Pool = Pool_1; load balancing method = ratio; health check = HTTPS 10.10.1.1; Weight = 50
10.10.2.2; Weight = 2
10.10.3.3; Weight = 25
• Pool = Pool_2; load balancing method = ratio; health check = HTTPS 10.10.4.4; Weight = 50
10.10.5.5; Weight = 25
10.10.5.5; Weight = 25
In this example, the appliance responds 70% of the time with a server associated with Pool_1. Within Pool_1, it
responds with 10.10.1.1 address 50% of the time.
• Using the Ratio: Dynamic method, the appliance weights the DTC servers dynamically based on round trip delay
or SNMP health monitor data. You can use one of the following options:
• Round trip delay: Based on the round trip delay from the DTC member that received a client’s DNS
request, the system sends clients to the server with the minimal latency time, i.e. the closest one. You
need a pre-configured health monitor for this load balancing method.
For example:
• Server A latency = 25 ms
• Server C latency = 18 ms
• Server D latency = 50 ms
In this case, the traffic distribution is as follows:
• Server A = 0%
• Server C= 100%
• Server D = 0%
• SNMP: Based on data from the SNMP monitor associated to the server, for example, CPU or memory
utilization, the system sends clients to the server with the lowest load. For this load balancing method, you
need a pre-configured SNMP health monitor with a required metric to be tracked. The metric is set
through an object identifier (OID) in the monitor properties. This method supports only OIDs for which the
server can return an integer value.
The value of the monitored metric defines how the traffic is directed. By default, the servers with the
highest metric values receive the client requests. There may be cases when your selected metric
reflects server availability in the opposite way, that is, the lowest metric values indicate available
servers. For such cases, you can invert the value of the OID, that is, of the monitored metric, and have
the traffic directed to the lowest-rated servers.
You can select to weight servers by either priority or ratio. In case of priority, traffic is directed towards
the servers that report the best metric values, other servers being bypassed. In case of ratio, traffic is
Note
You can see traffic distribution percentage across members in pools and servers based on selected load
balancing methods in the visualization panel. For information, see Visualization for DNS Traffic Control
Objects .
• Using the Round Robin method, the appliance returns servers sequentially and cyclically. Consider the following
example for round robin load balancing method with an LBDN x.abc.com:
Pool = Pool_1; load balancing method = Round Robin; health check = HTTPS 10.10.1.1;
10.10.2.2;
10.10.3.3;
In this example, NIOS responds with a server associated with Pool_1. Within Pool_1, it responds sequentially:
Time 1: Response = 10.10.1.1
Time 2: Response = 10.10.2.2
Time 3: Response = 10.10.3.3
Time 4: Response = 10.10.1.1
Time 5: Response = 10.10.2.2
Time 6: Response = 10.10.3.3
• Using the Topology method, the appliance applies a predefined geographic mapping method and evaluates user-
defined geography, subnet, or extensible attribute rules sequentially. Geographical locations for the geography
rules are provided through an external topology database. The appliance supports the MaxMind GeoIP2 City or
Country database and the MaxMind GeoLite2 City or Country database. For more information, see the following
section, Configuring Topology Rules and Rulesets.
Warning
Note
Note
During the WAPI call, if the rules are not in the correct order, they are automatically sorted as WAPI does not
give any warnings.
• When rules have multiple source conditions, the client must match all conditions for the rule to execute.
• A ruleset may have multiple subnet rules and the subnets may overlap. Similarly, a ruleset may have multiple
geography rules and the matches may overlap. Similarly, a ruleset may have multiple extensible attribute rules
and the matches may overlap. During the querying process, the rules in a topology ruleset are evaluated in order.
For example, if you configure subnet rules where #1 is 10.10.0.0/16 and #2 is 10.0.0.0/8, both are considered
valid in the appliance.
To define a ruleset, complete the following:
1. From the Data Management tab, select the DNS tab -> Traffic Control tab, and then click Manage Topology
Rulesets in the Toolbar.
2. In the Topology Manager window, click the Add icon.
3. In the Ruleset wizard that appears, complete the following:
• Name: Enter a name for the ruleset.
• Destination Type: Select a destination type, Pool, or Server. Rulesets with the Pool destination type can
only be used by LBDNs. Rulesets with the Server destination type can only be used by pools. You cannot
change the destination type if the ruleset contains any rules.
• Comment: Enter additional information about the ruleset.
• Rules: You can define multiple extensible attribute rules, subnet rules, and geography rules in the ruleset.
Click the arrow next to the Add icon and select either Extensible Attribute Rule, Subnet Rule, or
Geography Rule.
• When you select Extensible Attribute Rule, the Grid Manager displays the following:
• Source Type: Define up to four extensible attributes to use as the source type for the EA
topology ruleset. The values for the IPAM object EAs are provided from the DNS Traffic
Control EAs selected in the Grid DNS Properties editor. To define extensible attribute
source types for the topology rules, see Configuring Grid DNS Traffic Control Properties.
Note that "Any" matches any value. There must be at least one source type with a specific
value (the value is not "Any").
When a source type uses "does not equal" as the operator, it must be the lowest level
source type (most specific). For example, with Continent/Country/Subdivision/City, City is
the most specific source type.
• Destination/Response:
• DTC Pool/Server: Click Select to select a destination. The appliance displays the
DTC Pool Selector dialog box when you have selected the Pool destination type,
and displays DTC Server Selector dialog box when you have selected the Server
destination type. Click a specific pool or server to select it. Note that if there is only
one pool or server, no dialog box is displayed when selecting the destination.
• NOERROR/NODATA (Response): Select this option to provide a NOERROR/
NODATA response for DTC queries.
• NXDOMAIN (Response): Select this option to provide an NXDOMAIN response for
DTC queries.
Note
The source must be valid when creating a ruleset. It can become invalid when a
new topology database no longer contains the source.
Note that "Any" matches any value. There must be at least one source subnet with a
specific value (the value is not "Any").
When a source subnet uses "does not equal" as the operator, it must be the lowest level
source subnet (most specific).
• Destination/Response:
• DTC Pool/Server: Click Select to select a destination. The appliance displays the
DTC Pool Selector dialog box when you have selected the Pool destination type
and displays the DTC Server Selector dialog box when you have selected the
Server destination type. Click a specific pool or server to select it. Note that if there
is only one pool or server created, no dialog box is displayed when selecting the
destination.
• NOERROR/NODATA (Response): Select this option to provide a NOERROR/
NODATA response for DTC queries.
• NXDOMAIN (Response): Select this option to provide an NXDOMAIN response for
DTC queries.
Click Add to add the source. The appliance displays the following information in the Rules
table:
• Source: The subnet address that you specified.
• Destination: The destination that you selected.
• Valid Source: For a subnet rule, the rule is always marked as valid after you save the
ruleset.
• Order: Displays the order of the rule in the ruleset.
• Return Type: The response type that is selected.
• When you select Geography Rule, Grid Manager displays the following:
• Source Type: Select a source type.
• Continent: Select a continent from the drop-down list. You can also enter the first few
characters of the continent to match an item in the database.
• Country: Select a country from the drop-down list. You can also enter the first few
characters of the country to match an item in the database.
• Subdivision: Select a subdivision from the drop-down list. You can also enter the first few
characters of the subdivision to match an item in the database.
• City: Select a city from the drop-down list. You can also enter the first few characters of the
city to match an item in the database. The drop-down list has paging controls to page
through the available values.
• Destination/Response:
Note
After making changes to the extensible attributes, you may need to rebuild the topology EA database. For more
information, see Rebuilding EA Database.
Note
You can modify the destination type only if there are no rules in the ruleset.
• In the Extensible Attributes tab, you can add new or edit existing extensible attributes. For information,
see Using Extensible Attributes.
• Delete a ruleset or schedule the deletion for a later time.
• To delete a ruleset, select the checkbox next to its name and click the arrow next to the Delete icon. To
delete the object immediately, select Delete.
• To schedule the deletion, click Schedule Delete. For more information, see Scheduling Deletions.
• Export topology rulesets. To export the entire list of rulesets in a format that can be imported, click the Export icon
and choose Export data in Infoblox CSV Import format. To export all data that is currently visible in the Topology
Manager, click the Export icon and choose Export visible data.
• Print the data that is currently visible in the Topology Manager. Click the Print icon to print.
When you import a new MaxMind location database, the appliance replaces the existing database. You can import
MaxMind location databases that are in MMDB or CSV format. To view the current version of the database, click Current
Version.
You can import a ready-to-use MaxMind location database or create your own ZIP file containing multiple CSV files. To
import a MaxMind location database or to view the current version of the database, complete the following:
1. From the Data Management tab, select the DNS tab, and then select the Traffic Control tab.
2. Click the arrow next to the Topology Database, and then select Import GeoIP Database from the drop-down list.
3. In the Import Topology Database wizard, complete the following:
• File: Click Select and navigate to the MaxMind location database.
• Upload: Click Upload to import the MaxMind location database.
4. In the Toolbar, click the arrow next to Topology Database, and select Current Version from the drop-down list to
view the details of the imported MaxMind location databases. In the Geography section, the Grid Manager
displays the database type, build date, build version, and the date and time when the database was deployed to
the Grid Master.
Note
The latest database version may not be deployed on all DTC members. To view the current deployed
versions, select Data Management -> DNS -> Members.
Note
The Locations file and at least one of the Blocks files must exist or the import fails. Also, all of these files must
have identical {Product}-{Content} pairs or the import fails. You can use a ready-to-use MaxMind location
database as an example.
2. You can add multiple CSV files for different localizations to your ZIP file. Use the following naming pattern:
{Product}-{Content}-Locations-{localization}.csv.
For example:
GeoLite2-City-Locations-ru.csv
GeoIP2-City-Locations-de.csv
GeoIP2-Country-Locations-en.csv
3. Add the directory with the CSV files to a ZIP file. The name of the ZIP file you upload and the name of the
directory in the ZIP file are not significant. The ZIP file should contain only one directory and no subdirectories. Any
files in the ZIP file with an extension different from .csv are ignored.
4. Import the ZIP file to Grid Manager as described above.
Note
The Country database does not support 'subdivision' labels and importing it invalidates all existing rules that
use 'subdivision' labels.
Rebuilding EA Database
Unlike the GeoIP database, the EA database is not imported externally but configured within the system. After making
changes to extensible attributes, Grid Manager offers you to rebuild the DNS Traffic Control Topology Database. You can
use the banner that appears at the top of the screen and then click Rebuild to rebuild the database immediately. Or, you
can click Ignore to rebuild the database later in the Traffic Control tab. Clicking Ignore applies to all changes that require
a rebuild of the EA database. The EA database rebuild is ignored for the duration of the user session.
Note
The latest database version may not be deployed on all DTC members. To view the current deployed versions,
select Data Management -> DNS -> Members.
Note
The HTTP health monitor does not support user name or password authentication.
Example 2:
$ openssl ciphers 'DEFAULT:!EDH+aRSA'
DHE-DSS-AES256-SHA:DHE-DSS-CAMELLIA256-SHA:AES256-SHA:CAMELLIA256-SHA:
PSK-AES256-CBC-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:PSK-3DES-EDE-CBC-SHA: KRB5-DES-CBC3-SHA:KRB5-
DES-CBC3-MD5:DHE-DSS-AES128-SHA:DHE-DSS-SEED-SHA: DHE-DSS-CAMELLIA128-SHA:AES128-SHA:SEED-
SHA:CAMELLIA128-SHA:
PSK-AES128-CBC-SHA:RC4-SHA:RC4-MD5:PSK-RC4-SHA:KRB5-RC4-SHA:KRB5-RC4-MD5: EDH-DSS-DES-CBC-SHA:DES-
CBC-SHA:KRB5-DES-CBC-SHA:KRB5-DES-CBC-MD5:
EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-KRB5-RC2-CBC-SHA: EXP-KRB5-DES-CBC-
SHA:EXP-KRB5-RC2-CBC-MD5:EXP-KRB5-DES-CBC-MD5:EXP-RC4-MD5: EXP-KRB5-RC4-SHA:EXP-KRB5-RC4-MD5
Note
The DHE cipher list family ("Diffie-Hellman key agreement" plus "RSA authentication") could consume
excessive CPU and is excluded from the defaults used by DNS Traffic Control health monitors. Although you
can enable these ciphers by explicitly configuring them in the cipher list for HTTPS and SIP monitors, you
should be aware that doing so will increase CPU usage. Since health monitoring in general does not require
high security, Infoblox recommends that you enable these ciphers only for target servers that do not accept
other types of ciphers.
• Enable Certificate Validation: It is highly recommended to select this for the DTC server certificate to be
validated by NIOS.
• Enable SNI (Server Name Indication): Specify if you want to use SNI for the health monitor to
connect to a specific DTC server by hostname. In addition, you should indicate an alternate SNI
hostname in the DTC server editor.
5. Click Next and complete the following:
• HTTP Request: Specify the HTTP request to send the query from the client to the server. The appliance
displays GET/ by default. You can specify an HTTP request up to 1024 characters. For more information,
see Editing HTTP Request for HTTP Health Monitor.
• Response Code Check: Specify in which case the response code from the server is valid:
• Select Any response code is valid, if any response code from the server is required.
• Select A valid response code, select equals or does not equal, and then specify a value. The
default value is 200.
• Response Content Check: Specify an option for checking the server response content:
• Select Do not check the response content to not perform any content check.
• Select Search for a string in the response content to search for a string in the response content.
Then do the following:
Example 2:
GET /index.html HTTP/1.1
Host: www.example.com
The server closes the connection after the response has been sent. You can use Connection: Keep-Alive header to
alter this behavior. The Content-Length header is important to determine the end of the response for keep-alive
connections.
Apart from HTTP 1.0/1.1, NIOS also supports a request format known as HTTP 0.9:
GET /index.html
or
GET /
Normally, the response header consists of a response line, such as HTTP/1.1 200 OK or HTTP/1.0 400 Bad Request,
followed by a couple of header lines, and then by an empty line which signals the end of the response header. With
HTTP 0.9, the response immediately starts with the content of the requested file, which means that there is no HTTP
return code for an HTTP 0.9 request.
After the HTTP health monitor is configured, you can test the configuration for a specific DTC server. Note that if you
make changes to the HTTP health monitor settings, you must save the configuration so you can run the test.
To test the HTTP health monitor, do the following:
1. From the Data Management tab, select the DNS tab -> Traffic Control tab, and then click Manage Health
Monitors in the Toolbar.
2. In the Health Monitors Manager, click the Action icon next to the HTTP health monitor name and select Edit.
3. Select the Request/Response tab.
4. Click Test HTTP Health Monitor.
5. In the field Select a DTC Server or enter the IP address or domain name of an HTTP server, do one of the
following to specify the server to test:
• Click Select to select an existing DTC server.
• Enter the IP address or host name of an HTTP server. The IP address can be IPv4 or IPv6.
6. In the field Select a Grid member that is running DTC, select a DTC server on which the test will be run.
If there is only one DTC server with the DTC license, it is selected by default. If there are several DTC servers
with the license, the Grid Master is selected by default. If there is no Grid Master with the DTC license and there
are several member servers with the license, click Select and choose a server.
7. Click Test.
8. In the result of the test, the following information is returned:
• Test status
• Status message
Example 2:
$ openssl ciphers 'DEFAULT:!EDH+aRSA'
DHE-DSS-AES256-SHA:DHE-DSS-CAMELLIA256-SHA:AES256-SHA:CAMELLIA256-SHA:
PSK-AES256-CBC-SHA:EDH-DSS-DES-CBC3-SHA:DES-CBC3-SHA:PSK-3DES-EDE-CBC-SHA: KRB5-DES-CBC3-SHA:KRB5-
DES-CBC3-MD5:DHE-DSS-AES128-SHA:DHE-DSS-SEED-SHA: DHE-DSS-CAMELLIA128-SHA:AES128-SHA:SEED-
SHA:CAMELLIA128-SHA:
PSK-AES128-CBC-SHA:RC4-SHA:RC4-MD5:PSK-RC4-SHA:KRB5-RC4-SHA:KRB5-RC4-MD5: EDH-DSS-DES-CBC-SHA:DES-
CBC-SHA:KRB5-DES-CBC-SHA:KRB5-DES-CBC-MD5:
EXP-EDH-DSS-DES-CBC-SHA:EXP-DES-CBC-SHA:EXP-RC2-CBC-MD5:EXP-KRB5-RC2-CBC-SHA: EXP-KRB5-DES-CBC-
SHA:EXP-KRB5-RC2-CBC-MD5:EXP-KRB5-DES-CBC-MD5:EXP-RC4-MD5: EXP-KRB5-RC4-SHA:EXP-KRB5-RC4-MD5
• Enable Certificate Validation: It is highly recommended to select this for the DTC server certificate to be
validated by NIOS.
5. Click Next to add extensible attributes. For information, see Using Extensible Attributes.
6. To schedule the change, click Next or Schedule for Later. In the Schedule Change panel, select Now to
immediately execute this task. Or select Later to schedule this task, and then specify a date, time, and time zone.
7. Save the configuration.
Note
You can perform inline editing in the Name, Comment, and Site columns by double-clicking the required line in
the table and providing the value in the corresponding column.
Note
The Grid Master Candidate provides the health status of DNS Traffic Control objects such as servers,
pools, and LBDNs through WAPI requests.
Note
If you remove a name server associated with a zone that comprises LBDN records and if the name server is
configured as part of a consolidated monitor list, ensure that you remove the name server from the
consolidated health monitor list in the DTC pool. For more information about health monitors, see Using DNS
Traffic Control Health Monitors and Configuring DTC Monitors for Health Check.
Note
Ensure that at least one health monitor is configured in a pool or a server object before you attempt to disable
that DTC object.
1. From the Data Management tab, select the DNS tab -> Traffic Control tab.
2. In the Traffic Control panel, select the object that you want to disable.
3. Click the arrow beside the Enable/Disable icon or click the Action icon of the selected object, and select Disable.
4. Complete the following steps in the Disable Traffic Management Objects dialog:
• Disable health monitoring: Select it if you want to disable the health monitoring when the selected DTC
object is disabled.
• Disable options: Select one of the following options:
• Disable until objects are enabled manually: Select it to keep the object disabled until you enable
the object manually.
• Disable until DNS service restarts: Select it to keep the object disabled until the DNS service is
restarted.
• Disable for specified time (seconds): Select it and specify a time interval in seconds until when the
object must remain disabled. The object is enabled automatically after the specified interval
elapses.
• Disable after (seconds): Select it and specify a time interval in seconds after which the object is disabled
automatically.
Consider the following points when you have disabled DNS Traffic Control objects in a Grid:
• When you restore a Grid that had a DNS Traffic Control object disabled with the Disable until DNS restarts option,
the object gets enabled as the restore operation causes all services including the DNS service to restart. You
must disable the object once again.
• If you need to override or modify the configuration used to disable a DTC object, you must either wait until the
object is enabled based on the setting you have defined, or manually enable the object.
• Disabling DNS Traffic Control objects does not impact the DTC backup or restore operation. A restore operation
enables all objects in a Grid leaving them in Running state.
• When a Dig request is running, if you force restart the DNS service, the disabled DTC objects continue to send
responses until all objects that were in the disabled state are reinstated to the disabled state after the restart. The
time taken to reinstate the objects varies depending on the count of the disabled objects.
• When you modify the name server association of zones configured for an LBDN object, and then restart the DNS
service, the DTC object disable settings (manual fail back events) configured for members associated with the
LBDN, its pool, or server objects prior to the zone’s name server modification, becomes stale, and the stale data
is cleared at regular intervals.
Note
• To enable a disabled DNS Traffic Control server object, its pool must be enabled. If not, the status of the
server object will remain disabled.
• In NIOS version 8.6.2 and later, to enable an object that was disabled in a prior version of NIOS, do not
use the Enable option. Instead, complete the following steps:
a. On the Traffic Control tab, click the Action icon of the disabled object and select Edit.
b. In the editor, on the General tab, clear the selection in the Disabled checkbox.
c. Click Save & Close.
Warning
• If you enable the Auto Consolidated Monitors option on the DNS Traffic Control pool, all existing DNS
Traffic Control consolidated monitors are deleted.
• When there are no health monitors on the DNS Traffic Control pool and you enable the Auto
Consolidated Monitors option, a warning message asking you to manually add health monitors to the
DNS Traffic Control pool is displayed.
Warning
• If you enable Auto Consolidated Monitors on the LBDN, all the existing DNS Traffic Control
Consolidated Monitors on all linked DNS Traffic Control Pools are deleted.
• When Auto Consolidated Monitors is enabled on LBDN, all linked DNS Traffic Control Pools also have
this option automatically enabled.
• When there are no health monitors assigned on the linked DNS Traffic Control Pool(s), and you enable
Auto Consolidated Monitor on the LBDN, the warning message asking to manually add health monitors
on DNS Traffic Control Pool is displayed.
Warning
When you add health monitors to a DNS Traffic Control server that is a part of the DNS Traffic Control
configuration with the source IP hash load balancing method selected and the Auto Consolidated Monitors
option enabled, a warning message is displayed that these changes can cause differences in resolving queries
among DNS Traffic Control Grid members for the same DNS request.
Note
When the persistence is enabled, cached results are not guaranteed to persist for the configured
duration. The maximum size of the persistence cache is limited globally by the platform. When
the limit exceeds the maximum size, the oldest results are deleted. The appliance might discard
persistence results if the relevant configuration changes. HA DTC cache replication works on
both active and passive nodes and during an HA failover, the DTC cache is replicated from the
active node to the passive node.
DTC cache replication in HA mode is supported only for IPv4 communications.
• Priority: Select a priority value, 1 (High), 2 (Normal), or 3 (Low). The priority value is used when there are
LBDNs that have patterns matching the same FQDN and that are assigned to the same zone. In this
case, the matching LBDN with the highest priority is used. For example, an LBDN with "*.foo.com" and an
LBDN with "www.*.com" patterns can be linked to the same zone "foo.com" if the LBDN with the
"*.foo.com" pattern has priority 1 and the LBDN with the "www.*.com" pattern has priority 2 or 3. If there
are no matches, the default LBDN is used.
• Comment: Enter additional information about the LBDN object.
• Auto Consolidated Monitors: Select this option to enable auto managing DNS Traffic Control Consolidated
Monitors on DNS Traffic Control Pools linked to the LBDN. This option will lock all the DNS Traffic Control
If you select the A or AAAA record type, the LBDN returns the corresponding record and/or a CNAME
record when the client queries for any record type and if the server selected by DNS Traffic Control has
the required data.
However, if the client queries for CNAME explicitly, ensure that you select the CNAME record type
checkbox for the CNAME records to be returned.
Note
If you select the CNAME or NAPTR record type, the LBDN returns the CNAME or NAPTR
record respectively when the client queries for those records and if the server selected by DNS
Traffic Control has the required data. As the CNAME response must be unique, the CNAME
record type is unavailable for an LBDN if any pool in that LBDN uses the All Available load
balancing method.
Unlike other DNS Traffic Control record types, SRV record type has a name. If the QNAME
matches the pattern in LBDN and the QTYPE is enabled, a server is selected and all the records
of the QTYPE configured for the server are returned. DNS Traffic Control SRV name is not used
in name matching during DNS resolution in BIND.
To receive distinct responses, use separate LBDNs as well as separate servers for every
service/protocol/domain combination.
• Associated Zones: Click the Add icon to associate zones with the LBDN. Select a zone from the
ZoneSelector dialog box and click OK. The appliance displays the following information:
• Zones: The name of the selected zone.
• DNS View: The DNS view associated with the selected zone (if there is more than one DNS view).
The LBDN is active only when you associate zones with it. You can associate only authoritative forward-
mapping zones with the LBDN. The LBDN must contain at least one matching pattern for the zone. For
example, an LBDN with patterns "www.*.com" and "www.*.net" may be linked to a zone "foo.com". For
more information, see Managing LBDN Records.
• You can also associate LBDNs with DNSSEC signed zones. For more information, see Associating
LBDNs with DNSSEC Signed Zones.
4. Click Next and click the Add icon to associate pools with the LBDN. Select a pool from the DNS Traffic
Control Pool Selector dialog box and click OK. The appliance displays the following information:
• Name: The name of the selected pool.
Note
There are many cases where the use of wildcards within LBDN patterns is advisable; however, Infoblox
recommends using wildcards with caution in the left-most position because it may lead to unexpected behavior
or responses. When in doubt, the most predictable behavior comes from using the target domain name as the
pattern when configuring the LBDN.
Note
SRV record type uses a name. If the QNAME matches the pattern and the QTYPE is enabled, then a server is
selected and ALL records of the QTYPE configured for the server are returned. For distinct responses use
separate LBDNs as well as separate servers for every service/protocol/domain combination. DTC SRV name is
not used in name matching during DNS resolution in BIND.
Note
You cannot assign any signed zone during staged Grid upgrade if not all of the NIOS appliances have been
moved to a new software version. This restriction is working in both Signed and Unsigned modes.
For information on Limitations and Warnings of the Auto Consolidated Monitors option, see Limitations
For DNS Traffic Control.
• Disabled: Select this to disable the pool.
3. Click Next to associate health monitors with the pool:
• Health Monitors: Select the health monitor from the Available table, which you want to associate with the
pool, and then click the right arrow to move the selected health monitor to the Active table. You can use
Note
If you select Topology as the preferred method, you can also specify the alternate method which is used to
select a server from the pool if the preferred one does not return any result. The preferred and alternate
methods must be different.
Note
This step only applies if you create a DTC server from the Traffic Control tab. If
you create a DTC server on the DNS -> Zones, DNS -> Members/Servers tab,
or Data Management -> IPAM tab, the record is already selected so this step is
not available in the DTC Server Wizard
4. Auto-create DTC records: If this is enabled and the Host field contains an IP address, an A (IPv4), or AAAA
(IPv6) record will be created. If the Host field contains a domain name, a CNAME record will be created. If you do
not enable auto-created DTC records, you must create those records manually. For more information, see
Managing DTC Server Records.
Note
A record type that corresponds to the Host field must exist in order for the DTC Server to return a response.
Note
In addition, you need to define an A record mapping as the canonical name of the host to its IP
address.
For information on warnings related to Auto Consolidated Monitor, see Warnings for DNS Traffic Control
Servers.
3. To schedule this task, click the Schedule icon at the top of the wizard. In the Schedule Change panel, select
Later and enter a date, time, and time zone. The Schedule icon is green when there is a pending scheduled task.
For information, see Scheduling Tasks.
4. Save the configuration.
Note
Grid Manager can display a maximum of 100 nodes for each level associated with the currently visualized
node.
Icon (Visualization Panel) Status and Meaning (Visualization Panel) Status and Meaning (Traffic Control Tab)
Disabled (in the legend) and Requires Manual Requires Manual Enabling with a white background:
Enabling (on mouse hover): The object is disabled due to a configuration setting and it
The object is disabled due to a configuration must be enabled manually.
setting and it must be enabled manually.
Temporarily Disabled (in the legend) Temporarily Disabled with a dark grey background:
Will be enabled at <time_stamp> (On mouse The object is disabled due to a configuration setting. This
hover): might be due to different reasons, such as the "Disable"
The object is disabled for a specified duration due flag being set, the DNS service not running on the selected
to a configuration setting. It will be automatically member, a zone not assigned to an LBDN, or the LBDN not
enabled at the displayed time. associated with a zone for the selected DTC member.
Disabled, Working (in the legend) and Will be Running with a green background:
disabled at <time_stamp> (On mouse hover): The object is fully available and operational.
The object is working fine, but it will be disabled at
the displayed time.
Disabled, Error (in the legend) and Will be Error with a red background:
disabled at <time_stamp> (On mouse hover): The object has an error. You can check the syslog for any
The object has failed. It will be disabled at the messages.
displayed time.
Unknown: Unknown:
The DTC object status has not yet been The DTC object status has not yet been determined.
determined.
Unlicensed: Unlicensed:
The object does not have a DNS Traffic Control The object does not have a DNS Traffic Control license.
license.
It may take a few minutes for the status of an object to be updated after a configuration change.
Grid Manager calculates the status differently for the DTC objects list view and the visualization.
Note
If a pool has no health monitors configured, then the servers and pool report a status of 'Running'.
Note
If you have configured AD server for authentication, you must specify "domain name\
\username".
Note
If you have configured AD server for authentication, you must specify "domain name\
\username".
Note
When you select FTP or SCP, ensure that you have a valid user name and password on the
server prior to backing up the files.
• Grid Master (local): Back up to a local directory on the Grid Master. This is the default.
By default, the Grid Master generates a backup file and saves it locally in its own storage at 3:00 AM daily.
Be aware that backing up the Grid and saving it locally on an hourly basis increases the turnover of files stored
on the Grid Master. Backing it up hourly to a remote server increases the overall amount of traffic on your
network.
• Save the configuration and click Restart if it appears at the top of the screen.
Note
If you have configured AD server for authentication, you must specify "domain name//
username".
Note
If you have configured AD server for authentication, you must specify "domain name//
username".
Note
When you select FTP or SCP, ensure that you have a valid username and password on the
server prior to backing up the files.
• Click Backup.
Note
When you select FTP or SCP, ensure that you have a valid username and password on the
server prior to backing up the files.
Note
When you restore NIC interfaces to a VM, ensure that you provision appropriate NIC interfaces with the
database content that must be restored to avoid any errors.
To restore a DTC backup file to the same independent appliance or Grid Master:
1. From the Grid tab, select the Grid Manager tab, and then click Restore -> Restore DTC from the Toolbar.
2. In the Restore dialog box, choose one of the following from the Restore from drop-down list:
• My Computer: Restore a file from your local computer. This is the default.
• Filename: Click Select File to navigate to the configuration file.
• TFTP: Restore a file from a TFTP server.
• Filename: Enter the directory path and the file name you want to restore. For example, you can enter /
archive/backups/Infoblox_2009_10_20_15_30 .
• IP Address of TFTP Server: Enter the IP address of the TFTP server from which you restore the
configuration file.
• FTP: Restore a file from an FTP server.
• Filename: Enter the directory path and the file name of the backup file. For example, you can enter /
archive/backups/Infoblox_2009_10_20_15_30.
• IP Address of FTP Server: The IP address of the FTP server.
• Username: Enter the username of your FTP server account.
• Password: Enter the password of your FTP server account.
• Grid Master (Local): Restore from a local directory on the Grid Master. In the Backup Set table, select the file you
want to restore.
• To restore NIOS configuration data, select the NIOS data checkbox.
• To download a backup file from one appliance to a different appliance, select Force Restore from Different Grid to
enable the feature, and then select one of the following:
• Retain Current Grid Master IP Settings (this is the default)
• Overwrite Grid Master IP Settings
• Click Restore. In the Confirm Restore dialog box, click Yes.
After restoring the file, the appliance restarts. The restore process overwrites all existing data. All pending
scheduled tasks are not restored or reverted.
• Close your current browser window, wait a few minutes, and then reconnect to the NIOS appliance.
Note
To add DNS Traffic Control pool with consolidated monitors using CSV import, you must first import the DNS
Traffic Control pool objects without consolidated monitor data (if the CSV file contains consolidated monitors,
you must manually remove the data before importing the DNS Traffic Control pool objects). Once the DNS
Traffic Control pool objects are in the system, you can run the CSV override to add consolidated monitors using
a CSV file that contains all the data, including the DNS Traffic Control pool objects and consolidated monitors.
You can now view a snapshot of any member in the pool and the monitors associated with it, along with their health
status. To view the snapshot, complete the following:
1. Click the server for which you want to see the consolidated monitors.
2. In the Server Visualization area, select the member for which you want to see the associated monitors.
A visualization chart is displayed that represents the pool hierarchy. You can hover over the server icons to view the
health status of the monitors associated with the server. For more information about health monitors, see Using DNS
Traffic Control Health Monitors.
Configuring IP Addresses
You can configure IP addresses on the loopback interface to minimize service downtime during a server migration. As
illustrated in the figure DNS Server Migration Using the Loopback Interface, you have two existing DNS servers
(ns1.corpxyz.com 192.204.18.11 and ns2.corpxyz.com 192.204.18.12) and you want to replace these servers with a new
one (ns3.corpxyz.com 192.204.18.88). The migration takes a few weeks and you want DNS services to be available on
all three addresses during the migration. You can add all three IP addresses to the loopback interface of a NIOS
appliance, and then configure the appliance to provide DNS services on all addresses. After the server migration, you
can shut down the old servers and use the new one for services.
Note
You can configure multiple interfaces on the Infoblox-4030-10GE appliance only. To configure LAN1, LAN2 and
MGMT interfaces to the same IPv4 or IPv6 subnet, provide the same netmask for IPv4, or a CIDR prefix for
IPv6, as the LAN1 interface. Alternatively, you can use a /32 netmask (255.255.255.255) for IPv4, or /128 CIDR
prefix for IPv6 with the same subnet as LAN1 interface to configure multiple interfaces. An Infoblox-4030-10GE
can replace three DNS cache servers that are active on the same network. When you configure multiple
interfaces on the same subnet, the outgoing traffic from NIOS host which is received through LAN2 and MGMT
is directed to the LAN1 router for all interfaces on the LAN1 subnet, irrespective of the destination IP. However,
if the LAN1 interface fails, the outgoing traffic will not be re-directed to any other interface and access to LAN2
and MGMT also fails.
Note
You cannot configure Additional Address (loopback) (IPv4) interface for an IPv6 Grid member
and Additional Address (loopback) (IPv6) interface for an IPv4 Grid member. You can only enter the IP
address you want to add to the loopback interface. You cannot configure the subnet mask, prefix length,
gateway, or port settings.
Note
You cannot configure the gateway address and port settings.
4. Save the configuration and click Restart if it appears at the top of the screen.
To add multiple IP addresses on the loopback interface, repeat the steps for each IP address.
Note
If you are configuring the loopback interface on a Grid Master, the Grid is temporarily disrupted upon saving the
configuration and restarting services on the appliance. The Grid reconnects automatically and the appliance
regains the role as Grid Master after a short delay.
When you configure DNS anycast addresses on the loopback interface, you can select OSPF, BGP, or both, to advertise
the addresses to upstream and neighboring routers, without establishing a static route. For information, see About
Anycast Addressing for DNS.
Note
For more information about anycast addressing, refer to RFC 1546 "Host Anycasting Service".
Note
When you add an anycast address, you need to start the service for the advertising to take place. However,
when you remove an anycast address, no service restart is required to stop the service. Anycast advertising
stops immediately.
Note
You must configure at least one routing method for DNS anycast. You can configure OSPF,
BGP, or both (in most cases only one protocol will be used). The appliance cannot save the
anycast address if you do not complete at least one routing configuration. Anycast cannot be
used without dynamic routing.
• Comments: Enter a text string to help identify this interface and IP address.
6. If using OSPF for the current appliance: Under OSPF Area Configuration, click the Add icon. A new configuration
block appears in the properties editor.
• Enter the values for the OSPF configuration as described in the section Configuring OSPF on the NIOS
Appliance.
• Click the Add down arrow icon in the OSPF Area Configuration section. The new OSPF configuration is
saved into a table.
7. If using BGP for the current appliance: In the properties editor, scroll down to the configuration block for BGP
Configuration. For information, see Configuring BGP in the NIOS Appliance.
• In the ASN field, enter the Autonomous System ID number in which the NIOS appliance resides.
• If necessary, modify the BGP Timer Keep Alive and Hold Down values. In most circumstances these
values should be left at their defaults. Check your network's defined policies for the desired values if
necessary.
• Click the Add icon.
• Enter the Neighbor Router IP address. This can be an IPv4 address or an IPv6 address.
• Enter the Remote ASN (Autonomous System ID number) for the adjacent router.
8. Save the configuration. The system will warn that you must restart the appliance services in order to use the new
configuration.
9. Log back in to the appliance.
10. From the Data Management tab, select the DNS tab -> Members/Servers tab -> Grid_member checkbox -> Edit
icon.
11. Select Toggle Advanced Mode (if necessary), click General and the Advanced tab.
12. Under Listen on these additional IP addresses, click the Add button. The list of one or more previously created
IPv4 and IPv6 addresses for the loopback interfaces (created in Step 4) appear in this table. (If the Add button is
not active here, this indicates that you have not configured any loopback interfaces with their IP addresses.) Should
you need to configure other DNS properties on this page, see the topics in Configuring the Grid to provide DNS
Services.
Note
If you remove an IP address from the list of Listen on these additional IP addresses, anycast advertising will
stop immediately. No service restart is required to stop anycast from listening on this IP address.
Note
You can select different options for the restart sequence for anycast service with DNS, when the DNS restart is
invoked. You can manage this sequence with the help of CLI commands.
For more information on the CLI commands, see
IP Routing Options
IP routing is a set of protocols that determine the path IP packets follow in order to travel across multiple networks from
the source to the destination. When information travels through a series of routers and across multiple networks, IP
routing protocols enable the routers to build up a forwarding table that correlates the final destination with the next
upstream routers.
For routing purposes, the internet is divided into ASs (Autonomous Systems). Data is routed within an AS using an IGP
(Interior Gateway Protocol) and routed between different ASs using an EGP (Exterior Gateway Protocol). NIOS
appliances support OSPFv2 (for IPv4) and OSPFv3 (for IPv6) for a routing IGP, and BGP4 to advertise DNS anycast
addresses in the larger internetwork.
As noted in the section Configuring Anycast Addresses, you configure OSPF or BGP4 to advertise anycast addresses,
which configured on the loopback interface of NIOS appliances. Use of either protocol depends on the network topology,
based on whether the advertisements will propagate only within a single AS or between more than one AS. The following
figure shows a simplified example.
OSPF and BGP Routing Example
About OSPF
OSPF is a link-state protocol based on the Dijkstra algorithm used to calculate the shortest path to a destination address
within an internetwork. This protocol uses a link-state database created using routing information advertised from
neighbors and peers, each with costs based on the state of that link to the destination.
OSPF network topologies consist of administrative domains called OSPF areas. An area is a logical collection of OSPF
routers, servers and other network devices that have the same area identifier. A router within an area keeps an OSPF
database for its OSPF area only, reducing the size of the database that is maintained.
After you configure or change DNS anycast settings, you must restart the DNS services for the settings to take effect.
When you enter any OSPF command and wait for the interface to return more information, the appliance disconnects
your CLI session after you restart services or make other OSPF configuration changes through Grid Manager. Re-enter
your credentials to log back in to the CLI. (For information, refer to the Infoblox CLI Guide.)
To enable the appliance to support OSPF and advertising anycast addresses on OSPF from the loopback, you must first
configure the LAN1 or LAN1 (VLAN) interface as an OSPF advertising interface. For information about VLAN, see About
Virtual LANs.
You can also configure authentication for OSPF advertisements to ensure that the routing information received from a
neighbor is authentic and the reachability information is accurate. This process can be implemented for OSPF over IPv4
networks but is not supported for IPv6/OSPFv3. For information, see Configuring OSPF on the NIOS Appliance.
Note
For more information about the OSPF routing protocol, refer
to RFC 2328 "OSPFv2" and RFC 5340 "OSPF for IPv6".
Note
Use the CLI command show ospf or show ipv6_ospf to display configuration and statistical information about
the OSPF protocol running on the appliance. You can also use the set ospf or set ipv6_ospf command to write
OSPF statistical information to the syslog. In the NIOS appliance, configuration of OSPF is limited to Syslog
and the DNS anycast application.
To support DNS anycast and other routing-dependent applications on NIOS appliances, you must first configure the
LAN1 or LAN1 (VLAN) interface as an OSPF advertising interface, and then assign an area ID on the interface to
associate it with a specific OSPF area. The interface advertises the OSPF routing information to the network so that
routers can determine the best server to query. Note that the appliance automatically uses the HA interface as the
advertising interface for an HA pair, even though you select the LAN1 interface. For anycasting, the advertising interface
sends out routing advertisements about the anycast address into the network out to upstream routers.
Note
IPv6 is not supported for the Stub and Not-so-stubby area types.
To configure the LAN1 (HA) or LAN1(VLAN) interface to be an OSPF advertising interface, perform the following tasks:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member checkbox, and then click the
Edit icon.
2. Select the Anycast tab in the Grid Member Properties editor.
The Anycast Interfaces appear in a table. You can add new anycast interfaces when needed.
3. Click the Add icon of the OSPF Area Configuration table and choose IPv4 Configuration or IPv6 Configuration to
define a new OSPF Area. The OSPF Area Configuration will show a similar set of Add (IPv4/IPv6) OSPF Area
configuration settings based on the protocol type. Enter the following information to configure the LAN1, or LAN1
(VLAN) as the OSPF advertising interface:
• Advertising Interface: Displays the interface that sends out OSPF routing advertisement. OSPF
advertisements are supported on the LAN1 and LAN1(VLAN) interfaces. For an HA pair, select LAN1 and
the appliance automatically uses the HA interface as the advertising interface.
• Area ID: Enter the OSPF area identifier of the network containing the upstream routers, in either an IP
address format or a decimal format. All network devices configured with the same OSPF area ID belong to
the same OSPF area. The area ID configured on the Grid member must match the area ID of the
upstream router configuration. Area ID numbers are defined in the same format for IPv6 and IPv4.
• Area Type: Select the type of OSPF area to associate with the advertising interface from the drop-down
list. The area type configured on the Grid member must match the area type of the upstream router
configuration. The supported area types are described as follows:
• Standard: A standard area has no restrictions on routing advertisements, and connects to the
backbone area (Area 0) and accepts both internal and external link-state advertisements.
• Stub: A stub area is an area that does not receive external routes.
• Not-so-stubby: A not-so-stubby area (NSSA) imports autonomous system (AS) external routes and
sends them to the backbone, but cannot receive AS external routes from the backbone or other
areas.
Note
OSPF for IPv6 (known as OSPFv3) configuration does not support OSPF authentication
options.
• AuthenticationType: Select the authentication method to use to verify OSPF routing advertisements on the
interface. The authentication type configured on the Grid member must match the authentication type of the
upstream router configuration. The supported authentication types are described as follows:
Managing OSPF
• OSPF advertises the route when the DNS service starts. The start DNS command creates an interface and starts
the OSPF daemon.
• OSPF stops advertising the route when the DNS service stops. The stop DNS command stops the OSPF
daemon and deletes the interface.
• The NIOS application does not support a route flap. For example, temporary DNS downtime such as restart, does
not stop or re-instate the OSPF advertisement.
• The OSPF advertisement stops if DNS service is down for more than 40 seconds.
Note
Use the CLI command show bgp or show ipv6_bgp to display configuration and statistical information about
the Border Gateway Protocol running on the appliance. You can also use the set bgp command to write OSPF
statistical information to the syslog. In the NIOS appliance, configuration of BGP is limited to Syslog and the
DNS anycast application.
To enable DNS anycast addressing across different ASs, you configure BGP as the routing protocol on the NIOS
appliance. (As illustrated in the figure Anycast and BGP Configuration on Infoblox Appliances, the AS 65497 network
contains the Infoblox DNS anycast servers, and the AS 65499 network contains Router 1 and 2. The routers use BGP
and are peered with the DNS servers. You can configure anycast addressing on the loopback interface of the DNS
servers and select BGP as the protocol to advertise the anycast addresses to Router 1 and 2 in AS 65499. For
information, see Configuring Anycast Addresses. Once you have configured the DNS servers, the appliances
automatically add filters on the advertising interfaces to limit the advertisements to the configured anycast IP addresses.
Similarly, BGP filters are applied to ensure that the DNS servers only receive default route advertisements from the
neighboring routers.
Note
NIOS selects the interface for BGP advertisement based on the routing configuration.
The appliance supports BGP version 4. For more information about BGP, refer to RFC4271, A Border Gateway Protocol
4 (BGP-4).
Note
If you encounter Malformed AS_PATH error, then remove the dont-capability-negotiate option. Infoblox doesn't
provide an option to create confederation of autonomous systems if the BGP peer is configured by enabling the
dont-capability-negotiate option.
Note
If you upgrade from a previous NIOS version to NIOS 6.11.0 or later, BGP authentication is disabled for existing
BGP neighbors.
The BGP service restarts automatically when any of the following authentication changes are made:
• MD5 authentication is enabled or disabled for a BGP neighbor.
• Change the authentication password of a BGP neighbor, for which MD5 authentication is enabled.
To configure BGP for anycast addresses:
1. From the Grid tab, select the Grid Manager tab -> Members tab -> Grid_member checkbox, and then click the
Edit icon.
2. In the Grid Member Properties editor, select the Anycast tab.
3. In the BGP Configuration section, complete the following:
• Interface Link Detection: Select this checkbox to enable link detection when the default connection fails.
This enables the router to track the next available route. For example, if LAN1 is set as the default
gateway when both LAN1 and LAN2 are working, and LAN1 later fails, the router will switch to LAN2.
When LAN1 reconnects, the router will then switch back to LAN1.
• ASN: Enter the autonomous system number of the interface. You can enter an ASN number from 1 to
4294967295. You can configure only one ASN on each Grid member.
• BGP Timers: BGP uses timers to control how often the interface sends KEEPALIVE messages and how
long it waits before declaring a neighboring router out of service. The keepalive timer determines the time
interval at which the interface sends KEEPALIVE messages to a neighboring router to inform the neighbor
that the appliance is alive. The hold down timer determines how long the interface waits to hear a
KEEPALIVE or UPDATE message before it assumes its neighbor is out of service. If a neighboring router
is down, the interface terminates the BGP session and withdraws all the BGP routing information to the
neighbor.
• Keep Alive: Enter the time interval in seconds when the interface sends keepalive messages. You
can enter a time from 1 to 21845 seconds. The default is four seconds.
• Hold Down: Enter the time in seconds that the interface waits to hear a keepalive message from
its neighbor before declaring the neighbor out of service. You can enter a time from 3 to 65535
seconds. The default is 16 seconds.
Click the Add icon to add a neighboring router to receive BGP advertisements from the NIOS appliance. The
appliance adds a new row to the table. Complete the following:
• Neighbor Router IP: Enter the IP address (IPv4 or IPv6) of the neighboring BGP router. The neighboring router
can be within the same AS (the most likely case) or from a router in an external AS.
Note
When you enter the password for a BGP neighbor, it will be preserved even if you disable MD5
authentication for the BGP neighbor later. But if you change the IP address for any existing BGP
neighbor, you must re-enter the authentication password for the BGP neighbor, even if the
authentication password remains the same.
Warning
The default advertised setting for BFD holddown is 300 ms (100 ms transit/
receive intervals and detection multiplier 3). This setting is optimized for typical routers and directly connected
endpoint configurations. If your network requires an implementation of L2 multi-
path or port redundancy, you must adjust the holddown interval value higher than the spanning-
tree rebalance latency
to avoid unnecessary changes to the L3 network topology or the forwarding path for DNS traffic.
Note
You can enable or disable the BFD Internal DNS Monitoring checkbox only if you select the Enable BFD
checkbox. When you enable the BFD Internal DNS Monitoring checkbox, Infoblox recommends that you also
select the Enable DNS Health Check checkbox in the Grid Properties Editor or the Member Properties Editor.
The BFD Internal DNS Monitoring checkbox is enabled by default.
Warning
The DNS health check monitor might
not work properly if the DNS blackhole feature is enabled or if any named ACL is blocking the query sent to the
loopback interface.
Note
You must carefully select the domain names for DNS health check monitor with BFD session in order to avoid
unnecessary changes in downstream DNS traffic due to transient health check query failures. Setting a higher
timeout or retry count might help in avoiding false alarms.
In addition, the BFD process can generate SNMP traps for session state changes according to the standard BFD MIBs
described in RFC 7330 and RFC 7331:
• .1.3.6.1.2.1.222.0.1 (bfdSessUp): This notification (aka trap) is sent when one of the neighbors changes the BFD-
session state as 'Up.'
• .1.3.6.1.2.1.222.0.2 (bfdSessDown): This notification (aka trap) is sent when one of the neighbors changes the
BFD-session state as 'Down' or 'AdminDown.'
• .1.3.6.1.2.1.222.1.2.1.13 (bfdSessDiag): The diagnostic code which can be one of the following:
• noDiagnostic (0)
• controlDetectionTimeExpired (1)
• echoFunctionFailed (2)
• neighborSignaledSessionDown (3)
• forwardingPlaneReset (4)
• pathDown (5)
• concatenatedPathDown (6)
• administrativelyDown (7)
• reverseConcatenatedPathDown (8)
• misConnectivityDefect (9)
Note that you must download the following MIBs to enable the trap-receiver to parse the notifications:
• BFD-STD-MIB
• BFD-TC-STD-MIB
• DIFFSERV-MIB
• DIFFSERV-DSCP-TC
• INTEGRATED-SERVICES-MIB
• IANA-BFD-TC-STD-MIB
DHCP
This section describes how to configure the Grid to provide DHCP services. It includes the following topics:
Note
If VLAN tagging in enabled on an Infobolox HA appliance, you must enable trunking at the port level.
• EtherChannel: Disable
• IGMP Snooping: Disable
• DHCP Snooping: Disable or Enable Trust Interface
Note
You must disable DHCP Snooping to successfully run DHCP services on the Grid. For more information
about DHCP services, see Configuring Infoblox DHCP Services.
Note
By default, a NIOS appliance automatically negotiates the optimal connection speed and transmission
type (full or half duplex) on the physical links between its LAN1 or LAN1 (VLAN), HA, and MGMT ports
and the Ethernet ports on the connecting switch. If the two appliances fail to auto-negotiate the optimal
settings, see Modifying Ethernet Port Settings for steps you can take to resolve the problem.
About Networks
You can configure DHCP IPv4 and IPv6 properties for the Grid and its members, and then define the IPv4 and IPv6
networks that they serve.
All networks, both IPv4 and IPv6, must belong to a network view. The appliance has one default network view and unless
you create additional network views, all networks belong to the default view. Note that because network views are
mutually exclusive, you can create networks with overlapping IP address spaces in two different network views. For more
information, see Configuring Network Views.
Note
The 255.255.255.255 limited broadcast address is reserved. The appliance does not automatically create glue
A records for this address. You can however create an NS record without the associated glue records. For more
information, see Changing the Interface IP Address.
About Hosts
Infoblox hosts are data objects that contain DNS, DHCP, and IPAM data of the assigned addresses. You can assign
multiple IPv4 and IPv6 addresses to a host. When you create a host, you are specifying the name-to-address and
address-to-name mappings for the IP addresses that you assign to the host. For information about Infoblox hosts, see
About Host Records.
Configure DHCP properties for the Grid and members. • Configuring IPv4 DHCP Properties
• Understanding DDNS Updates from DHCP
• Configuring DHCP IPv4 and IPv6 Common
Properties
• Configuring the Lease Logging Member
Decide if you want to configure a DHCP failover association. • Configuring Failover Associations
Configure networks based on your network requirements and decide if you want to • Configuring IPv4 Networks
override the Grid or member DHCP configuration for the networks
• Configuring IPv4 Shared Networks
Decide if you want to configure fixed addresses and reservations, and whether to • Configuring IPv4 Fixed Addresses
override the Configuring IPv4 Reservations upper level DHCP properties for the
fixed addresses and reservations.
• Configuring IPv4 Reservations
Define DHCP ranges and decide whether to override the upper level DHCP • Configuring IPv4 Address Ranges
properties for the ranges.
The following checklist includes the major steps for configuring DHCP service for IPv6:
IPv6 DHCP Configuration Checklist
Configure DHCP properties for the Grid and members. • Configuring DHCPv6 Properties
• Understanding DDNS Updates from DHCP
• Configuring DHCP IPv4 and IPv6 Common
Properties
• Configuring the Lease Logging Member
Configure networks based on your network requirements and decide if you want to • Configuring IPv6 Networks
override the Grid or member DHCP configuration for the networks.
• About IPv6 Shared Networks
Decide if you want to configure fixed addresses and reservations, and whether to • Configuring IPv6 Fixed Addresses
override the upper level DHCP properties for the fixed addresses and reservations.
Define DHCP ranges and decide whether to override the upper level DHCP properties • Configuring IPv6 Address Ranges
for the ranges
DHCP Inheritance
When you configure DHCP properties for the Grid, members, networks, shared networks, DHCP ranges, fixed
addresses, reservations, host addresses, and roaming hosts, the appliance applies the configured properties
When a DHCP property contains inherited values from different sources, the appliance displays the corresponding
information when you create or modify an object. Based on the information provided, you can then decide whether to
override or keep the inherited values. You must have read/write permissions to the DHCP resources to override inherited
values. You can only view inherited values and paths if you have read-only permissions.
Inherited From <object> the DHCP property has a definite value from an inheritance source. Simple
Inheritance
Inherited From Upper Level the appliance cannot determine the inherited value or inheritance source for the DHCP Unknown
property. Inheritance
Inherited From Multiple the DHCP property has the same value that it inherits from multiple sources. Multiple
Inheritance
Settings Inherited from Multiple the DHCP property has multiple values that it inherits from multiple sources, and you Multiple
Ancestors, View Multiple Inheritance can view the values and their corresponding sources by clicking the View Multiple Inheritance
Scenarios Inheritance Scenarios link.
Simple Inheritance
When a DHCP property has an inherited value from a specific source, the appliance displays the value. It also displays
Inherited From <object> (where <object> can be the Grid, member, network, shared network, or DHCP range) to indicate
the source from which the value is inherited.
For example, when you set DHCP properties at the Grid level and do not override the properties at any level, the
members, networks, shared networks, DHCP ranges, fixed addresses, reservations, host addresses, and roaming hosts
inherit these properties from the Grid. The appliance displays the property value and Inherited From Grid Infoblox for
each configured DHCP property, as shown in Simple Inheritance.
Unknown Inheritance
In some cases, DHCP properties may not have definite inherited values and inheritance sources. The following are
examples of unknown inheritance:
• The appliance cannot determine the inheritance sources of the DHCP properties in a template until you use the
template to create an object.
• When a network or a DHCP range does not have an assigned member, it does not have a clear definition of an
inheritance source because a network or a DHCP range inherits properties from a member.
• When individual networks in a shared network do not have member assignments, the shared network has
unknown inheritance because the shared network inherits DHCP properties from a member and its networks.
• All roaming hosts have unknown inheritance because the DHCP properties can be inherited from different DHCP
ranges within a network view.
In cases where the source of the inheritance is unknown, the appliance displays Inherited From Upper Level as the
inheritance source. As shown in Unknown Inheritance, network 10.1.1.0 has unknown lease time value because it does
not have any assigned member.
Unknown Inheritance
In the same Grid with the two members serving the same network, the network inherits different values for the same
properties if you override the Grid configuration on one member but not on the other. For example, you can configure
different PXE lease times for the members and configure a member as an authoritative DHCP server for the domain and
the other not. In this case, the appliance displays Settings inherited from multiple ancestors and provides a View Multiple
Inheritance Scenarios link so you can view the inherited values and paths, as shown in Multiple Inheritance Sources with
Multiple Values .
Multiple Inheritance Sources with Multiple Values
Another scenario of multiple inherited levels is when you have multiple DHCP properties that can inherit the same or
multiple values from different sources. For example, when you configure multiple DHCP custom options, each of the
options can inherit the same or multiple values from multiple paths. You can override the inherited options and configure
new ones at a specific level other than the Grid level. Though these options are grouped under DHCP Custom Options,
the appliance treats each of them as a separate property. The appliance groups the inherited options at the top, as
shown in DHCP Custom Options with Multiple Inheritance Sources. You can override these options but you cannot delete
them. For multiple values inherited from multiple sources, you can view the values in the Multiple Inheritance Viewer by
clicking View Inheritance, as shown in Multiple Inheritance Viewers for Options.
DHCP Custom Options with Multiple Inheritance Sources
When you configure email notification for the Grid or Grid member from the Data Management tab -> Grid tab, the email
address you enter there is inherited by the DHCP configuration for the Grid, members, networks, and DHCP ranges
unless you override it at a specific level. The appliance uses this email address to send notification for a DHCP range
when the DHCP usage crosses either the effective watermark threshold. For information, see Configuring Thresholds for
DHCP Ranges.
A network container inherits DHCP options from its parent and grandparent network containers. A network container does
not inherit DHCP options defined at the Grid or member level.
Note the following about the DHCP option inheritance:
• For networks and shared networks, you can override an inherited DHCP option defined at the Grid or Member
level.
• A shared network without a parent network container continues to inherit DHCP options from its parent Grid or
member. The parent object is derived from the first network within the shared network.
• A network inherits DHCP option from its parent object. For example, if a network has a parent network container
parent and parent shared network parent, if a DHCP option is overridden on the shared network, then this
overridden value gets inherited. If the DHCP option is overridden on a network container, then this overridden
value gets inherited. Otherwise, the network continues to inherit from its parent Grid or member.
A Grid member can serve one network view only, but a network view can be served by multiple Grid members. DHCP
failover associations must be defined within a single network view, and both the primary and secondary peer must serve
the same network view.
The NIOS appliance provides one default network view. You can rename the default view and change its settings, but
you cannot delete it. There must always be at least one network view in the appliance. If you do not need to manage
overlapping IP address spaces in your organization, you can use the system-defined network view for all your networks.
You do not need to create additional network views. But if there are overlapping IP address spaces and you need more
than one network view, you can create up to 1000 network views.
Note
If there are more than 20 network views, the appliance lists the available network views in
the Network View Selector dialog box. If there are 20 or less than 20 network views, the appliance displays
them in the drop-down list.
Note
You need to install CP license before you configure a Grid with CP member. If you attempt to
add a network view without installing CP license, the Delegate To field shows the following
warning message:
There are no objects to select on the wizard.
NIOS does not display any warning message that prompts you to install the CP license.
Note
You cannot delete a network view that has a VLAN object assigned to it. For more information, see Assigning
VLANs to a Network.
Specifying Authoritative
Only authoritative DHCP servers can send clients DHCPNAK messages when they request invalid IP addresses. For
example, a client moves to a new subnet and broadcasts a DHCPREQUEST message for its old IP address. An
authoritative DHCP server responds with a DHCPNAK, causing the client to move to the INIT state and to send a
DHCPDISCOVER message for a new IP address. Authoritative servers also respond to DHCPINFORM messages from
clients that receive their IP addresses from the DHCP server and require additional options after the initial leases have
been granted.
Warning
Inadvertently selecting the Unlimited Lease Time checkbox could cause a network outage when the address
range runs out of IP addresses.
You can set a default lease time at the Grid level and then override this setting for specific members, network containers,
networks, IP address ranges or fixed addresses when appropriate.
Warning
Inadvertently selecting the Unlimited Lease Time checkbox could cause a network outage when the address
range runs out of IP addresses.
To set all other properties for a Grid or member, toggle to the advanced mode and select the General Advanced tab
to complete the following:
• Ignore Optionlist: Select Ignore optionlist requested by client and return all defined options if you want the
appliance to ignore the requested list of options in the DHCPREQUEST messages it receives from DHCP
clients, and to include all the configured options in the DHCPACK and DHCPOFFER messages it sends
back to the clients.
• LEASEQUERY: Select Allow LEASEQUERY to enable the DHCP server to respond to
DHCPLEASEQUERY messages.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
• Enabling this feature might have a significant performance impact on your appliance, depending on the
number of fixed addresses you have configured.
• This feature works only for fixed addresses outside of a DHCP range. If you make a change to a fixed
address inside a DHCP range, you must manually restart the DHCP service.
For Cloud Network Automation deployment, this feature is automatically enabled on the Cloud Platform Appliance that
has a valid Cloud Platform license installed. For information about Cloud Network Automation, see Deploying Cloud
Network Automation.
To enable immediate fixed address configuration:
1. Grid: From the Data Management tab, select the DHCP tab, and then click Grid DHCP Properties from the
Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> member checkbox, and then
click the Edit icon.
2. In the DHCP Properties editor, click Toggle Advanced Mode if the editor is in basic mode. When the additional
tabs appear, click the General tab -> Advanced tab and complete the following:
• Immediate FA Configuration: Select this checkbox to enable the new configuration immediately without
restarting DHCP service when you modify or delete a fixed address.
3. Save the configuration and restart DHCP service.
By default, the appliance pings the candidate IP address once and waits one second for the response. You can change
these default settings to better suit your environment. Though you can increase the ping or timeout value to
accommodate delays caused by problems in the network, increasing any of these values increases the delay a client
experiences when acquiring a lease. You can also disable the appliance from sending pings by changing the number of
pings to 0.
Note
One-lease-per-client enables a single lease per client on a per member basis, not on a Grid wide basis. Lease
information is not replicated among members. Note that you must restart the DHCP service for the changes to
take effect.
Note
This feature is applicable only to dynamic leases and does not have any effect on the static lease generated for
fixed addresses or roaming hosts.
Note
When you assign a failover association to serve DHCP ranges and networks, NIOS denies dynamic BOOTP
clients by default, regardless of whether you select or deselect the Deny BOOTP Requests option from Grid
Manager. However, if the DHCP ranges or networks are assigned to a single DHCP server (not a failover
association), NIOS does not automatically deny dynamic BOOTP clients. In this case, you must manually select
the Deny BOOTP Requests option through Grid Manager to ensure that NIOS denies BOOTP requests to avoid
problems such as receiving two IP addresses for the same network device.
You can configure BOOTP and PXE properties at the Grid level and override them for members, IPv4 network
containers, IPv4 networks, DHCP ranges, fixed addresses, and reservations, host addresses, and roaming hosts. You
cannot configure BOOTP and PXE properties for IPv6 DHCP objects.
To configure or override BOOTP and PXE properties:
1. Grid Level: From the Data Management tab, select the DHCP tab, and then click Grid DHCP Properties from the
Toolbar.
Member Level: From the Data Management tab, select the DHCP tab -> Members tab -> Members -> member
checkbox, and then click the Edit icon.
Network Level: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
checkbox, and then click the Edit icon.
Network Container: From the Data Management tab, select the IPAM tab -> network_container checkbox, and
then click the Edit icon.
DHCP Range Level: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks ->
network-> addr_range checkbox, and then click the Edit icon.
Fixed Address Level: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks ->
network ->fixed_address checkbox, and then click the Edit icon.
Note
Enter values in both the Next Server and Boot Server fields if some hosts on your network require the boot
server name and others require the boot server IP address.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note that a few characters need manual escaping when you configure a DHCP boot file name, in order to keep the
dhcpd.conf file consistent. If you do not use appropriate escape characters, then it might lead to a non working boot file
name. The following characters require manual escaping:
• '\t'- Tabulation character
• '\r'- Carriage return
• '\n'- New line
• '\b'- Bell
• '\xYY'- YY hex-number (a-f, 0-9)
or
'\x5cx86\x5ctopdir\x5csubdir\x5cfile.img'
High - Trigger 95
High - Reset 85
Low - Trigger 0
Low - Reset 10
Deny-BOOTP-Requests Disabled
DNS Servers
You can also create an option filter the appliance uses to filter address requests by the DHCP options of requesting
hosts. The filter instructs the appliance to either grant or deny an address request if the requesting host matches the
filter. For information, see Defining Option Filters.
The DHCP option configuration conforms to the following RFCs:
• RFC 2132, DHCP Options and BOOTP Vendor Extension
• RFC3046, DHCP Relay Agent Information Option. The supported options include option 60 (Client Identifier), 21
(Policy Filter), 22 (Maximum Datagram Reassembly Size), 23 (Default IP Time-to-Live), and 82 (Support for
Routed Bridge Encapsulation).
• RFC3925, Vendor-Identifying Vendor Options for Dynamic Host Configuration Protocol version 4 (DHCPv4)
• RFC2939, Procedures and IANA Guidelines for Definition of New DHCP Options and Message Types
Each DHCP option is identified by a name and an option code number, and specifies a data type. The data type for some
options is predefined. For example, in the DHCP option space, the data type for option 1: subnet-mask is an IP address.
You cannot change the data type for this option. The data type for some options is user-defined and can be in one of the
formats shown in the below table.
DHCP Option Data Types
String An ASCII text string (the same as the text data type) or a list of hexadecimal
characters separated by colons
8-, 16-, or 32-bit unsigned integer A numeric range of the following possible values
8-, 16-, or 32-bit signed integer A numeric range of the following possible values
When defining a hexadecimal string for a DHCP option (such as option 43, vendor encapsulated options), use only
hexadecimal characters (0-9, a-f, or A-F) without spaces and separated by colons. The accepted form for a hexadecimal
string, as presented in a regular expression, is [0-9a-fA-F]{1,2}(:[0-9a-fA-F]{1,2})*
Two examples of correctly written hexadecimal strings:
• aa:de:89:1b:34
• 1C:8:22:A3 (Note that the DHCP module treats a single hexadecimal character, such as "8" as "08".)
A few examples of incorrectly written hexadecimal strings:
• :bb:45:d2:1f – Problem: The string erroneously begins with a colon.
• bb:45:d2:1f: – Problem: The string erroneously ends with a colon.
• bb:4 5:d2:1f – Problem: The string erroneously includes a space between two characters ("4" and "5").
• bb:45:d2:1g – Problem: The string erroneously includes a nonhexadecimal character ("g").
The DHCP module treats incorrectly written hexadecimal strings as simple text strings, not hexadecimal strings. If the
string appears in quotes, it is a text string.
option 61 MyPC Double quotes are no longer needed for string type values
dhcp-client-identifier
Note
For information about the relay agent option, refer to RFC3046, DHCP Relay Agent Information Option.
In addition to the relay agent IDs, NIOS also supports the Option 82 Link Selection and Server ID Override sub-options,
which allow DHCPv4 to operate in a network architecture where direct communication between the DHCP server and
DHCP client is undesirable or infeasible. You can configure these sub-options to direct DHCP traffic to go through the
relay agent and have more control over your DHCP communications.
The Link Selection sub-option provides a mechanism to separate the subnet/link in which the DHCP client resides from
the GIADDR (Gateway IP address). The GIADDR field in a DHCP message is populated by the relay agent and is
typically used to inform the DHCP server about the subnet in which the DHCP client resides and to inform the DHCP
server of the IP address to use to communicate with the relay agent. In situations where the GIADDR might not be the
appropriate subnet from which IP addresses should be allocated, you can use the Link Selection sub-option to explicitly
set the subnet from which IP addresses are allocated to the client.
The Server ID Override sub-option allows the relay agent to tell the DHCP server what IP address, instead of the server's
address, must be used in the response. Generally, the response from the server contains the IP address of the DHCP
server itself in the Server-ID option. You can use the Server ID Override sub-option to specify a new value for the server
ID that is inserted in the reply packet by the DHCP server. Configuring the Server ID Override sub-option allows the relay
agent to have the clients send all unicast messages to the relay agent instead of the DHCP server.
Note
If you want the Link Selection and Server ID Override sub-options to be included in the DHCP relayed
messages, you must configure them on the DHCP relay agent. You cannot configure them on NIOS. For more
information about these sub-options, refer to https://tools.ietf.org/html/rfc3527 and https://tools.ietf.org/html/
rfc5107.
On the NIOS appliance, you can do the following with option 82:
• Screen address requests through a relay agent filter you set up using option 82. For more information, see About
Relay Agent Filters.
• Use the relay agent information (circuit ID or remote ID) as a host identifier when configuring a fixed address,
though you cannot do so in a host record. For information about how to configure a circuit ID or remote ID as an
identifier, see Adding IPv4 Fixed Addresses.
• Define how Grid Manager displays the relay agent ID, circuit ID, and remote ID (when applicable) in the detailed
lease information panel. For information about how to configure the logging format for option 82, see Defining
Logging Format for DHCP Option 82.
Note
You cannot override this Grid setting at the member level. Also, changing the logging format requires a DHCP
service restart.
Address usage in a DHCP range can trigger an event and an email notification when it crosses a watermark. You must
enable DHCP threshold and email warnings to receive events and notifications. The following are actions that do and do
not trigger an address usage event and notification:
Address usage triggers an event and the appliance sends a notification when the percentage of the allocated addresses
in the DHCP range:
• Exceeds the high watermark
• Drops below or equals to the high watermark after exceeding it
• Drops below the low watermark
• Exceeds the low watermark after dropping below it
Address usage does not trigger an event when the percentage of the allocated addresses in the DHCP range:
• Never exceeds the low watermark
• Initially exceeds the low watermark
Note
You can effectively disable address usage events for a DHCP range by setting its high watermark at 100% and
the low watermark at 0% (default setting for the low watermark). Because address usage cannot cross these
watermarks, no events can occur.
You can configure the threshold settings at the Grid level and override them at the member, network, and DHCP range
levels. To override an inherited DHCP property, click Override next to the property to enable the configuration. For
information, see Overriding DHCP Properties.
To configure thresholds:
1. Grid: From the Data Management tab, select the DHCP tab, and then click Grid DHCP Properties from the
Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> Members -> member
checkbox, and then click the Edit icon.
Network: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
checkbox, and then click the Edit icon.
Network Container: From the Data Management tab, select the IPAM tab -> network_container checkbox, and
then click the Edit icon.
DHCP Range: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
addr_range checkbox, and then click the Edit icon.
2. In the editor, select the IPv4 DHCP Thresholds tab and complete the following:
• DHCP Thresholds: Specify the following:
• Enable DHCP Thresholds: Select Enable DHCP Thresholds to enable the DHCP threshold
feature.
• High: Enter a number between 0 and 100. Enter Trigger and Reset values. If the
percentage of allocated addresses in a DHCP range exceeds the Trigger value, the
appliance makes a syslog entry and—if configured to do so—sends an SNMP trap and an
email notification to a designated destination. When the percentage first reaches the Reset
value after it hit the Trigger value, the appliance sends an SNMP trap and an email
notification to a designated destination. The default Trigger value is 95, and the default
Reset value is 85.
• Low: Enter a number between 0 and 100. If the percentage of allocated addresses in a
DHCP range drops below the Trigger value, the appliance makes a syslog entry and—if
configured to do so— sends an SNMP trap and an email notification to a designated
destination. When the percentage first reaches the Reset value after it hit the Trigger
value, the appliance sends an SNMP trap. The default Trigger value is 0 and the default
Reset value is 10.
• Enable SNMP Warnings: Select this for the appliance to send an SNMP trap to the trap receiver
that you define for the Grid when the address usage in a DHCP range crosses a high or low mark
threshold.
• Enable Email Warnings: Select this for the appliance to send an email notification to an
administrator if the address usage in a DHCP range crosses a high or low mark threshold.
• Email Addresses: Click Override to override the Grid administrator email address configured in the Data
Management tab -> Grid tab. This address is not hierarchically inherited from the Grid DHCP
configuration. Click the Add icon, and then enter an email address to which you want the appliance to
send email notifications when the DHCP range for the network crosses a threshold. You can create a list
of email addresses.
3. Save the configuration and click Restart if it appears at the top of the screen.
Scavenging Leases
The accumulation of free and backup DHCPv4 leases; and free, expired, and released DHCPv6 leases results in
unnecessary growth of database objects. The DHCP lease scavenging feature enables member DHCP servers to
automatically delete free and backup IPv4 leases; and free, expired, and released IPv6 leases that remain in the
database beyond the specified period of time, thus reducing the number of database objects.
When you enable this feature for DHCPv4 leases, the appliance permanently deletes the free and backup IPv4 leases,
and you can no longer view or retrieve the lease information. This option can be enabled globally at the Grid level, and
more specifically for a member, shared network, network, network container, DHCP range, network template, DHCP
range template.
When you enable this feature for DHCPv6 leases, the appliance permanently deletes the free, expired, and released
IPv6 leases, and you can no longer view or retrieve the lease information. This option can be enabled at the Grid level,
and overridden at the member level.
The period of time that you specify is the duration after the expiration date of a lease, not its release date. For example,
you specify a time period of 5 days when you enable this feature. If the lease time of an IP address is 10 days, but the
lease is released after five days, the appliance still deletes the lease from the database after 15 days because the IP
address has been leased.
Note
If you plan to enable this feature after upgrading from a previous NIOS version, Infoblox recommends that you
enable it during off-peak hours, as it may impact DHCP services.
Note
The DHCPv6 server offers the same lease for a DHCP client, identified by DUID, after the lease expires and
before the end of the grace period. The appliance removes the expired leases that are older than the grace
period from the database.
DHCPv6 lease affinity and DHCPv6 lease scavenging are complementary features. For example, consider a scenario in
which a visiting user gets an IPv6 lease that is retained for days, weeks, or months depending on the needs and then the
user leaves. If the user returns and the lease is still within the grace period, the user gets the same IPv6 lease. This is
lease affinity. When the user leaves, the IPv6 lease becomes inactive. This lease is scavenged after the grace period.
Note the following about DHCPv6 lease affinity:
• It does not consider expired leases that are older than the grace period.
• It ignores expired leases that do not match known ranges.
• If no existing lease is found, then the DHCPv6 server finds a suitable expired lease that is not older than the
grace period, which matches the client DUID and range configuration.
• The impact of the feature on the performance depends on the amount of expired DHCPv6 leases.
• When you activate the feature at the Grid level, it affects all underlying layers of inheritance.
• You cannot enable DHCPv6 lease affinity at the Grid and member levels during a scheduled full upgrade.
• DHCPv6 lease affinity remembers only permanent addresses and does not remember temporary addresses and
prefix delegations.
• If the DHCPv6 range is out of available addresses when you enable DHCPv6 lease affinity, then the DHCP server
tries to reuse the best abandoned lease, which indicates the lease that was abandoned longest time ago. If there
are no such leases in the pool, the DHCP server reuses the best expired lease, which indicates the lease that
expired longest time ago. This means that the expired lease becomes active and it is associated with the new
client while the DHCP server removes any previous associations of the corresponding lease. Note that this
happens only when the DHCPv6 range does not have any available addresses and there are no suitable
abandoned leases.
Note
The appliance stores the leases, which are either deleted or removed, in the recycle bin. These leases then
become free and are automatically dissociated from their clients. For example, if you delete a range
accidentally and restore it again, the IPv6 leases associated with the respective range are no longer associated
with the same set of clients.
Note
When you upgrade to a new NIOS release, the basic authentication credentials are retained if IF-MAP was
enabled and basic authentication was used before the upgrade.
• Enable IF-MAP publishing: Click Override to override the Grid setting. Select this checkbox to
enable IF-MAP publishing for all the networks that are served by this member. Ensure that you
enable IF-MAP at either the Grid or member level in order to enable IF-MAP publishing for all
networks.
4. Save the configuration and click Restart if it appears at the top of the screen.
Uploading Certificates
When you receive the certificate from the CA, the appliance finds the matching CSR and takes the private key associated
with the CSR and associates it with the newly imported certificate. The appliance then automatically deletes the CSR.
To import a certificate:
1. From the Data Management tab, select the DHCP tab -> Members tab -> member checkbox, and then click IF-
MAP Client Certificate -> Upload Certificate from the Toolbar.
2. Navigate to where the certificate is located and click Open.
3. If the appliance already has an existing IF-MAP client certificate, the new certificate replaces the existing one. In
the Replace IF-MAP Certificate Confirmation dialog box, click Yes.
Downloading Certificates
You can download the current certificate or a self-signed certificate. To download a certificate:
1. From the Data Management tab, select the DHCP tab -> Members tab -> member checkbox, and then click IF-
MAP Client Certificate -> Download Certificate from the Toolbar.
2. Navigate to where you want to save the certificate, enter the file name, and then click Save.
Note
You can mouse over on the informational icon next to the status to view detailed information.
Note
You can mouse over on the informational icon next to the status to view detailed information, including the
status description and the timestamp when the status initially changed.
• IF-MAP Last Update: The timestamp the status of the IF-MAP service was last updated. For example, if the IF-
MAP connection status is Running and this field shows 2011-11-20 12:30:42 EST, it means that an IF-MAP
operation, such as a publish, was last completed on November 20, 2011 at 12:30:42 Eastern Standard Time.
To view status information about the IF-MAP connection on an independent appliance, from the Data Management tab ->
DHCP tab, click System DHCP Properties from the toolbar. The appliance displays the following:
• IF-MAP Connection: The status of the IF-MAP service on the independent appliance. A color icon associated with
the connection status appears before the status.
• IF-MAP Connection Information: Detailed information about the status. On a Grid member, this information
appears when you mouse over on the informational icon.
• IF-MAP Last Update: The timestamp when the status of the IF-MAP service last changed.
Note
For more information about these fields, see descriptions about Grid member status in this section.
You can view detailed information about a specific member by clicking the member link. Grid Manager displays the
following information about the selected member:
• Network: The network assigned to the member.
• Comment: The information about the network.
• IPv4 DHCP Utilization: The percentage of the DHCP usage of the network. This is the percentage of the total
number of fixed addresses, reservations, hosts, and active leases on the network over the total IP addresses in
the range, excluding the number of addresses on the network. Note that only enabled objects are included in the
calculation. It does not include abandoned addresses or leases.
• Site: The site to which the DHCP object belongs. This is one of the predefined extensible attributes. In the
member panel, you can select the following additional fields for display:
• Disabled: Indicates whether the member is disabled or not.
• IPAM Utilization: When you define a network, this is the percentage based on the IP addresses in use divided by
the total addresses in the network. For example, in a /24 network, if there are 25 static IP addresses defined and
a DHCP range that includes 100 addresses, the total number of IP addresses in use is 125. Of the possible 256
addresses in the network, the IPAM utilization is about 50% for this network.
When you define a network container that contains subnets, this is the percentage of the total address space
defined within the container regardless of whether any of the IP addresses in the subnets are in use. For example,
Note
The appliance does not search for deleted leases in the Recycle Bin.
When multiple users simultaneously request for the next available network or IP address, the appliance returns the same
unused network or IP address to all users. The user who first saves the task gets the next available network or IP
address. In some cases, other users get an error message telling them that the network or IP address is not available
when they save their tasks. They can then request another unused network or IP address or enter a new one.
After you create IPv4 networks, you can combine them into shared networks or create ranges and fixed addresses.
A Grid member can serve only one network view. Similarly, a Microsoft server can serve only one network view.
Therefore when you assign Grid members to networks, you must assign the members to networks in the same network
view. For information, see Managing IPv4 DHCP Data.
If you have enabled support for RIR (Regional Internet Registry) updates and are adding an RIR IPv4 network container
or network to NIOS, Grid Manager displays an RIR section in the Add IPv4 Network wizard. You must enter RIR related
information in this section in order for NIOS to associate the newly added network with an RIR organization. For more
information about RIR address allocation and updates, see RIR Registration Updates.
Or
• Click the Next Available icon to have the appliance search for the next available network.
Complete the following in the Next Available Networks section:
• Create new network(s) under: Enter the network container in which you want to create the new
network. When you enter a network that does not exist, the appliance adds it as a network
container. When you enter a network that is part of a parent network, the parent network is
converted into a network container if it does not have a member assignment or does not contain
overlapping address ranges, fixed addresses, reservations, shared networks, and host
records. When you enter a network that has a lower CIDR than an existing network, the appliance
creates the network as a parent network and displays a message indicating that the newly created
network overlaps an existing network. You can also click Select Network to select a specific
network in the Network Selector dialog box. For information about how the appliance searches for
the next available network, see Obtaining the Next Available.
• Number of new networks: Enter the number of networks you want to add to the selected network
container. Note that if there is not enough network space in the selected network to create the
number of networks specified here, Grid Manager displays an error message. The maximum
number is 20 at a time. Note that when you have existing networks in the table and you select
one, the number you enter here includes the selected network.
• Click Add Next to add the networks. Grid Manager lists the networks in the table. You can click
Cancel to reset the values.
Note
You must click Add Next to add the network container you enter in the Next Available Networks section. If you
enter a network in the Next Available Networks section and then use the Add icon to add another network, the
appliance does not save the network you enter in the Next Available Networks section until you click Add Next.
Note
If you have selected No at the parent network (disabled synchronization) and if you try to select Yes when
adding a child network, the appliance returns an error. This means that you cannot override the settings at the
child level if you have already restricted synchronization at the parent network.
• Use Inherited Setting: Select this is to inherit synchronization settings from the parent object.
• Automatically Create Reverse-Mapping Zone: This function is enabled if the netmask of the network equals /8, /
16, or /24. Select this to have the appliance automatically create reverse-mapping zones for the network. A
reverse-mapping zone is an area of network space for which one or more name servers have the responsibility
for responding to address-to-name queries. These zones are created in the DNS view assigned to receive
dynamic DNS updates at the network view level.
• Disable for DHCP: Select this if you do not want the DHCP server to provide DHCP services for this network at
this time. This feature is useful when you are in the process of setting up the DHCP server. Clear this after you
have configured the server and are ready to have it serve DHCP for this network. Note that disabling an IPv4
network may take a longer time to complete depending on the size of the data.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For information,
see Deploying Cloud Network Automation.
Or
• Add Microsoft Server: Select this option to add a Microsoft server as a DHCP server for the
network. Select the Microsoft server from the Microsoft Server Selector dialog box.
6. Click Next to associate Active Directory Sites with the network. For more information, see Associating Active
Directory Sites with Networks.
7. Click Next to override DHCP properties as described in Configuring DHCP Properties. This only applies if you
are adding a network that is served by an Infoblox Grid member.
Or
Note
You cannot leave an optional RIR attribute value empty. If you do not have a value for an RIR attribute, you
must delete it from the table. You can enter up to 256 characters for all RIR attributes.
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks.
Viewing Networks
You can view IPv4 networks from the IPAM tab -> Net Map and List panels. The Net Map panel provides a graphical view
of your networks and the List panel displays the networks in table format. For more information, see IPv4 Network Map
and IPAM Home.
You can also view a list of IPv4 and IPv6 networks in the DHCP tab -> Networks tab -> Networks panel. This panel
displays all IPv4 and IPv6 networks.
In any of these panels, you can use filters or the Go to function to navigate to a specific network. You can also create a
quick filter to save frequently used filter criteria. For information, see Using Quick Filters. You can add, delete, or edit a
network. You can also monitor the DHCP utilization of a selected network.
When viewing networks, you can choose to view them in one of the following views:
• Click Toggle Hierarchical View to view networks hierarchically in a parent-child structure (networks in a network
container). You can view detailed information about the networks by clicking the network link and drilling down to
the lowest hierarchical level, and then opening a network. To go back to a previous hierarchical view, click the link
of the corresponding level in the breadcrumb. The hierarchical view is the default view.
• Click Toggle Flat View to display a flat list of all networks and network containers. The parent and child networks
are listed separately in the flat view.
Depending on where you view your networks, Grid Manager displays some of the following information by default. You
can also select specific information for display.
• Network: The network address.
You can also modify some of the data in the table. Double-click a row of data, and either edit the data in the field or select
an item from a drop-down list. Note that some fields are read-only. For more information about this feature, see Modifying
Data in Tables. You can edit values of inheritable extensible attributes by double-clicking on the respective row. If an
extensible attribute has an inherited value, then the cell is highlighted in blue when you perform an inline editing. The
Descendant Actions dialog box is displayed when you click Save. For information, see Managing Inheritable Extensible
Attributes at the Parent and Descendant Level. If you delete the value of an inheritable extensible attribute at the parent
level, you can choose to preserve the descendant value or remove it. For information, see Deleting Inheritable Extensible
Attributes Associated with Parent Objects.
Or
From the Data Management tab, select the IPAM tab -> network checkbox, and then click the Edit icon.
2. The IPv4 Network editor contains the following basic tabs from which you can modify data:
• Genera Basic: You can modify the following fields:
• Comment: The information you entered for the network.
• Disabled: This field is displayed only if the selected network is a network without a child network
under it. You can disable and enable existing networks instead of removing them from the
database, if the selected network does not have a child subnet. This feature is especially helpful
when you have to move or repair the server for a particular network. Note that disabling an IPv4
network may take a longer time to complete depending on the size of the data.
Restricting synchronization of a network
• Disable sync to MGM: Select this checkbox to disable synchronization of a network from the
managed Grid to the Multi-Grid Master. This checkbox is available only on the managed Grid
when it remains joined with the Multi-Grid Master.
When the Cloud Network Automation license is installed on the Grid Master, Grid Manager displays the following
information in the Cloud section: Cloud Usage, Owned By, and Delegated To. You cannot modify these fields. For
more information, see Viewing Networks.
• Member Assignment: Add or delete a Grid member that provides DHCP services for this network. For
information, see Adding IPv4 Networks.
Note
Discovery blackout settings also can be defined for DHCP ranges.
• RIR Registration: Modify RIR network information. This tab appears only when support for RIR updates is
enabled. For information, see Modifying RIR Network Data.
• Extensible Attributes: Add and delete extensible attributes that are associated with a specific network. You
can also modify the values of the extensible attributes. For information, see About Extensible Attributes.
You can edit values of inheritable extensible attributes by -clicking on the respective column. If an
extensible attribute has an inherited value, then the cell is highlighted in blue when you perform inline
editing. The Descendant Actions dialog box is displayed when you click Save. For information, see
Managing Inheritable Extensible Attributes at the Parent and Descendant Level. If you delete the value of
an inheritable extensible attribute at the parent level, you can choose to preserve the descendant value or
remove it. For information, see Deleting Inheritable Extensible Attributes Associated with Parent Objects.
• Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions.
3. Optionally, click Toggle Advanced Mode to display the following tabs from which you can modify advanced data.
• General Advanced: You can associate zones with a network. For information, see Associating Networks
with Zones.
• IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the network.
Note that you must click Override and select Enable DDNS updates for the DDNS settings you configure
in this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients.
• IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for
the network. For information, see Configuring IPv4 BOOTP and PXE Properties.
• Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter. For
information, see Applying Filters to DHCP Objects.
• IPv4 DHCP Thresholds: Keep the inherited thresholds settings or override them and enter unique settings
for the network. For information, see Configuring Thresholds for DHCP Ranges.
4. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. In the Schedule
Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks.
Note
• Any Port reservation associated with the deleted network will also be deleted without user intervention.
• Deleting and restoring an IPv4 network may take a longer time to complete depending on the size of the
data.
• You cannot delete a network that has a VLAN object assigned to it. For more information, see Assigning
VLANs to a Network.
Before creating a shared network, you must first create the subnets. For example, you must first create the networks
10.32.1.0 and 10.30.0.0 before designating them to a shared network. For more information, see About Shared
Networks.
In this panel, you can use filters or the Go to function to navigate to a specific network. You can also create a quick filter
to save frequently used filter criteria. For information, see Using Quick Filters.
You can sort the list of networks in ascending or descending order by columns. For information about customizing tables
in Grid Manager, see Customizing Tables.
You can also modify some of the data in the table. Double-click a row of data, and either edit the data in the field or select
an item from a drop-down list. Note that some fields are read-only. For more information about this feature, see Modifying
Data in Tables.
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a date,
time, and time zone. For information, see Scheduling Tasks.
Note
Steps 6-7 apply only in deployments using Network Insight discovery features. Otherwise, skip to Step 8.
Note
When you change the member assignment of DHCP ranges from Failover Association to Grid
Member and then back to Failover Association, the leases in the primary and secondary servers
fall out of sync. To resynchronize the peers, the failover association of the secondary server is
put in the Recover-Wait state for the entire duration of Maximum Client Lead Time while a forced
recovery takes place. During this period, only the IP addresses allocated to the primary server
are available for lease.
• IPv4 DHCP Options: Keep the inherited DHCP options or override them and enter unique settings for the
DHCP range. For information, see Defining IPv4 DHCP Options.
• Extensible Attributes: You can add and delete extensible attributes that are associated with a specific
DHCP range. You can also modify the values of extensible attributes. For information, see Using
Extensible Attributes. You can edit values of inheritable extensible attributes by double clicking on the
respective column. If an extensible attribute has an inherited value, then the cell is highlighted in blue
when you perform an inline editing. The Descendant Actions dialog box is displayed when you click Save.
For information, see Managing Inheritable Extensible Attributes at the Parent and Descendant Level. If
you delete the value of an inheritable extensible attribute at the parent level, you can choose to preserve
the descendant value or remove it. For information, see Deleting Inheritable Extensible Attributes
Associated with Parent Objects.
• Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify advanced
data.
• IPv4 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the DHCP
range. Note that you must click Override and select Enable DDN Supdates for the DDNS settings you
configure in this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients.
• IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for
the DHCP range. For information, see Configuring IPv4 BOOTP and PXE Properties.
• Exclusion Ranges: Configure a range of IP addresses that the appliance does not use to assign to clients.
You can use these exclusion addresses as static IP addresses. Enter the start and end addresses of the
exclusion range, and optionally, enter information about this exclusion range.
• IPv4 DHCP Thresholds: Keep the inherited thresholds settings or override them and enter unique settings
for the DHCP range. For information, see Configuring Thresholds for DHCP Ranges.
• Filters: You can keep the inherited IPv4 logic filters or override them and add a new IPv4 logic filter. For
information, see Applying Filters to DHCP Objects.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration and click Restart if it appears at the top of the screen.
or
Click the Schedule icon at the top of the wizard to schedule this task. In the Schedule Change panel, enter a date,
time, and time zone. For information, see Scheduling Tasks.
Note
The IPv4 DHCP Options tab is enabled when you select a Grid Member or IPv4 DHCP Failover Association in
the Member Assignment tab.
• Allow/Deny Clients
• Known Clients: Select this checkbox, and then select Allow or Deny from the drop-down list to
assign or deny IP addresses within this range to known DHCP clients. Known DHCP clients
include roaming hosts and clients with fixed addresses or DHCP host entries. Note that the
appliance cannot deny an IP address to a fixed address within this range. You must disable the
fixed address if you do not want it to obtain an IP address here.
• Unknown Clients: Select this checkbox, and then select Allow or Deny from the drop-down list to
assign or deny IP addresses within this range to unknown DHCP clients. Unknown DHCP clients
include clients that are not roaming hosts and clients that do not have fixed addresses or DHCP
host entries.
• Deny Leases: Select Deny all lease requests for this range to deny all lease requests from DHCP clients.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
You cannot use the same circuit ID or remote ID for different fixed addresses if the addresses are in the same
network or the same shared network.
d. Name: Enter a name for the Fixed Address. This field is required if the network is served by a Microsoft
server. For information, see Adding Fixed Addresses/Microsoft Reservations.
e. Comment: Optionally, enter additional information about the fixed address.
f. Disabled: Select this if you do not want the DHCP server to allocate this IP address at this time.
The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master. For information,
see Deploying Cloud Network Automation. This section displays the following information:
• Cloud Usage: This field indicates whether this object is associated with any specific cloud extensible attributes or
within a scope of delegation. It can be one of the following:
• Cloud from adapter: Indicates that this object has been created by a cloud adapter and it may or may not
be within a scope of delegation at the moment.
• Cloud from delegation: Indicates that this object is within the scope of delegation or the object itself
defines a scope of authority delegation, and it is not created by a cloud adapter.
• Used by cloud: Indicates that this network or network container is associated with the extensible attribute
Is External or Is Shared and the value is set to True, which implies the network is a private or shared
network managed by the CMP, and it is not Cloud from adapter or Cloud from delegation.
• Non-cloud: The object is a regular NIOS object and is not within the scope of any authority delegation nor
is it associated with any of these extensible attributes: Cloud API Owned, Is External or Is Shared. NIOS
admin users can modify this object based on their permissions.
• Owned By: A cloud object can be owned by the Grid Master or the cloud adapter. When the object is created by
the Grid Master, this shows Grid. If the object is created by the cloud adapter, this shows Adapter.
Delegate authority from the Grid Master
• Delegate To: This field indicates whether the authority for the object you want to create has already been
delegated. If so, it displays the name of the delegation.
4. (Optional) Click Next to configure or override DHCP options as described in About IPv4 DHCP Options.
5. (Applies only to Network Insight) This step is not required for creating a new Fixed Address. In the following
Wizard step, you can optionally define the following identification values and settings for the new object's port
reservation:
• Choose the Device Type: Router, Switch-Router, Switch, MSFT (Microsoft) Server, NetMRI, NIOS,
VNIOS, or ESX (VMware) Server.
The values on this page are not required for defining the actual port reservation in a later wizard step.
Certain device types could be descriptively relevant based on the type of object you are creating. As an
example, the MSFT Server designator helps identify the new object as a Microsoft Hyper-V Host. The
ESX Server designator can be used to identify the new object as a VMware ESX Host. These values are
not required and will not affect the functionality of the object.
• Choose the Device Vendor: Cisco, Juniper, Aruba, Dell, Infoblox, or HP.
• You can also enter a Location and a Description. These values are advisory and not required for
configuration.
Note
For descriptions of SNMP credentials for discovery, see the section Configuring SNMP1/
v2 Credentials for Polling and Configuring SNMPv3 Properties. These Grid-based values are inherited, by
default, by each new object you create.
• For the new object, you can check the Override CLI Credentials checkbox to override the inherited set of CLI
credentials taken from the Grid level. This set of credentials may be used for the device that is directly associated
with the new object in its port reservation.
• You can also click Test CLI Credentials to enter and test a set of CLI login credentials against a device based on
its IP address.
Port control operations require CLI credentials for the involved devices. (If you are not using port control for the
new object, usage of CLI credentials is optional.) Because some IPAM and DHCP objects will use port control
features as part of object creation, CLI credentials are automatically leveraged as part of discovery. Ensure you
have the correct sets of CLI credentials for devices in your network. For more information, see the section
Configuring CLI Discovery Properties.
• SSH is the default for CLI operations. Check the Allow Telnet checkbox if you know the device involved in the
object assignment may support Telnet but may not support SSH, or if you want Telnet as an option.
Note
All port configuration operations require CLI credentials to be entered into Grid Manager. Because some
IPAM and DHCP objects will use port control features as part of object creation, CLI credentials are
automatically leveraged as part of discovery. Ensure you have the correct sets of CLI credentials for
devices in your network.
7. Click Next to define port connectivity for the device port that will be associated with the new object. This step is
not required for creating a new Fixed Address. This feature set is also termed portcontrol in the NIOS/Grid Manager
system. The device whose interface the new Fixed Address will be associated should already be discovered by
Network Insight.
• After choosing the device, choose the Interface with which the port reservation will be bound. The drop-
down list shows only interfaces that are most recently found to be available by Grid Manager during the
last discovery cycle.
• The Wizard page also shows a list of any VLANs that are currently configured in the chosen device (The
following VLANs are configured). This Wizard page allows only the assignment of an existing VLAN in the
chosen device to the new port reservation.
• Check the Configure Port checkbox to define port control settings for the port reservation.
• Choose the Data VLAN and/or the Voice VLAN settings you may need for the port assignment.
Depending on the selected device, you may or may not be able to apply VLAN settings.
• Set the Admin Status to Up if you need to activate the port after assignment in the current task.
All port control operations require CLI credentials to be configured. Because some IPAM and DHCP
objects will use port control features as part of object creation, CLI credentials are automatically leveraged
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks. You
cannot schedule this task when you are creating an object that is within a delegated scope.
For information on viewing fixed addresses and other DHCP objects, see Viewing IPv4 DHCP Objects.
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks. You
cannot schedule this task when you are creating an object that is within a delegated scope.
Note
NIOS removes all the static leases associated with a fixed address when you delete a fixed address out of the
DHCP range, regardless of the selection of
the Delete associated leases with the fixed address (selected fixed IP address) checkbox in
the Delete Confirmation dialog box.
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In the Schedule Change
panel, enter a date, time, and time zone. For information, see Scheduling Tasks .
To create a reservation:
1. Navigate to the network to which you want to add a reservation, and then select IPv4 Reservation from the Add
drop down menu.
or
From any panel in the DHCP tab, expand the Toolbar and click Add -> IPv4 Reservation.
2. In the Add Reservation wizard, select one of the following and click Next:
• Add Reservation
or
• Add Reservation using Template
Click Select Template and select the template that you want to use. Note that when you use a template to
create a reservation, the configurations of the template apply to the new address. The appliance
automatically populates the reservation properties in the wizard. You can then edit the pre-populated
properties.
3. Complete the following:
• Network: The displayed network address can either be the last selected network or the network from
which you are adding the DHCP range. If no network address is displayed or if you want to specify a
different network, click Select Network. When there are multiple networks, Grid Manager displays the
Select Network dialog box from which you can select one.
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks. You
cannot schedule this task when you are creating an object that is within a delegated scope.
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks. You
cannot schedule this task when you are creating an object that is within a delegated scope.
Note
When you change the member assignment of DHCP ranges from Failover Association to Grid
Member and then back to Failover Association, the leases in the primary and secondary servers
fall out of sync. To resynchronize the peers, the failover association of the secondary server is
put in the Recover-Wait state for the entire duration of Maximum Client Lead Time while a forced
recovery takes place. During this period, only the IP addresses allocated to the primary server
are available for lease.
• IPv4 DHCP Options: Keep the inherited DHCP options or override them and enter unique settings for the
template. For information, see Defining IPv4 DHCP Options.
• Extensible Attributes: Add and delete extensible attributes that are associated with this template. You can
also modify the values of the extensible attributes. For information, see Using Extensible Attributes.
• Permissions: This tab appears only if you belong to a superuser admin group. For information, see About
Administrative Permissions.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify data:
• IPv4DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the template.
For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients.
• IPv4 BOOTP/PXE: Keep the inherited BOOTP properties or override them and enter unique settings for
the template. For information, see Configuring IPv4 BOOTP and PXE Properties.
• Exclusion Ranges: Configure a range of IP addresses that the appliance does not use for dynamic
address assignments. Complete the following:
• Offset: An offset for an exclusion range determines the start IP address of the exclusion range.
The appliance adds the offset value you enter here to the start IP address of the DHCP range
created using this template. That IP address becomes the start IP address of the exclusion range.
• Number of Addresses: Enter the number of IP addresses to be included in the exclusion range.
• Comment: Enter useful information about the exclusion range.
• IPv4 DHCP Thresholds: Keep the inherited thresholds settings or override them and enter unique settings
for the template. For information, see Configuring Thresholds for DHCP Ranges.
4. Save the configuration and click Restart if it appears at the top of the screen.
Note
Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
Note
The appliance uses the offset and number of addresses only when this template is used in a network template.
4. Click Next to configure or override DHCP options as described in Defining IPv4 DHCP Options.
5. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes.
6. Save the configuration and click Restart if it appears at the top of the screen.
Note
When you select this for the network template, all range and fixed address templates that you want to associate
with this network template must also be enabled for "Use for cloud delegation."
Use the following steps to create the sample network template (shown in the above figure).
1. Create the following DHCP range templates. For information, see Adding IPv4 Range Templates.
• Server template with the following values:
• Name: Servers
• Offset: 2
• Number of Addresses: 10
• Comment: Address range 2 to 11 for Servers
• Printer template with the following values:
• Name: Printers
• Offset: 12
• Number of Addresses: 10
• Comment: Address range 12 to 21 for printers.
• Workstation template with the following values:
• Name: Workstations
• Offset: 32
• Number of Addresses: 100
• Comment: Address range 32 to 131 for DHCP on workstations
Note
Infoblox does not support global IPv6 prefix delegation for IPv6 range templates.
Note
The appliance uses the offset and number of addresses only when this template is used in a network template.
4. Click Next to configure or override DHCP options as described in Defining General IPv6 Properties.
5. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes.
6. Save the configuration.
Note
You cannot configure the following DHCP options in an IPv6 network template: server-id (Option 2), preference
(option 7), and unicast (Option 12). These options are valid only for a DHCP member.
When you enable support for RIR updates, you can create IPv6 network templates specific for RIR associated networks.
For information about RIR updates, see RIR Registration Updates.
You can also configure network templates for cloud delegation if you have deployed the Cloud Network Automation on
the Grid Master. If you select a default Cloud Platform Appliance for a template, all networks you create using this
template will delegate authority to the same Cloud member. Note that when a Cloud member is removed from the Grid,
the delegation will also be removed from the template. For information about Cloud Network Automation, see Deploying
Cloud Network Automation.
Viewing Templates
To view a list of all IPv4 and IPv6 DHCP templates:
1. From the Data Management tab, select the DHCP tab -> Templates tab.
2. Grid Manager displays the following information:
• Name: The name of the template.
• Type: The template type, such as IPv4 Network Template or IPv6 Network Template.
• Comment: The information you entered about the template.
• Site: The site to which the template belongs. This is one of the predefined extensible attributes.
You can select predefined and user defined extensible attributes for display. You can also do the following in this panel:
• Modify some of the data in the table. Double click a row of data, and either edit the data in the field or select an
item from a drop-down list. Note that some fields are read-only. For more information about this feature, see
Modifying Data in Tables.
• Sort the displayed data in ascending or descending order by column.
• Delete a selected template or multiple templates. For information, see Deleting Templates.
• Use filters and the Goto function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Goto field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters.
• Select an object and edit its information.
• Print or export the data in the panel.
Deleting Templates
To delete a template:
1. From the Data Management tab, select the DHCP tab -> Templates tab -> template checkbox, and then click the
Delete icon.
2. In the Delete Confirmation dialog box, click Yes.
Note
You must click Add Next to add the network container you enter in the Next Available Networks section. If you
enter a network in the Next Available Networks section and then use the Add icon to add another network, the
appliance does not save the network you enter in the Next Available Networks section until you click Add Next.
• Comment: Enter additional information about the network, such as the name of the organization it serves.
• Automatically Create Reverse-Mapping Zone: This function is enabled if the netmask of the network is a
multiple of four, such as 4, 8, 12 or 16. Select this to have the appliance automatically create reverse-
mapping zones for the network. A reverse-mapping zone is an area of network space for which one or
more name servers have the responsibility for responding to address-to-name queries. These zones are
created in the DNS view assigned to receive dynamic DNS updates at the network view level.
• Disable for DHCP: Select this if you do not want the DHCP server to provide DHCP services for this
network at this time. This feature is useful when you are in the process of setting up the DHCP server.
Clear this after you have configured the server and are ready to have it serve DHCP for this network. Note
that disabling an IPv6 network may take a longer time to complete depending on the size of the data.
• The Cloud section appears when the Cloud Network Automation license is installed on the Grid Master.
For information, see Deploying Cloud Network Automation. To delegate authority for this network,
complete the following:
Delegate authority from the Grid Master
• Delegate To: This field indicates whether the authority for the network you want to create has already
been delegated to a Cloud Platform Appliance. Click Select to choose the Cloud Platform Appliance to
which you want to delegate authority. The Member Selector displays only Cloud Platform Appliances in
the Grid. Click the member, and Grid Manager displays the member name next to this field. This cloud
member now assumes authority for this network, and the Grid Master does not have authority any more.
You can also click Clear to remove authority delegation from the selected Cloud Platform Appliance and
return authority back to the Grid Master.
7. Click Next and add one or more Grid members as DHCP servers for the network.
• Click the Add icon and select a Grid member from the Member Selector dialog box. Note that, some
DHCP properties for the network are inherited from this member. The network can be served by multiple
members, but a member can serve networks in one network view only.
Note
You cannot leave an optional RIR attribute value empty. If you do not have a value for an RIR attribute, you
must delete it from the table. You can enter up to 256 characters for all RIR attributes.
You need to assign a Subscriber Member Site to add subscriber service related extensible attributes in order to
populate Subscriber Cache.
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks.
Note
Discovery blackout settings also can be defined for DHCP ranges.
• RIR Registration: Modify RIR network information. This tab appears only when support for RIR updates is
enabled. For information, see Modifying RIR Network Data.
• Extensible Attributes: Add and delete extensible attributes that are associated with a specific network. You
can also modify the values of the extensible attributes. For information, see Managing Extensible
Attributes.
• Permissions: This tab appears only if you belong to a superuser admin group. For information, see
Managing Permissions.
3. Optionally, you can click Toggle Advanced Mode to display the following tabs from which you can modify advanced
data.
• General Advanced: You can associate zones with a network. For information, see Associating Networks
with Zones.
• IPv6 DDNS: Keep the inherited DDNS settings or override them and enter unique settings for the network.
Note that you must click Override and select Enable DDNS updates for the DDNS settings you configure
in this tab to take effect. For information, see Enabling DDNS for IPv4 and IPv6 DHCP Clients.
• Filters: You can keep the inherited IPv6 logic filters or override them and add a new IPv6 logic filter. For
information, see Applying Filters to DHCP Objects.
Note that Grid Manager displays both the basic and advanced tabs the next time you log in to the GUI.
4. Save the configuration or click the Schedule icon at the top of the wizard to schedule this task. In the Schedule
Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks.
Note
You cannot delete a network that has a VLAN object assigned to it. For more information, see Assigning VLANs
to a Network.
Note
IPv6 fixed addresses do not support dynamic DNS updates.
Note
At any time during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks.
Note
For descriptions of SNMP credentials for discovery, see the section Configuring SNMP1/
v2 Credentials for Polling and Configuring SNMPv3 Properties. These Grid-based values are inherited, by
default, by each new object you create.
• For the new object, you can check the Override CLI Credentials checkbox to override the inherited set of
CLI credentials taken from the Grid level. This set of credentials may be used for the device that is directly
associated with the new object in its Port Reservation.
• You can also click Test CLI Credentials to enter and test a set of CLI login credentials against a device
based on its IP address.
Port control operations require CLI credentials for the involved devices. (If you are not using port control
for the new object, usage of CLI credentials is optional.) Because some IPAM and DHCP objects will
use port control features as part of object creation, CLI credentials are automatically leveraged as part
of discovery. Ensure you have the correct sets of CLI credentials for devices in your network. See the
section Configuring CLI Discovery Properties for related information.
• SSH is the default for CLI operations. Check the Allow Telnet checkbox if you know the device involved in
the object assignment may support Telnet but may not support SSH, or if you want Telnet as an option.
Note
All port control operations require CLI credentials to be entered into Grid Manager. Because some IPAM and
DHCP objects will use port control features as part of object creation, CLI credentials are automatically
leveraged as part of discovery. Ensure you have the correct sets of CLI credentials for devices in your network.
7. Click Next to define the port reservation for the device port that will be associated with the new Fixed Address.
This step is not required for creating a new Fixed Address. This feature set is also termed port control in the NIOS/
Grid Manager system. The device to which the new Fixed Address will be associated should already be discovered
and managed from the Grid Manager.
• Begin by checking the Reserve Port checkbox. Note that reserving a switch port does not guarantee its
availability.
Optionally, you can skip connecting port configuration by clicking Next.
Click the Clear button to remove the selected device from the configuration.
• Click the Select Device button to choose the device for which the port reservation will be associated. You
should know the identity of the device to whose interface the new object will be associated before taking
this step. For more information, see the section Using the Device Selector.
• After choosing the device, choose the Interface with which the port reservation will be bound. The drop-
down list shows only interfaces that are most recently found to be available by Grid Manager during the
last discovery cycle. This list will not include any ports that are Administratively Up and Operationally Up,
or that are otherwise already assigned to other networks or objects.
Note
At any step during the wizard, you can click Schedule for Later to schedule the task. In
the Schedule Change panel, enter a date, time, and time zone. For information, see Scheduling Tasks. You
cannot schedule this task when you are creating an object that is within a delegated scope.
For information on viewing IPv6 fixed addresses in a network, see Viewing IPv6 DHCP Objects.
• DHCP Failover
• Configuring Failover Associations
• Managing Failover Associations
DHCP Failover
You can create a failover association between two DHCP servers (a primary server and a secondary) and assign the
failover association to serve an IPv4 DHCP range. When you set up a failover association, you greatly reduce DHCP
service downtime if one of your DHCP servers is out of service. You can better manage IP address requests by making
two servers available for DHCP services. You can also configure one of the servers to assume full DHCP services when
you know the other server may go out of service for a period of time.
You can configure two NIOS appliances, or one appliance and one external server, to form a failover association. The
pairing of a primary and secondary server is called a peer association. The failover peers establish a TCP connection for
their communication. They share a pool of IP addresses that they allocate to hosts on their networks based on load
balancing. Load balancing is a technique to split the address allocation workload evenly across the two DHCP servers.
You can assign a DHCP failover association to serve DHCP ranges in a network. A DHCP failover association can serve
DHCP ranges that belong to one network view only. It cannot serve ranges in different network views.
Note
When you assign a failover association to serve DHCP ranges and networks, NIOS denies dynamic BOOTP
clients by default, regardless of whether you select or deselect the Deny BOOTP Requests option from Grid
Manager. However, if the DHCP ranges or networks are assigned to a single DHCP server (not a failover
association), NIOS does not automatically deny dynamic BOOTP clients. In this case, you must manually select
the Deny BOOTP Requests option through Grid Manager to ensure that NIOS denies BOOTP requests to avoid
problems such as receiving two IP addresses for the same network device. For information about how to deny
BOOTP requests, see Configuring IPv4 BOOTP and PXE Properties.
Related topic
Configuring DHCP Failover
Note
If both the primary and secondary servers are in a Grid, you configure the properties on the failover association
and the configuration applies to both servers.
2. Create a failover association and configure load balancing between the servers. For information, see Adding
Failover Associations.
• Ensure that you use the same failover association name on both the primary and secondary servers.
• The appliance assigns default values to the failover timers and triggers. In general, these default values
serve the purpose of a failover. Do not change these values unless you understand the ramification of the
changes. For example, when one of the peers in a failover association fails, the other peer goes into a
COMMUNICATIONS-INTERRUPTED state, and the lease time changes to the MCLT (Maximum Client
Lead Time). You should consider how the MCLT affects the lease time when a failover occurs if you want
to change this value.
3. Assign the failover association to the DHCP ranges in the same network view. Failover associations can serve
only IPv4 DHCP ranges. For information, see Configuring IPv4 Address Ranges.
• If you configure a shared network, and the subnets in the shared network contain ranges served by a
DHCP failover association, both the primary and secondary DHCP server must have the same shared
networks defined, containing the same networks and DHCP ranges.
Note
If you have multiple networks that are in a shared network and you plan to use a DHCP failover, you must use
the same failover association and specify the same peers on all the networks in the shared network.
4. Enable DHCP on the primary and secondary servers AFTER you complete all the configurations. For
information, see Managing Failover Associations.
Note
When you set up a failover association for the first time, ensure that both servers are up and running and their
databases are synchronized before they can start assigning IP addresses.
When you configure a failover association, the appliance assigns default values for timers and triggers, such as the
MCLT and the maximum number of "unacked" packets. A failover may occur when some of the timers expire or when a
failover peer goes out of service. When a failover occurs, the functional peer takes over and assigns IP addresses with
the lease time set to the MCLT. When the server that is offline comes back online, it synchronizes its database with its
peer before it starts allocating IP addresses.
Note
You can configure Microsoft primary and secondary servers using this wizard only. You cannot edit Microsoft
primary and secondary servers after you configure them. You must delete and reconfigure the primary or
secondary Microsoft server for a failover association.
• External Server IP Address: Select this to use an external ISC DHCP compliant server as the
primary server. Enter the IP address of the primary server in the field.
• DHCP Failover Secondary: Select one of the of following. The default is Grid Member.
• Grid Member: Click Select member. In the Select Member dialog box, select the secondary server
and click the Select icon.
• MS Server: NIOS selects this automatically when you set the DHCP Failover Primary to MS
Server. Click Select Server. In the Microsoft Server Selector dialog box, select the Microsoft server
that supports DHCP failover. Note that only Microsoft Windows Server 2012 or later versions
support synchronization of failover relationships. This dialog box also displays the following
columns: IP address, Comment, and Site.
Note
The primary and secondary Microsoft servers that you select in a failover relationship must be in the same
network view. For more information, see About Microsoft DHCP Failover Relationships.
Note
You cannot select External Server IP Address for both the primary and secondary servers. One of the servers
must be an independent appliance or in an Infoblox Grid.
Note
When you configure a failover association, the slider changes its position based on the Failover mode you
select. When you edit failover settings, the slider remains in the Balanced position, at 50%, by default. For more
information about modifying failover associations, see Modifying Failover Associations.
• Load Balancing Data: Adjust the slider to determine which server should handle more IP address
requests. The default is 50%. When you move the slider all the way to the left, the primary server
responds to all IP address requests. The opposite applies when you move the slider all the way to the
right. Infoblox recommends that you use the default (50/50) to enable the primary and secondary servers
to respond to IP address requests on an equal basis.
• Lease Deletion: Select the following to override settings at the Grid and member levels.
• Keep leases from deleted ranges until one week after expiration: When you select this and delete
a DHCP range with active leases, the appliance stores these leases up to one week after they
expire. When you add a new DHCP range that includes the IP addresses of these active leases,
the appliance automatically restores the leases.
• Secondary role: This is valid for Microsoft Management only. Note that the secondary role is available only
in Hot standby mode. The appliance displays Standby by default and you cannot edit this value.
• Maximum client lead time: Specify the maximum client lead time in minutes or hours. The default is one
hour. Select Minutes or Hours from the drop-down list. This specifies the maximum amount of time the
server waits before assuming control.
• Enable switchover interval: This is valid for Microsoft Management only. Select this to automatically
change the state to partner down after a specified period. NIOS does not support the "partner down" state
for Microsoft DHCP failover association.
• State switchover interval (Minutes): This is valid for Microsoft Management only. Specify the amount of
time after which the server must change the state. The default is 60 minutes.
• Enable Authentication: This is valid for Microsoft Management only. Select this if you want to secure the
communication between failover partners.
• Shared Secret: This is valid for Microsoft Management only. Enter a shared secret that can be used to
authenticate the communication between failover partners. You can specify a shared secret only if you
enable authentication.
4. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes.
5. Save the configuration and click Restart if it appears at the top of the screen.
Note
NIOS does not support PARTNER-DOWN and Force Recovery for a Microsoft DHCP failover association.
Warning
Before you put a peer in the partner-down state, ensure
that the other peer is indeed out of service. If both the primary and secondary servers are operational when you
place one of them in the partner-
down mode, both servers may stop issuing leases for a minimum of time defined in the MCLT.
Note
You cannot place the functional peer in the PARTNER-DOWN state for a Microsoft DHCP failover in NIOS.
Note
You cannot place the functional peer in the PARTNER-DOWN state for a force recovery in NIOS.
Note
When the failover recovery is in progress, the DHCP service on both peers are disabled and you cannot enable
the DHCP service until the failover recovery is successfully completed. You can view the logs of the failover
recovery process in the syslog and infoblox.log file.
Note
After you start the failover recovery, you cannot revert the changes.
Grid Manager starts the failover recovery and you can view the following information in the Failover Recovery Progress
dialog box:
• Failover association: The name of the failover association.
• Primary: The hostname or IP address of the primary server.
• Secondary: The hostname or IP address of the secondary server.
• Number of leases to be processed: The total number of leases to be processed.
• Number of leases processed: The number of leases that have been processed.
• Current Status: Displays the current status of the failover recovery process. The current status can be one of the
following:
• Pending: The failover recovery is initiated for a failover association and the recovery process will start
soon.
• Calculating: The appliance calculates the total amount of leases to be processed.
• Applying: The appliance looks for conflicts and tries to resolve the conflicts.
• Completed: The failover recovery is completed successfully.
• Failed: The failover recovery fails.
Grid Manager also displays the reason for the failure if that happens.
Note
If for any reasons the recovery is blocked when the operation is in progress, you can cancel the current
operation and start the recovery for the failover association again.
• IP Address Allocation
• IP Address Allocation Using Filters
• Configuring MAC Address Filters
• About Relay Agent Filters
• Configuring Option Filters
IP Address Allocation
When a DHCP client requests an IP address, the NIOS appliance draws an address from an address range associated
with the network segment for that client. Because you define that range, you can thereby control the IP address (within
the defined range) and the associated TCP/IP settings that the client receives.
In the figure Requesting Addresses – DHCPDISCOVER Messages, three hosts — each in a different subnet — request
an IP address. Each one broadcasts a DHCPDISCOVER message, which includes its MAC address. When the router,
which also functions as a DHCP relay agent, receives the message, it adds the IP address of the interface on which the
message arrives and forwards the message to the DHCP server — or servers — previously configured on the router.
When the NIOS appliance receives the message, it uses the ingress interface IP address of the router to determine the
network segment to which the host belongs and associates the MAC address of the requesting host with an IP address
from an address range for that network.
The addressing scheme depicted in the figures Requesting Addresses – DHCPDISCOVER Messages and Requesting
Note
After the DHCP server runs for a while, it assigns leases based on when it last used addresses, and not just on
their positions in the range.
the appliance receives a request that matches a filter for one it applies the action specified in the filter for that address range. If it does not
address range, assign an address from that range (the action is deny or the action is grant but
all addresses in that range are in use), the appliance then checks if it can assign
an address from an unfiltered address range (if there are any), starting with the
range with the highest addresses first, as shown in Figure 31.3.
the same filter applies to multiple address ranges and the it checks the address range with the highest IP addresses matching that filter. If
appliance receives an address request matching that filter, the appliance does not assign an address from that range, it checks the filtered
address range with the next highest IP addresses, and so on. If it still has not
assigned an address, the appliance starts checking unfiltered address ranges (if
there are any), again beginning with the range with the highest address first.
multiple filters for the same address range conflict with each other the filter denying the lease takes precedence. For example, if a requesting client
(one filter grants a lease and another denies it) and a requesting matches both a MAC address filter (granting a lease) and a user class filter
client matches both filters, (denying a lease) for the same address range, the appliance denies the lease.
When faced with a choice to either allow or deny a lease based on equal but
contradictory filters, the appliance takes the more secure stance of denying it.
Match the vendor MAC prefix (first three substring equals 00:C0:B0 1 3
bytes of MAC address).
You can also define more complex rules using the AND and OR logic as follows:
DHCP option = vendor-class-identifier
Match value = infoblox2000a
OR
DHCP option = vendor-encapsulated-options
Substring offset = 0 (the match value starts at the first character of the option data received from the client)
Substring length = 8 (the length of the match value infoblox)
Match value = infoblox
AND
DHCP option = vendor-encapsulated-options
Substring offset = 10 (the match value starts at the ninth character of the option data received from the client)
Substring length = 5, the length of the match value 2000a
If the NIOS appliance receives address requests with the user class mobile and there are no available addresses in
address range 2 but there are available addresses in ranges 1 and 3, the appliance begins assigning addresses from
address range 3 (because its addresses are higher than those in range 1). Then, if all addresses in range 3 are in use,
root-mount-options 1 Text
root-server-ip-address 2 IP address
root-server-host-name 3 Text
root-server-path-name 4 Text
swap-server-ip-address 5 IP address
swap-file-path-name 6 Text
boot-file-path-name 7 Text
posix-timezone-string 8 String
2. From the Data Management tab, select the DHCP tab -> Filters tab and click the Add icon.
3. In the AddIPv4Filter wizard, enter the filter name i86pc, and then select Options as the filter type.
4. Select MSFT as the option space, select an option, specify a value for it, and then add it to the i86pc option filter.
You can select multiple options. Add the following options to the i86pc option filter:
root-server-ip-address 2 IP address
root-server-host-name 3 Text
root-server-path-name 4 Text
boot-file-path-name 7 Text
5. From the Data Management tab, select the DHCP tab -> Filters tab -> filter_name, and then click the Add icon.
Note
When you select No Match, the appliance applies the filter to all requesting clients that do not send
option 55 and option 60 or to clients that send values in option 55 and 60 that do not match any existing
DHCP fingerprints.
4. Click Next to enter values for required extensible attributes or add optional extensible attributes. For information,
see Using Extensible Attributes.
5. Save the configuration.
Notes
• The appliance allows you to add an empty IPv4 logic filter at the end of the logic filter list, which means
that you can add an IPv4 logic filter without defining DHCP options in it. In addition, you can change the
order of the filters in the logic filter list.
• When a range has multiple class filters assigned to it, if any of the filters deny a lease to a client, then
the client will not get a lease even if another class filter allows it.
The appliance decides which options and values to return to a client based on the following:
• If you have different DHCP options defined in a range and any DHCP filters in the Class Filter and Logic Filter
lists, and these options do not overlap, the appliance merges and returns all options to the matching client. For
example, a DHCP client obtains a lease from a DHCP address range (R) through an option filter in the Class
Filter List (CF), which contains an option statement (O1) with a value of (S1). The appliance then matches a filter
in the Logic Filter List (LF) that contains an option statement (O2) with a value of (S2). In this case, option
statements O1 and O2 and their values S1 and S2 are merged and returned to the matching client.
• If there are overlapping DHCP options in a range and any DHCP filters in the Class Filter and Logic Filter lists,
the values defined in the Class Filter List filters take precedence over those defined in the range and filters in the
Logic Filter List. The appliance returns the option value defined in the class filters to the matching client. For
example, a DHCP client obtains a lease from a DHCP address range (R) through an option filter in the Class
Filter List (CF), which contains an option statement (O1) with a value of (S1). The appliance then matches a filter
in the Logic Filter List (LF) that contains the same option statement (O1) with a value of (S2). In this case, the
option value S1 defined in the option filter in the Class Filter List takes precedence and is returned to the DHCP
client.
• When you apply option, MAC, and NAC filters to the Logic Filter List, the appliance translates their match rules
into a DHCP if/elseif/else statement using the match rules of the first filter on the list as the "if" expression in the
statement. Match rules in subsequent filters are translated into the "elseif" statements, and the last filter that does
not contain any match rules is translated into the "else" statement. Note that a filter without any match rules can
only be added as the last filter in the Logic Filter List.
For more information about how the appliance grants and denies leases to requesting clients and determines which
DHCP options to return to the matching clients, see Configuration Example: Using the Class and Logic Filter Lists.
To apply filters:
1. Grid: From the Data Management tab -> DHCP tab, select Grid DHCP Properties from the Toolbar.
Member: From the Data Management tab, select the DHCP tab -> Members tab -> member checkbox -> Edit
icon.
Network: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
checkbox, and then click the Edit icon.
DHCP Range: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
->addr_range checkbox, and then click the Edit icon
Fixed Address: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
fixed_address checkbox, and then click the Edit icon.
IPv4 Reservation: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network
-> reservation checkbox, and then click the Edit icon.
Host Address: From the Data Management tab, select the DHCP tab -> Networks tab -> Networks -> network ->
Note
You can only add a filter that does not contain any match rules as the last filter in the Logic Filter List.
5. Save the configuration and click Restart if it appears at the top of the screen.
class "MAC1" {
default-lease-time 1234;
min-lease-time 1234;
max-lease-time 1234;
{option sophos.compliance
state="compliant"
}
subnet 10.34.34.0 netmask 255.255.255.0 {
pool {
if (substring(option vendor-class-identifier,0,4)="MSFT") {
default-lease-time 1000;
min-lease-time 1000;
max-lease-time 1000;
else {
default-lease-time 2500;
min-lease-time 2500;
max-lease-time 2500;
Depending on client requests and the matching criteria, the following scenarios can happen in this example:
If the requesting client matches the MAC1 and Option1 filters, the appliance returns the following:
• Lease time = 1234 seconds (from the MAC filter)
• Returned options:
• Router(3) with a value of 10.34.34.1 (from the address range)
• Log-server(7) with a value of 10.34.34.3 (from the MAC filter MAC1)
• Time-server(4) with a value of 10.34.34.2 (from the option filter Option1)
If the requesting client matches the MAC1 and NAC1 filters, the appliance returns the following:
• Lease time = 1234 seconds (from the MAC filter MAC1)Returned options:
• Router(3) with a value of 10.34.34.1 (from the address range)
• Log-server(7) with a value of 10.34.34.3 (from the MAC filter MAC1)
• Cookie-server(8) with a value of 10.34.34.5 (from the NAC filter NAC1)
If the client matches the MAC1 filter, but not the Option1 or NAC1 filters, the appliance returns the following:
• Lease time = 1234 seconds (from the MAC filter)
• Returned options:
• Router(3) with a value of 10.34.34.1 (from the address range)
• Log-server(7) with a value of 10.34.34.3 (from the MAC filter MAC1)
• Domain-name(6) with a value of www.infoblox.com (from the option filter Option2)
If the requesting client does not match the MAC1 filter, no lease is granted.
Deleting Filters
You can delete a filter that is not currently assigned to a DHCP range. You can also remove a filter from a DHCP range,
and then delete the filter if it is not in use.
To delete a filter:
1. From the Data Management tab, select the DHCP tab -> Filters tab -> filter_name, and then click the Delete icon.
2. In the Delete Confirmation dialog box, click Yes.
The appliance puts the deleted filters in the Recycle Bin, if enabled. You can later restore the filter if needed.
To schedule this task, click the Delete icon -> Schedule Delete. In the Schedule Deletion dialog box, click Delete Later,
and then specify a date, time, and time zone.
Related topic
DHCP Authentication Process
Related topic
Authenticated DHCP
Uploading Certificates
When you upload a certificate, the NIOS appliance finds the matching CSR and takes the private key associated with the
CSR and associates it with the newly uploaded certificate. The appliance then automatically deletes the CSR.
If the CA sends an intermediate certificate that must be installed along with the server certificate, you can upload both
certificates to the appliance. The appliance supports the use of intermediate certificates to complete the chain of trust
from the server certificate to a trusted root CA.
To upload a certificate:
1. From the Grid tab, select the Grid Manager tab, and then click Captive Portal.
2. Select the member that is running the captive portal, and then click HTTPS Cert -> Upload Certificate from the
Toolbar.
3. In the Upload dialog box, click Select File, navigate to the certificate location, and click Open.
The appliance imports the certificate . When you log in to the appliance again, it uses the certificate you imported.
NAC Integration
You can configure member DHCP servers to send authentication requests to RADIUS servers and to allocate addresses
based on the authentication results. This allows you to place DHCP clients into separate network segments.
You can divide your network into different segments by configuring address ranges and applying NAC filters to them.
NAC filters use authentication results from RADIUS servers as matching criteria for granting or denying address
requests.
When a DHCP client requests a lease, the member DHCP server can query a remote backend RADIUS server such as
the Sophos NAC Advanced server to determine if the DHCP client is authorized to access the network. A Sophos NAC
Advanced server is an access-control and compliance server that supports the RADIUS protocol.
The RADIUS server then checks its database and provides the compliance state and user class, if configured, of the
DHCP client. The member DHCP server matches the response with the configured NAC filters, and grants a lease to the
appropriate network segment.
The following figure presents an example illustrating the authentication process and how a member DHCP server
matches the response with NAC filters to determine whether to grant or deny a lease. In the example, there are two
DHCP ranges configured, each with a NAC filter that specifies RADIUS compliance state of DHCP clients allowed in
each range.
Note
The dates and timestamps in the Leases tab are determined by the time zone setting of the admin account that
you use to log in to the appliance.
You can display the following discovered data for IPv4 leases:
• Last Discovered: The timestamp when the IP address was last discovered. This data is read-only.
• OS: The operating system of the detected host or virtual entity. The OS can be one of the following:
• Microsoft for all discovered hosts that have a non-null value in the MAC addresses using the NetBIOS
discovery method.
• A value that a TCP discovery returns.
• The OS of a virtual entity on a vSphere server.
• NetBIOS Name: The name returned in the NetBIOS reply or the name you manually register for the
discovered host.
• Discovered Name: The name of the network device associated with the discovered IP address.
• Discoverer: Specifies whether the IP address was discovered by a PortIQ or NIOS discovery process.
You can do the following in this tab:
• Sort the data in ascending or descending order by column.
• View the lease detailed information of a current lease by selecting the checkbox of the lease, and then clicking
the Open icon.
• Change a current lease state to Free by selecting the checkbox of a current lease, and then clicking the Delete
icon.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters.
• Print and export the data in this tab.
Note
The agent, circuit, and remote IDs for option 82 can be displayed in hexadecimal or plain text format. By
default, Grid Manager displays them in hexadecimal format. You can change the logging format, as described
in Defining Logging Format for DHCP Option 82.
• Option: Agent circuit ID and remote ID data sent by a DHCP relay agent in all DHCP options.
• UID: (User ID) The client identifier that the DHCP client sends the appliance (in DHCP option 61) when it
acquires the lease. Not all DHCP clients send a UID.
• TSFP: (Time Sent From Partner) The time — from the point of view of a remote DHCP failover peer —
when the current lease state ends.
• CLTT: (Client Last Transaction Time) The time of the last transaction with the DHCP client for this lease.
• TSTP: (Time Sent To Partner) The time — from the point of view of the local DHCP failover peer — that
the current lease state ends.
For IPv6 leases, it displays most of the same fields as IPv4 leases, plus the following information:
• DUID: The DUID of the IPv6 DHCP client that received the lease for an IPv6 address.
• Prefix Bits: The prefix length.
• Preferred Lifetime: The length of time that a valid address is preferred. A preferred address can be used
with no restrictions. When this time expires, the address becomes deprecated.
Clearing Leases
You can clear active leases for which you have read/write permission. When you clear an active lease, its IP address
becomes available and its status changes to "Free". To clear an active lease:
1. From the Data Management tab, select the DHCP tab -> Leases tab -> Current Leases.
2. Click the checkboxes beside the IP addresses of the leases you want to clear, and then click the Clear Lease
icon.
Grid Manager clears the selected leases. You can view information about a cleared lease, by selecting it in the
Lease History panel and clicking the Edit icon.
Managing Microsoft and Infoblox DNS and DHCP Servers from the Grid Master
You do not have to configure or install any application on the Microsoft servers for the Grid members to communicate
with the servers. Infoblox uses MS-RPC (Microsoft Remote Procedure Calls) to manage Microsoft servers.
A Grid member can manage a Microsoft server in either of two modes, Read-only or Read/Write. In Read-only mode, the
Grid member synchronizes data from the Microsoft server to the Grid so admins can use Grid Manager to view the
synchronized data, but not update it. Read/Write mode allows admins to update the synchronized data as well.
Updates from Grid Manager are then synchronized to the Microsoft server, and updates from the Microsoft server are
synchronized to the Grid.
Configuration changes and data synchronized from the Grid to the Microsoft server apply immediately after the
synchronization. You do not have to restart the Microsoft server or for DNS, reload the zones.
Note that due to a field length limit set on the Microsoft DHCP server, after you synchronize DHCP data on the Microsoft
server, the "Comment" and "Description" fields for a fixed address and reservation can display only up to 128 characters
even though NIOS allows up to 256 characters for these fields.
Note
A Grid member must have a Microsoft Management license installed to manage a Microsoft server. The license
allows the member to synchronize data with Microsoft servers. It also activates the tabs, dialog boxes and other
elements in Grid Manager that you need to manage a Microsoft server. If you do not see the Microsoft Servers
tab after you add a member that has a Microsoft Management license, you might have to restart the Grid
Master to view the tab and to manage Microsoft DNS and DHCP servers in the Grid.
OS Levels Platforms
Microsoft Windows 2003 R2 Standard and Datacenter Initial Release 32 bits, 64 bits
Infoblox supports the following SMB (Server Message Block) protocol versions for Microsoft Windows servers: SMB
version 1 (SMBv1), SMB version 2.x (SMBv2.x), and SMB version 3.x (SMBv3.x).
Grid members check the Windows version of the Microsoft servers before each synchronization. If a Microsoft server
reports an unsupported version before a synchronization, the member logs an error and the synchronization fails.
Note that some Windows versions require certain updates and hotfixes installed, so the Microsoft server can synchronize
with the Grid member. Following are the current requirements:
• Windows Server 2003, Enterprise x64 Edition requires the installation of security update 935966.
• Windows Server 2008 R2 requires the hotfix referenced in the Knowledge Base article 981776.
• Windows Server 2008-based DNS servers might not display delegations for reverse lookup zones. For
information about this issue, including the available hotfix, refer to Knowledge Base article 958190.
For information about the updates, enter their IDs in the Search field of the Microsoft Support website at http://
support.microsoft.com.
Administrative Permissions
By default, only superusers can configure Grid members to manage Microsoft servers. Superusers can give limited-
access users Read-only or Read/Write permission to Microsoft servers. Read-only permission allows admins to view the
properties and data of a Microsoft server from Grid Manager. Write permission is required to configure Grid members to
manage Microsoft servers, edit their properties, and start or stop their DNS and DHCP services. For additional
information, see Administrative Permissions for Microsoft Servers.
Note that to view and manage the DNS and DHCP data synchronized from Microsoft servers, admins must have
permissions to the applicable DNS and DHCP resources. For example, to view DNS zones synchronized from Microsoft
servers, admins must have Read-only permission to zones, and to edit the zones, admins need Read/Write permission to
them. Similarly, to view DHCP ranges synchronized from Microsoft servers, admins must have Read-only permission to
DHCP ranges, and to edit the DHCP ranges, admins need Read/Write permission to the DHCP ranges. For information,
see Administrative Permissions for DNS Resources and Administrative Permissions for DHCP Resources.
The administrative permissions on the Grid are different from those on the Microsoft server. These permissions are
independent of each other and are not synchronized.
Note
The synchronization of Microsoft DHCP servers running Microsoft Windows 2012 or later includes the
synchronization of DHCP failover relationships. Note that the DNS and DHCP failover synchronization rules do
not have an impact on the Microsoft servers running a Windows version that is earlier than 2012.
• Logging Level: Select a logging level for the Microsoft server log from the drop-down list: Low, Normal,
High, and Debug. NIOS logs the messages based on the logging level you set.
Note
Depending on your configuration in the Which features do you want to configure? section,
the Add Microsoft Server(s) wizard displays the Microsoft server setting options.
Note
You cannot start or stop a DNS or DHCP service on a specific Microsoft server if you disable the monitor and
control setting for the respective service. You can control and monitor DNS and DHCP services at the Grid level
and override the settings at the Microsoft server level. Each monitor and control setting applies only to the DNS
or DHCP service and the respective Microsoft server.
• Synchronize Network Users: Click Override to override the settings inherited from the Grid. To inherit the
same settings as the Grid, click Inherit. Select this to enable the identity mapping for the Microsoft server.
For information, see Enabling Identity Mapping.
You can assign multiple Microsoft servers to a Grid member and test their connection to the Grid member. Click the
Add icon to add another Microsoft server.
6. Select a Microsoft server and click the Test Microsoft Server icon, or click the Action icon next to the
respective Microsoft server and select Test Microsoft Server from the menu to verify whether the appliance can
successfully connect to the Microsoft server. The appliance displays the test results in the Test Microsoft Server
Results dialog box.
7. Save the configuration and click Restart if it appears at the top of the screen.
or
Click Next: Continue to the next step and define extensible attributes for the Microsoft servers. For information,
see Managing Extensible Attributes.
After you configure a Grid member to manage a Microsoft server, the member automatically connects to the Microsoft
server and starts synchronizing data. You can then do the following:
• View the status of the servers in the Microsoft Servers panel, as described in Monitoring Managed
Microsoft Servers. Newly added servers first display a status of Connecting as the Grid member contacts the
Microsoft servers. The status changes to OK after the Grid member successfully connects to the Microsoft server.
• View the data synchronized from the Microsoft servers. To view DNS data, navigate to the DNS view you
specified. For information, see Viewing Zones. To view DHCP data, navigate to the Networks tab of the network
view that you specified. For information, see Managing IPv4 DHCP Data.
Network conditions and the amount of data can affect the synchronization time. Therefore, you might not be able to
view all of the synchronized data immediately.
• Use Smart Folders to organize the Microsoft servers and their data. For example, you can create a folder for DNS
zones and another folder for DHCP scopes synchronized from a Microsoft server. For information about Smart
Folders, see Smart Folders.
• Update the synchronized data. For information, see Managing Microsoft DNS Services, and Managing Microsoft
DHCP Services.
You can also use Global Search to search for synchronized data, such as zones and IP addresses. For information, see
Using Global Search.
Defining Monitor and Control Settings for DNS and DHCP Services
You can enable or disable monitor and control settings of DNS and DHCP services for a specific Microsoft server. The
appliance enables this by default when you add a Microsoft server. When you upgrade the existing Microsoft servers, the
managed member inherits values from the Grid. You can monitor and control the DNS and DHCP services on a Microsoft
service only if both the management setting of the respective service and the monitor and control settings of the
corresponding Microsoft server for the selected service are enabled. To know more about how to enable monitor and
control settings, see Setting Grid Properties for Managing Microsoft Servers.
Note
The original setting that controls the overall management of a given service is referred to as the management
setting. It controls whether the synchronization of the corresponding service is enabled or not, with no change
to the existing synchronization behavior. Note that synchronization does not depend on the value of the monitor
and control setting for the Microsoft server.
You can configure Microsoft server settings at the Grid level. Note that Microsoft servers inherit these settings by default,
and you can override these settings at the Microsoft server level.
When you enable monitor and control settings for DNS and DHCP services, the managing member verifies the
corresponding service status on the Microsoft server every 30 seconds. The Grid Master is notified of the status through
Grid replication.
When you disable monitor and control setting for DNS and DHCP services, the managing member stops verifying the
service status. NIOS administrators cannot start or stop DNS or DHCP service on the Microsoft server. When you try to
start or stop these services through the Infoblox API, the appliance generates an error message. The pending service
control requests made before disabling the monitor and control settings are sent to the Microsoft server.
For information about the displayed status, see Viewing DNS and DHCP Service Status on Microsoft Servers.
Note
You must enable DNS logging feature on the Microsoft server for this feature to function properly. To enable
DNS logging feature on Microsoft servers, refer to https://technet.microsoft.com/en-us/library/dn800669#some.
Note
When you increase the maximum number of simultaneous connections above the recommended setting for a
given Microsoft server, it may consume additional bandwidth, memory, and CPU usage.
Note
Ensure that port 137 is not used for any services in your Grid; otherwise you will not be able to configure the
appliance to forward WINS packets to Microsoft DNS and DHCP servers. Likewise, if you have enabled this
feature, you will not be able to configure port 137 for any other services in your Grid.
Disabling Synchronization
When you set the disable option, the Grid member completes any on-going synchronization and does not start a new
one. Setting this option only affects data synchronization and does not affect the operations of the Microsoft server.
Synchronization resumes when the Microsoft server is re-enabled.
To disable a Microsoft server:
1. From the Grid tab, select the Microsoft Servers tab -> Servers tab, select a Microsoft server and click the Edit
icon, or click the Action icon next to the respective Microsoft server and select Edit from the menu.
2. In the General tab, select the Disable Synchronization option.
3. Save the configuration and click Restart if it appears at the top of the screen.
Note
You can specify a name up to 63 bytes and it is not case-sensitive, but it cannot contain spaces and the
You can select an Active Directory Site and click the Delete icon to delete it.
3. Click Next to associate networks with an Active Directory Site. Select an Active Directory Site and click the Add
icon to associate networks with the respective site.
4. Click Cancel to close the wizard without saving your settings. You can click Save and Close to save the settings
and close the wizard or click Save and Edit to save the settings and edit the properties. The application will close
the wizard and open the Active Directory Site Properties editor. Click Save and New to save the Active Directory
Sites in the list and open a new wizard.
Note
The identity mapping information displayed on NIOS completely depends on live event logs that are available
on the Microsoft servers. The appliance pulls event logs incrementally. So subsequent requests pull only the
latest logs since the last successful synchronization. To avoid data loss, depending on the expected activities,
you must consider the size of the event log file on the Microsoft server and how often you want to synchronize
the data with the appliance before the event log file rolls over.
Administrative Permissions
Only superusers can view identity mapping information. Limited-access admin groups can view identity mapping
information only if they have network permissions. For example, if the users have permissions to only DNS zones, they
may not be able to view identity mapping information because they do not have network permissions. The appliance
does not display a warning message if admins do not have correct permissions. For information about network
permissions, see Administrative Permissions for IPv4 and IPv6 Networks and Shared Networks.
User Name IP Address First Seen Time (UTC) Last Seen Time (UTC)
If another login request is received at 10:30 AM (10 minutes after the last seen event), then it is considered as a different
session:
User Name IP Address First Seen Time (UTC) Last Seen Time (UTC)
If a Kerberos service ticket is received instead of a login event, then the previous session is extended and is updated as
Last Seen Time in the first user session.
User Name IP Address First Seen Time (UTC) Last Seen Time (UTC)
The appliance displays separate entries (counts) for the following scenarios:
• Multiple users logging in from the same IP address. For example, User 1 logged in with 10.10.10.10 address
counts as one network user and User 2 logged in with 10.10.10.10 address counts as another network user.
• Same user logging in from multiple IP addresses. For example, a single user can log in to multiple workstations,
each with a different IP address.
• Same user logging from the same IP address at different time intervals.
Note
The appliance displays user information only for the managed networks.
The following table illustrates how the appliance displays counts for different login scenarios:
Network User Count Displayed for Different Login Scenarios
Mobile user logging in to the Microsoft Exchange server Note that you must first synchronize both the Domain Controller and Microsoft
Exchange server with the appliance to get user mapping information for this scenario.
For this example, two entries are displayed.
Multiple users from the same IP address Appliance displays separate entry (user name and IP address) for each user.
Same user from multiple IP address Appliance displays separate entry (user name and IP address) for each user.
Note
The Timed Out and Logged Out user information is periodically removed from the database.
Note
On an Infoblox appliance,
the Enable Network Users Feature and Synchronize Network Users with all MS servers options are disabled by
default for all new installations.
Note
When you disable monitor and control settings, Grid Manager displays unknown using gray color for such
services. When you enable monitor and control setting of a given service, Grid Manager displays the last
known status that is obtained before the setting was first disabled. The appliance later updates to the latest
status as soon as the monitoring resumes and Grid Manager displays the new status.
You can view details about the managed Microsoft servers by navigating to the Grid tab -> Microsoft Servers tab ->
Servers tab. For each Microsoft server, the panel displays the following by default:
• Name: The FQDN of the Microsoft server.
• Status: The connection status, which can be one of the following:
• Running: The Grid member is connected to the Microsoft server.
• Connecting: The Grid member is connecting to the Microsoft server.
Gray The DNS service is stopped or management of the Microsoft DNS server is disabled.
• DHCP: The status of the DHCP service on the Microsoft server. When you disable DHCP synchronization, NIOS
does not display any status icon. The status icon can be one of the following:
Gray The DHCP service is stopped or management of the Microsoft DHCP server is
disabled.
• Comment: Displays any comments that were entered for the Microsoft server.
• Site: Displays any values that were entered for this pre-defined attribute. You can add the following columns for
display:
• Version: The Windows version of the managed server.
You cannot use Grid Manager to create the unsupported zones and assign them to a Microsoft server. Any zone on the
Grid that has the same name as a forwarding, cached or root zone on the Microsoft server is not synchronized. In
addition, Grid members do not synchronize the contents of a zone if the Microsoft server is a secondary server.
Subdomains defined within a Microsoft DNS zone are not synchronized unless they contain at least one resource record.
For example, in the corpxyz.com zone, any resource record defined in a subdomain of the corpxyz.com zone is
synchronized. If the subdomain sub.corpxyz.com zone has no resource record, it is not synchronized.
The following zones and resource records are supported on Microsoft servers running Windows Server 2008 only.
Therefore, Grid members can only synchronize these DNS zones and resource records with Microsoft servers running
Windows Server 2008.
• IPv6 reverse-mapping zones
• Global Names zones
• DNAME records
• NAPTR records
• DNSSEC records
Primary Server Input Secondary Server Input NIOS displays Microsoft server
records in... displays records in...
Note
If the Enable PTR record removal for A/AAAA records option is selected and if you try to delete the A or AAAA
records in zones served by Microsoft servers, the appliance displays
the Delete Confirmation (A or AAAA Record) dialog box to confirm whether you want to remove the
corresponding PTR record that was automatically generated while creating the A or AAAA record. In
the Delete Confirmation dialog box, select the Remove associated PTR resource record(s) checkbox and
click Yes to delete the associated PTR record or click No to cancel. For information about enabling this option,
see Deleting PTR Records associated with A or AAAA Records .
Synchronizing Updates
A Grid member synchronizes DNS data with each managed Microsoft server at regular intervals. Grid Manager admins
with the applicable permissions can then update the synchronized DNS zones and resource records. During each
synchronization, updates from Grid Manager are applied to the Microsoft server and updates from the Microsoft server
are applied to the Grid as well. Note that the resource records are synchronized only if there is a change to the SOA
record on either the Microsoft server or the Grid.
The following examples illustrate how Grid members synchronize DNS data:
• If a Microsoft server admin adds the finance.corpxyz.com zone, it is also added to the Grid after a
synchronization.
• If a Grid Manager admin changes the A record of admin.corpxyz.com from 10.2.1.5 to 10.2.1.6, the IP address of
its corresponding A record on the Microsoft server is updated to 10.2.1.6.
• If a Grid Manager admin deletes a DNS zone that is assigned to a Microsoft server, the corresponding zone on
the Microsoft server is deleted as well in the next synchronization.
Because admins can update DNS data from the Microsoft server and from Grid Manager, conflicts can occur during
synchronization. In addition, Microsoft servers and Infoblox DNS servers have some differences in the features they
support and the way they handle certain zones and resource records.
Deletes the corpxyz.com zone Updates the corpxyz.com zone The corpxyz.com zone is created on the Grid with the
updates and is assigned to the Microsoft server .
Changes the zone transfer settings of the Deletes the sales.corpxyz.com zone. The sales.corpxyz.com is deleted from the Grid as
sales.corpxyz.com zone. well.
• Changing the name or IP address of a resource record on the Microsoft server effectively deletes the original
resource record and creates a new record with the current information. During the synchronization, the Grid
member also deletes the original record, including its associated properties, such as its extensible attributes and
administrative permissions, and creates a new record.
For example, as shown in the below figure, the A record for printer1.corpxyz.com is on both the Microsoft and Infoblox
Grid member. On the Grid, the A record has extensible attributes and a comment. A Microsoft server admin changes the
IP address of the A1 resource record from 10.1.1.2 to 10.1.1.3. On the Microsoft server, this is equivalent to deleting the
A1 resource record with the IP address 10.1.1.2 and then adding a new A1 resource record with the IP address 10.1.1.3.
When the data is synchronized, the Grid member deletes the original record with its extensible attributes and comments
and creates a new A record with IP address 10.1.1.3.
Synchronizing Delegations
When a parent zone delegates a subdomain to one or more name servers, Infoblox DNS servers require the delegation
name servers to also be authoritative for the subzone. Microsoft servers do not; they allow the delegation servers of a
subzone to be different from its authoritative servers. Infoblox DNS servers support this configuration only if the primary
server of the parent zone is a Microsoft server. This configuration is retained when delegations are synchronized from
Microsoft servers to the Grid.
For example, as shown in the below figure, on a Microsoft server, corpxyz.com delegates sales.corpxyz.com to the name
server ns1.corpxyz.com; but the authoritative server of sales.corpxyz.com is 2k3r264-2.infoblox.com.
Delegation Server and Authoritative Server for corpxyz.com
The following figure shows that after corpxyz.com and its subzone are synchronized to the Grid, corpxyz.com contains
an NS record for sales.corpxyz.com and an A record for the delegation name server ns1.corpxyz.com. The MS
Delegation Addresses column displays the IP address of the delegation server of the subzone sales.corpxyz.com.
corpxyz.com Synchronized to the Grid
When you navigate to the Name Servers tab of sales.corpxyz.com to view the authoritative name servers for the
Note though that because Infoblox DNS servers require the delegation servers to also be authoritative for the subzone, if
you add another authoritative name server to the subzone from Grid Manager, NIOS also adds it as a delegation server
in the parent zone. For example, as shown in the below figure, when an admin adds the name server
ns-100.corpxyz.com as an external secondary server for sales.corpxyz.com, NIOS automatically adds it as a delegation
server by adding an NS record for it in the parent zone.
Resolving Conflicts
Some conflicts require intervention from an admin. For example, a Grid member cannot synchronize a zone when its
primary server on the Microsoft server is different from its primary server on the Grid. When a Grid member is unable to
synchronize data due to such conflicts, it logs an error, skips the object with the error and continues synchronizing the
rest of the data. You can then view the Microsoft logs to check which objects were not synchronized. If you resolve the
problem, the Grid member synchronizes the object on its next attempt. For information about the logs, see Viewing
Synchronization Logs.
Note
Microsoft servers do not support Infoblox hosts and reservations. You cannot add them to networks and DHCP
ranges served by Microsoft servers.
Note
Networks served by Microsoft DHCP servers do not support the split, join, and expand functions.
You can create a network from scratch or use a network template. For information about creating network templates, see
Adding IPv4 Network Templates. To add an IPv4 network for a scope:
1. From the Data Management tab, select the DHCP tab.
2. If you have more than one network view in the system, select the network view in which you want to add the
network. It must be the same network view to which the Microsoft server is assigned.
Viewing Scopes
To view the scopes in a network, navigate to DHCP -> Networks -> network. The panel displays the objects in the
network, including the scopes and split-scopes. For split-scopes, the panel displays both scopes with the same start and
end address. It displays the following information about each object:
• IP Address: The IP address of the DHCP object. For a scope, this field displays the start and end addresses of
the scope. Note that the appliance highlights all disabled DHCP objects in gray.
• Split-Scope: Displays Yes if the scope is a split-scope.
• MS Server: Displays the Microsoft server that is serving the scope.
• Type: The DHCP object type, such as DHCP Range or Fixed Address.
• Name: The object name. For example, if the IP address belongs to a host record, this field displays the
hostname.
• Comment: The information you entered for the object.
• IPv4 DHCP Utilization: The percentage of the total DHCP usage of a DHCP range. This is the percentage of the
total number of fixed addresses, reservations, hosts, and active leases in the DHCP range divided by the total IP
addresses in the range, excluding the number of addresses in the exclusion ranges. Note that only enabled
objects are included in the calculation.
• Site: The site to which the DHCP object belongs. This is one of the predefined extensible attributes.
You can select the following additional columns for display:
• Static Addresses: Indicates whether the IP address is a static address.
• Dynamic Addresses: Indicates whether the IP address is a dynamically assigned address.
• Disabled: Indicates whether the object is disabled.
• Priority: Displays the priority of a DHCP range when NAC filters are applied.
• Available extensible attributes.
You can also do the following in this panel:
• Sort the displayed data in ascending or descending order by column.
• Click Go to IPAM View to view information about the object in the IPAM tab.
• Add new objects, such as DHCP ranges, to the network.
• Delete or schedule the deletion of a selected object or multiple objects.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters.
• Print or export the data.
You can also view the scopes in the IP Map.
About Superscopes
In Grid Manager, you can group DHCP ranges served by Microsoft servers into a superscope. You can add multiple
DHCP ranges to a superscope, as long as the ranges are all served by the same Microsoft DHCP server. The Grid
member then synchronizes the superscope and its associated DHCP ranges as superscopes and scopes to the
Microsoft DHCP server.
You can also associate extensible attributes with superscopes in Grid Manager. Extensible attributes are not
synchronized to the Microsoft DHCP server.
Only admins with read/write permission to superscopes can add and manage superscopes.
Adding Superscopes
Before you add a superscope, you must first create at least one DHCP range to include in the superscope. To add a
superscope:
1. From the Data Management tab, select the DHCP tab.
2. If you have more than one network view in the system, select the network view in which you want to add the
superscope. The network view must be the same one that is assigned to the Microsoft server.
3. Expand the Toolbar and click Add -> Superscope.
4. In the Add Superscope wizard, complete the following and click Next:
Viewing Superscopes
To view superscopes, navigate to the Data Management tab -> DHCP tab -> Networks tab -> Microsoft Superscopes.
Grid Manager displays the following information about each superscope that is displayed:
• Name: The name of the superscope. Grid Manager appends the FQDN of its associated Microsoft server so you
can identify which superscope belongs to which server.
• Comment: The comment that was entered for the superscope.
• DHCP Utilization: The percentage of the total DHCP usage of the ranges in the superscope. Fixed addresses and
reservations that are outside of a range are excluded from the calculation.
• Site: The site of the superscope. This is one of the predefined extensible attributes.
You can add the following columns for viewing:
• Static Addresses: The number of static addresses.
• Dynamic Addresses: The number of dynamic addresses.
• Disabled: Indicates whether the superscope is enabled.
You can do the following in this section:
• Click the link of a superscope to list its address ranges.
• Add a superscope.
• Modify some of the data in the table. Double click a row of data, and either edit the data in the field or select an
item from a drop-down list. Note that some fields are read-only. For more information about this feature, see
Modifying Data in Tables.
• Use filters and the Go to function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria. For information, see Using Quick Filters.
• Print or export the information in this section.
• Delete a superscope.
Modifying Superscopes
To modify a superscope:
1. From the Data Management tab, select the DHCP tab -> Network tab -> Microsoft Superscopes ->
ms_superscope checkbox, and then click the Edit icon.
2. The Superscopes editor contains the following tabs from which you can modify data:
• General: You can modify the name and comment, and enable or disable the superscope. You can also
add and delete address ranges from the superscope. Note that when you delete the last DHCP range in a
superscope, Grid Manager automatically deletes the superscope as well.
• Extensible Attributes: Define extensible attributes for the superscope. These apply only when the
superscope is managed in Grid Manager. For information, see Managing Extensible Attributes.
• Permissions: Define administrative permissions that apply to the superscope when it is managed in Grid
Manager. For information see About Administrative Permissions.
3. Save the configuration and click Restart if it appears at the top of the screen.
Synchronizing Updates
A Grid member synchronizes DHCP data with each of its managed Microsoft server at regular intervals. During each
synchronization, updates from Grid Manager are applied to the Microsoft server and updates from the Microsoft server
are applied to the Grid as well.
Because admins can update DHCP data from both the Microsoft server and from Grid Manager, conflicts can occur
during synchronization. The following guidelines describe how the Grid member resolves conflicts and handles any
differences when DHCP data is synchronized between a Microsoft server and the Grid.
• If a Microsoft server admin modifies an object that has a pending scheduled task in Grid Manager and
synchronization occurs before the scheduled task, the object is modified in both the Microsoft server and the Grid
member. When the scheduled task executes at its scheduled time, it fails and an error message is logged in the
audit log.
• When a Microsoft server admin and a Grid Manager admin change the same object, the Grid member retains the
version that exists on the Microsoft server. Following are some examples:
Deletes the 10.1.1.0/24 network which has Adds a scope that is within the 10.1.1.0/24 The 10.1.1.0/24 network is created on the Grid with
two DHCP ranges network the updates and is assigned to the Microsoft server.
Changes the DHCP options of a scope Deletes the scope. The scope is deleted from the Grid as well.
• If a Grid member manages multiple Microsoft servers, it can synchronize scopes to the same network as long as
they are served by different Microsoft servers and they do not overlap. If the Microsoft servers have scopes that
overlap, the Grid member synchronizes only one of the scopes, including its reservations. It does not synchronize
the other scopes and logs an error message for each scope that is not synchronized. For information about the
Microsoft logs, see Viewing Synchronization Logs.
Note that a Grid member can synchronize scopes with overlapping reservations because they are served by
different Microsoft servers.
• When a Grid member synchronizes a split-scope to its respective Microsoft servers, the scopes use the default
value for the DHCP Offer Delay value, since this property is not supported by NIOS.
• If you create a split-scope on a NIOS appliance, synchronization fails if there is an existing scope in the same
network on one of the Microsoft servers. Only one scope is allowed in a network, per Microsoft server.
• If a Microsoft admin adds a DHCP range and a NIOS admin is in the process of adding the same range when a
synchronization occurs, the NIOS admin will not be able to save the range after the synchronization. Grid
Manager will display an error message indicating that the range already exists.
• If both a NIOS admin and a Microsoft admin create a scope or split-scope and conflicts occur, the Microsoft
server always takes precedence. All conflicts are logged to the Microsoft log. Following are some examples:
• If the NIOS admin creates a scope and a Microsoft server admin creates a split-scope for the same DHCP
range, the split-scope is synchronized to Grid Manager.
• If the NIOS admin creates a split-scope on Microsoft servers 1 and 2, and a Microsoft admin creates the
same split-scope on Microsoft servers 1 and 3 but with different exclusion ranges, the scope created by
the NIOS admin on Microsoft server 1 is dropped upon synchronization.
• If the NIOS admin creates a split-scope on Microsoft servers 1 and 2, and a Microsoft admin creates the
same split-scope on the same Microsoft servers but with different exclusion ranges, the split-scope
Note
Synchronizing IPv6 data is not supported.
As shown in the table below, Microsoft servers and Infoblox DHCP servers represent DHCP data differently. Scopes on
Microsoft servers are DHCP ranges on Infoblox DHCP servers. Additionally, Microsoft servers support split-scopes, which
is a scope assigned to two Microsoft servers. Each scope has an exclusion range on opposite ends to specify the pool of
IP addresses that the other Microsoft server allocates. On an Infoblox DHCP server, each scope in the split-scope is
represented as a DHCP range with an exclusion range. Note that NIOS also synchronizes scopes assigned to more than
two Microsoft servers, but they are not synchronized as split-scopes.
Fixed addresses on Infoblox DHCP servers are the same as reservations on Microsoft servers. Infoblox reservations,
which are IP addresses that are excluded from DHCP, are not supported on Microsoft servers. Microsoft superscopes,
which are used to group scopes, are represented as superscopes and can be managed from Infoblox DHCP servers.
Address pool from which the server allocates addresses Scope DHCP Address Range in a Network
An IP address that is always assigned to the same device Reservation Fixed Address
An IP address that is excluded from DHCP because a user Not supported Reservation
intends to configure it manually on a network device
Note
In this chapter, reservations always refer to Microsoft reservations (Infoblox fixed addresses), unless otherwise
specified.
When the member synchronizes a scope to the Grid, it converts the scope to a DHCP range and network. For example, it
converts the Microsoft scope 10.1.1.1- 10.1.1.200 with a netmask of /24 to the network 10.1.1.0/24 and DHCP range
10.1.1.1- 10.1.1.200 on Grid Manager. The member associates the DHCP properties of the scope, including its DHCP
and Microsoft vendor options, with the DHCP range. It synchronizes the leases within the range and if configured, the
exclusion range as well.
NIOS synchronizes two scopes as split-scopes if the following conditions are met:
• Two scopes have the same address range.
• The scopes are assigned to two different Microsoft servers.
Monitoring
This section explains how to use the different monitoring and reporting tools, including DHCP fingerprint detection and
SNMP. It includes the following topics:
Member Status
You can monitor the overall status, such as the memory usage and system temperature, of a Grid member or an
independent appliance using the Member Status (System Status) widget on the Dashboard.
To monitor the detailed status of a member, from the Grid tab, select the Grid Manager tab -> Members tab.
In the Members tab, Grid Manager displays the Grid Master first and then all other members in alphabetical order. If a
member is an HA pair, you can click the arrow next to the member row to view information about the active and passive
nodes. Grid Manager can display the following information:
• Name: The name of the member.
• HA: Indicates whether the member is an HA pair.
Note
The placement of the Host Platform and Hypervisor columns may vary after a NIOS upgrade.
To turn the identification button on or off on the member, click the Hardware Identify icon from the horizontal navigation
bar. Grid Manager displays a panel with the appliance name, status, and IP address. Hover your mouse over the row and
click Turn On to turn the identification button on, or click Turn Off to turn it off.
To view detailed status, select a member checkbox, and then click the Detailed Status icon. Grid Manager displays the
Detailed Status panel. If the selected member is an HA pair, Grid Manager displays the information in two columns, one
for the active node and the other for the passive. The Detailed Status panel provides detailed information described in
the following sections.
You can modify some of the data in the table. Double click a row, and either modify the data in the field or select an item
from a drop-down list. Click Save to save the changes. Note that some fields are read only.
Appliance Status
The status icon indicates the operational status of a Grid member and a general description of its current operation. The
status icon can be one of the following:
The following are descriptions that may appear: Running, Offline, Error, and Warning.
Disk Usage
Grid Manager displays the percentage of the data partition of the hard disk drive that is currently in use on the selected
Grid member. It also displays whether the percentage of usage has exceeded the trigger or reset value. Note that the
trigger and reset values are user configurable. The default trigger value is 85% and reset value is 70%. The status icon
can be one of the following:
Green The disk usage is either below the reset value or has not yet reached the trigger value.
Yellow The disk usage is decreasing from the trigger value, but has not yet reached the reset
value.
DB Capacity Usage
Grid Manager displays the current percentage of the database in use on the selected Grid member. It also describes
whether the usage has exceeded the trigger or reset value. Note that the trigger and reset values are user configurable.
The default trigger value is 80% and the reset value is 70%. For information, see Using the Capacity Report. The status
icon can be one of the following:
Green The database capacity is either below the reset value or has not yet reached the trigger
value.
Yellow The database capacity is decreasing from the trigger value, but has not yet reached the
reset value. When the capacity exceeds the trigger value, the icon changes from green to
yellow.
LCD
The LCD status icon indicates its operational status.
Memory Usage
Grid Manager displays the current percentage of system memory in use on the selected Grid member. It also describes
whether the usage has exceeded the trigger or reset value. Note that the trigger and reset values are user configurable.
The default trigger value is 90% and the reset value is 80%. You can see more details about memory usage through the
CLI command: show memory. The status icon can be one of the following.
Yellow The memory usage is decreasing from the trigger value, but has not yet reached the reset value.
Green The memory usage is either below the reset value or has not yet reached the trigger value.
Swap Usage
Grid Manager displays the current percentage of swap area in use on the selected Grid member. It also describes
whether the usage has exceeded the trigger or reset value. Note that the trigger and reset values are user configurable.
The default trigger value is 20% and the reset value is 10%. The status icon can be one of the following:
Yellow The memory usage is decreasing from the trigger value, but has not yet reached the
reset value.
Green The memory usage is either below the reset value or has not yet reached the trigger
value.
FAN
The status icon indicates whether the fan is functioning properly. The corresponding description displays the fan speed.
The status icon and fan speed are displayed for Fan1, Fan2, and Fan3.
Note
vNIOS appliances on VMware do not monitor or report the fan speed.
NTP Synchronization
The status icon indicates the operational status of the current NTP synchronization status.
Yellow The NTP service is enabled, and the appliance is synchronizing its time.
Red The NTP service is enabled, but it is not running properly or is out of synchronization.
CPU Temperature
This icon is always green. The description reports the CPU temperature.
Note
vNIOS appliances on VMware do not monitor or report the CPU temperature.
System Temperature
This icon is always green. The description reports the system temperature.
Note
vNIOS appliances on VMware do not monitor or report the system temperature.
CPU Usage
Grid Manager displays the current percentage of the CPU usage on the selected Grid member. The maximum is 100%. It
also describes whether the CPU usage has exceeded the trigger or reset value. Note that the trigger and reset values
are user configurable. The default trigger value is 81% and the reset value is 70%. You can see more details about CPU
usage through the CLI command: show CPU.
Grid Status
You can monitor the overall status of the Grid using the Grid Status widget on the Dashboard.
You can also view the Grid status from the Grid Manager tab. To view Grid status, from the Grid tab, select the Grid
Manager tab. Grid Manger displays the overall Grid status and status of all Grid services. The Grid status represents the
status of the most critical members or services in the Grid. When all Grid members are running properly, the overall Grid
status is green. When one of the members has operational problems, the overall Grid status is red. Grid Manager lists all
Grid members in the Members tab so you can identify which member has issues. For information, see Member Status.
In addition, the service bar below the Grid status lists the status of all licensed services on your Grid. This can include
DHCP, DNS, Cloud-API, TFTP, HTTP (File Distribution), FTP, NTP, bloxTools, Captive Portal, DNS Accelerator,
Reporting, Discovery and others, depending on the active licenses you have installed. When you click a service link, Grid
Manager displays detailed information about the selected service running on all members. For information, see
Monitoring Services.
Grid Manager also provides icons you can use to edit Grid properties and bookmark the page.
Monitoring Services
The Grid or device status icon and the service icon indicates whether a service running on a member or an independent
appliance is functioning properly or not.
Service Status
After you enable any of the services — DHCP, DNS, TFTP, HTTP (for file distribution), FTP, NTP, bloxTools, Captive
Portal, Reporting, Discovery, Threat Protection and Cloud API — the appliance indicates their status as follows:
Red The service is enabled, but it is not running properly. (A red status icon can also appear
temporarily when a service is enabled and begins running, but the monitoring mechanism has
not yet notified Grid Manager.)
Note
When you enable reporting service on the Grid and configure multi-site cluster, you can monitor the status of all
reporting members that you have configured. For information about reporting clusters,
see Configuring Reporting Clusters.
Note
The Reporting Site column is hidden by default. To display this column, click the down arrow next to any column
header and select Columns -> Edit Columns -> Reporting Site checkbox and click Apply. If
the Reporting Site column is visible, then the extensible attribute value is automatically updated.
3. Optionally, click the Edit icon next to the service name to edit the Grid properties for the service.
or
Select a member checkbox, and do one of the following:
• Click the Edit icon to edit the member service configuration. Grid Manager displays the editor for the
corresponding service. For example, when you edit the DHCP service, Grid Manager displays the
Member DHCP Configuration editor.
In addition to saving system messages to a remote syslog server, a NIOS appliance also stores the system messages
locally. When the syslog file reaches its maximum size, which is 300 MB for Infoblox appliances and VMware virtual
appliances, the appliance automatically writes the file into a new file by adding a .0 extension to the first file and
incrementing subsequent file extensions by 1.
Files are compressed during the rotation process, adding a.gz extension following the numerical increment (file.#.gz).
The sequential incrementation goes from zero through nine. When the eleventh file is started, the tenth log file (file.9.g
z) is deleted, and subsequent files are renumbered accordingly. For example, the current log file moves to file.0.gz,
the previous file.0.gz moves to file.1.gz, and so on through file.9.gz. A maximum of 10 log files (0-9) are kept.
You can set syslog parameters for RPZ at the Grid, member, and zone levels. At the member level, you can override
Grid-level syslog settings and enable syslog proxy, also you can override Grid-level settings to zone level. For more
information see, Modifying RPZs.
You can configure the appliance to back up rotated syslog files to external servers through FTP or SCP. When you do so,
the appliance forwards the rotated syslog files to the external servers that you configure. You can configure up to 10
external syslog backup servers each at the Grid, member, and zone levels. You can also override the Grid-level server
configuration at the member level. For information about configuring syslog backup servers, see Configuring Syslog
Note
The syslog categories you specify here are different from the logging categories
specified in the Logging tab in
the Grid DNS Properties or Member DNS Properties editor. The external server
preserves contents of the selected categories even when selection is changed
from Send all to Send selected categories and vice versa.
Note
When you set Send all in the Logging Category, the appliance logs syslog messages for all the events and they
are not prefixed. The syslog messages are prefixed even if one external syslog server is set with
the Send selected categories option.
The following are the prefixes used for different logging categories:
• DNS Logging Categories: All DNS related messages use the following prefixes: client, config, database,
dnssec, general, lame_servers, network, notify, queries, query_rewrite, resolver, responses,
rpz, security, update, update_security, xfer_in, and xfer_out.
Note
There is no prefix for RPZ syslog messages that do not belong to the DNS or ADP category.
• DHCP: All DHCP related messages use the following prefixes: dhcpd, omshell, dhcrelay, and dhclient.
Sample syslog message for dhcp:
• DTC: All DTC related messages use the following prefixes: idns_healthd and idnsd.
Sample syslog message for idns_healthd:
group=.admin-group
Disabled
• File Distribution: All File Distribution related messages use the following prefixes: ftpd and tftp.
Sample syslog message for TFTP:
Sep 3 13:03:09 10.34.6.30 monitor[23623]: Type: TFTP, State: Red, Event: A TFTPD daemon
• Authentication: All Authentication related messages use the following prefixes: auth, authpriv, AD, and
radiusd.
• Microsoft Integration: All Microsoft Integration related messages use the following prefixes: dns_server,
connect_status, dns_zone, dhcp_server, dhcp_leases, clear_lease, ad_site, and ad_users.
dns_server:
dhcp_server:
open RPC interface <MS-WKST>: an instance of a named pipe cannot be found in the listening
state
Based on your filter criteria (if any), Grid Manager displays the following in the Syslog viewer:
Note
If the selected member is an HA pair, the Grid Manager displays the syslog in two tabs — Active and Passive.
Click the corresponding tab to view the syslog for each node.
Note
The RPZ Threat Details dialog box may display Unknown if the threat is unknown,
or Unavailable if the threat is known and threat details are not available.
3. Click the Close icon to close the RPZ Threat Details dialog.
You can also perform the following in the Syslog viewer:
• Toggle between the single line view and the multi-line view for display.
• Navigate to the next or last page of the file using the paging buttons.
• Refresh the syslog output with newly logged messages.
• Click the Follow icon to have the appliance automatically refresh the log every five seconds.
• Clear the contents of the syslog.
• Use filters and the Go To function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go To field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria.
• To filter Microsoft synchronization related events, click Show Filter, select Server from the first drop-down list, and
select MS_Server from the drop-down list in the value field. This filter displays entries that begin with the prefix
ms. To view values that belong to a specific Microsoft server, you must specify either the name or IP address of a
given Microsoft server in the Message field. When you filter the syslog for a specific Grid member, it displays the
log entries of Microsoft servers that are assigned to the respective Grid member when the entries are logged.
• Print the report or export it in CSV format.
• Bookmark the syslog page.
The appliance searches through the syslog and highlights the search value in the viewer. You can use the arrow
keys next to the Search icon to locate the previous or next message that contains the search value.
Note
If your browser has a pop-up blocker enabled, you must turn off the pop-up blocker or configure your browser to
allow pop-ups for downloading files.
where
+ = recursion
- = no recursion
S = TSIG
E = EDNS option set
T = TCP query
D = EDNS ‘DO’ flag set
C = ‘CD’ message flag set
where
- = recursion not available
Note
Enabling the logging of queries and responses at the same time can increase disk space usage and adversely
affect DNS services and performance. Infoblox recommends that you do not configure both logging at the same
time.
• Select Capture queries/responses for all domains to capture queries and responses to all domains and
zones.
• Select Limit capture to these domains to capture DNS queries and responses to domains and zones one
at a time.
• Specify domains for DNS capture operations in the Domain table by clicking the Add icon, and choosing
Add Domain or Bulk Add Domains from the menu.
• To define the destination for capture files, do the following:
• Retain captured queries on the local disk: Select this checkbox to save the DNS queries on the
appliance. In addition to the local disk, you can select to export the DNS queries to the remote
server by selecting SCP in the Export to drop-down list.
• Export to: From the drop-down list, select SCP to back up the DNS queries on the remote server
and None to save queries only on the appliance. To save the captured DNS queries on both the
appliance and the remote server, select the Retain captured queries on the local disk checkbox
and SCP from the Export to drop-down list.
Note
When you configure an SCP server and enable the MGMT port, the NIOS appliance uses SSH for data
transfer. It uses the same authentication and provides the same security as SSH. SCP uses the LAN1 port to
communicate with the external servers.
• When you select FTP or SCP from the Export to drop-down list, complete the following:
• In the Directory Path field, enter the directory to which the capture file will be saved on the server.
Infoblox recommends that you use the ~ symbol for the remote server.
• In the Server Address field, enter the IP address of the remote server to which the capture files will
be saved.
Maximum Hard Drive Space used for DNS queries and Responses
Supported Infoblox Appliances Maximum Hard Drive Space for DNS Query /Response
Capture (MB)
IB-VM-100 400
IB-VM-820 3100
PT-1405 10000
PT-2205 28000
Note
IDNs are not supported for the domains that are added to the Inclusion list and Exclusion list. You can use the
punycode representation of an IDN in these lists.
Note
NIOS first matches the domains in the Exclusion list and then matches the domains in the Inclusion list. NIOS
does not capture queries and responses for the subdomains in the Capture DNS Queries/Responses list
(Inclusion list) if their domains are added to the Exclude the following domains list (Exclusion list).
The following table provides examples of domains and subdomains added to the Inclusion and Exclusion lists and the
corresponding effects on the query and response capture operations:
foo.com – • foo.com Yes Exclusion list is empty and therefore matches the
Inclusion list. NIOS captures queries/responses
• finance.foo.c made to foo.com and finance.foo.com
om
Capture All foo.com • foo.com No Matches the Exclusion list and NIOS does not
capture queries made to foo.com.
• corp1.com Yes Does not match the Exclusion list. Matches the
Inclusion list and therefore NIOS captures queries/
responses made to corp1.com.
foo.com it.foo.com • foo.com Yes Does not match the Exclusion list and therefore NIOS
captures queries/responses made to foo.com and
• finance.foo.c finance.foo.com.
om
Configuring dnstap
You can use the dnstap log format to log DNS queries and responses at high rates to well-known destinations. NIOS logs
all valid DNS queries and responses that are not dropped by Advanced DNS Protection. For information about dnstap,
see https://dnstap.info/.
For information about capturing DNS queries and responses without using dnstap, see Capturing DNS Queries and
Responses.
Note
dnstap for high-performance query logging is supported on specific Infoblox appliances with Advanced DNS
Protection or DNS Cache Acceleration running on them.
The transmitter initiates the communications to the receiver by first sending a READY control frame carrying the
protobuf:dnstap.Dnstap string. The receiver responds with an ACCEPT control frame carrying the same
protobuf:dnstap.Dnstap string. The handshake is completed when the transmitter sends a START control frame
carrying the same protobuf:dnstap.Dnstap string.
Frame Streams Control Frame Format
Data packets are carried over the connection with only a 4-byte framing overhead as illustrated in the following figure.
Frame Streams Data Frame Format
Note
For Advanced DNS Protection software with acceleration, you must download the latest ruleset before enabling
dnstap.
Small 10 16 24 100,000 No
recursive DNS
(with
acceleration)
Medium 16 24 32 100,000 No
recursive DNS
(with
acceleration)
Large 26 34 42 100,000 No
recursive DNS
(with
acceleration)
Monitoring Tools
You can use the audit log, the replication status, the traffic capture tool, and the capacity report in a Grid or HA pair to
monitor administrative activities and capture traffic for diagnostic purposes. You can also use CLI commands to monitor
certain DNS transactions.
This section includes the following topics:
• Using the Audit Log
• Viewing the Replication Status
• Using the Traffic Capture Tool
• Using the Capacity Report
• Monitoring DNS Transactions
• Viewing DNS Alert Indicator Status
• Configuring DNS Alert Thresholds
In addition, if Grid members manage Microsoft servers, Grid Manager creates a synchronization log file for each
managed Microsoft server. For information, see Viewing Synchronization Logs.
Note
There might be a slight impact on the device performance as the session log information, such as URI, InData,
and response time, are captured for all the successful WAPI calls. The audit log file size increases as the log
entries increase, which may impact the storage capacity. Infoblox recommends that you select
the Copy Audit Log Messages to Syslog checkbox in the Grid Properties Editor to move audit log information to
Note
The admin user displayed as $admin group name$ represents an internal user. You can create an admin filter
with “matches expression” equals ^[^$] to filter out internal users.
• Action: The action performed. This can be CALLED, CREATED, DELETED, LOGIN_ALLOWED,
LOGIN_DENIED, MESSAGE, MODIFIED, POST, PUT, and DELETE.
• Object Type: The object type of the object involved in this task. This field is not displayed by default. You
can select this for display.
• Object Name: The name of the object involved in this task.
• Execution Status: The execution status of the task. Possible values are Executed, Normal, Pending
Approval and Scheduled.
• URI: A certain part of the incoming WAPI request.
• InData: Input data fields of the incoming WAPI request.
• Response Time: The processing time of the incoming WAPI request.
• Message: Detailed information about the performed task.
You can also perform the following in the log viewer:
• Toggle between the single line view and the multi-line view for display.
• Navigate to the next or last page of the file using the paging buttons.
• Refresh the audit log view.
• Click the Follow icon to have the appliance automatically refresh the log every five seconds.
• Download the log.
• Clear the contents of the audit log.
• Use filters and the Go To function to narrow down the list. With the autocomplete feature, you can just enter the
first few characters of an object name in the Go to field and select the object from the possible matches.
• Create a quick filter to save frequently used filter criteria.
• Export or print the content of the log.
Note
If your browser has a pop-up blocker enabled, you must turn off the pop-up blocker or configure your browser to
allow pop-ups for downloading files.
Note
The NIOS appliance always saves a traffic capture file as <member name>_<timestamp>_tcpdumpLog.tar.gz.
Example: infoblox.localdo_0_2018-10-15-03-47-53_tcpdumpLog.tar.gz. For FTP and TFTP transfers, the name
of the file is added as a prefix. Example: filename.infoblox.localdo_0_2018-11-09-09-30-07_tcpdumpLog.tar.gz
For a single member, you can also capture traffic on the NIOS appliance through the Infoblox CLI using the set
traffic_capture command. However, you cannot use this command to capture traffic for multiple members. NIOS
displays the traffic capture status and it allows you to download the captured traffic, irrespective of whether the traffic
capture is initiated from the Infoblox CLI or from Grid Manager.
To capture traffic for a single member or multiple Grid members:
Note
Selecting members in the Grid Manager → Members tab does not capture traffic for the selected
member. To capture traffic, you must select members from the Member Selector dialog box.
• Interface: Select the port on which you want to capture traffic. You can view the selected interface while
the traffic capture is in progress. Note that if you enabled the LAN2 failover feature, the LAN and LAN2
ports generate the same output and Grid Manager displays the interface as BOND while the traffic
capture is in progress. By default, the interface is set to ALL after the traffic capture process stops. For
information about the LAN2 failover feature, see About Port Redundancy.
Note
For vNIOS appliances, some of the options in the drop-down list may vary depending on your
vNIOS configuration. For example, if you are using a single network interface instance of a
vNIOS for GCP appliance, you will see choices specific to the LAN1 interface only.
•LAN: Select this to capture all the traffic the LAN port receives and transmits.
•MGMT: Select this to capture all the traffic the MGMT port receives and transmits.
•LAN2: Select to capture all the traffic the LAN2 port (if enabled) receives and transmits.
•ALL: Select this to capture the traffic addressed to all ports. Note that the NIOS appliance only
captures traffic that is addressed to it.
• LANxnnnn: If you have configured VLANs on the LAN1 or LAN2 port, the appliance displays the
VLANs in the format LANx nnnn, where x represents the port number and nnnn represents the
associated VLAN ID.
• File Size: Displays the size of the traffic capture log file, in kilobytes, for the respective member.
• Status: Displays the status of the traffic capture session on the member. The status can be one of the
following:
• STOPPED: Indicates that the traffic capture session has stopped.
• RUNNING: Indicates that the traffic capture session is in progress.
• NOT STARTED: Indicates that the traffic capture session has not started.
• Transfer Status: Displays the status of the traffic capture file transfer. The status can be one of the
following:
• NOT STARTED: Indicates that the file transfer has not started.
• STARTED: Indicates that the file transfer has started.
• COMPLETED: Indicates that the file transfer has been completed.
• FAILED: Indicates that the file transfer has failed.
3. Seconds to run: Specify the number of seconds you want the traffic capture tool to run.
4. Capture Control: Click the Start icon to start the capture. Note that the start action will overwrite the existing
traffic capture file. You can click the Stop icon to stop the capture after you start it.
5. Transfer To: Select the destination to transfer the traffic capture file. You can select My Computer, TFTP, FTP, or
SCP from the drop-down list.
Note
To avoid consumption of the Grid Master disk space, NIOS restricts downloading the traffic
capture files from multiple members to a local directory on your compute
Note
The NIOS appliance must have free disk space of at least 500MB + size of the traffic capture file (2 GB/1 GB,
depending on the appliance model) to download the traffic capture file.
When you enable DNS alert monitoring, if DNS network monitoring is disabled, the appliance automatically enables DNS
network monitoring and displays the following:
DNS Network Monitoring is disabled. It must be enabled for alerting to function.
You can also disable DNS network monitoring and DNS alert monitoring using the following commands:
set monitor dns off
set monitor dns alert off
Note
When you restart DNS network monitoring, you also reset the SNMP counters for DNS alerts.
You can then view the alert status to identify the primary source of invalid DNS responses. For information, see Viewing
DNS Alert Indicator Status.
The appliance displays historical alert counts and up to five primary sources that generate invalid DNS responses, as
shown in the following example:
Data last updated: Mon Oct 6 14:47:12 2008
DNS Alert1m5m15m60m24hEver
============================================
port8 12 1212 12 12
txid8 12 1212 12 12
The appliance attempts to resolve the hostnames of the sources that sent invalid responses, if the DNS resolver is
enabled. If the appliance cannot resolve a hostname, it displays "unknown" as the hostname of the invalid response.
Note
Ensure that you enable SNMP traps and e-mail notifications. For information, see Configuring SNMP.
You can configure thresholds for both invalid ports and invalid TXIDs. The default thresholds for both invalid ports and
TXIDs are 50%. When the number of invalid ports or invalid TXIDs exceeds the thresholds, the appliance logs the event
and sends SNMP traps and notifications. You can configure the thresholds either as absolute packet counts or as
percentages of the total traffic during a one-minute time interval.
To configure DNS alert thresholds:
1. Log in to the Infoblox CLI as a superuser account.
2. Enter the following CLI command:
set monitor dns alert modify port | txid over threshold_value packets | percent
where
port | txid = Enter port to set the threshold for invalid ports, or enter txid to set the threshold for invalid
TXIDs.
threshold_value = Enter the number of packets or percentage for the threshold.
packets | percent = Enter packets if you want to track the total packet count, or enter percentage if you want
to track a percentage of the total traffic. For a percentage-based threshold, the appliance does not generate a
threshold crossing event if the traffic level is less than 100 packets per minute.
For example, if you want the appliance to send a DNS alert when the percentage of DNS responses arriving on invalid
ports from UDP port 53 exceeds 70% per minute, you can enter the following command:
set monitor dns alert modify port over 70 percent
If you want the appliance to send a DNS alert when the total number of packets with invalid TXIDs from UDP port 53 is
over 100 packets per minute, you can enter the following command:
set monitor dns alert modify txid over 100 packets
When there is a DNS alert, the appliance logs an event in the syslog file and sends an SNMP trap and e-mail notification
if enabled.
The appliance displays the threshold information as shown in the following example:
Note
When you enable rate limiting, the appliance discards packets based on the configured rate limiting rules.
This might affect the DNS performance when the appliance discards valid DNS responses.
When you disable rate limiting, the appliance stops applying the rate limiting rules.
where
all | ip_address = Enter all or 0.0.0.0 if you want to limit all traffic from all sources, or enter the IP
packets = Enter the number of packets per minute that you want to receive from the source.
[burst burst_packets] = Optionally, enter burst and the number of packets for burst traffic. This is the
maximum number of packets accepted.
• To limit traffic to five packets per minute from host 10.10.1.2, enter the following command:
set ip_rate_limit add source 10.10.1.2 limit 5/m
• To limit the traffic to five packets per minute from host 10.10.2.1/24 with an allowance for burst traffic of 10
packets, enter the following command:
set ip_rate_limit add source 10.10.2.1/24 limit 5/m burst 10
• To limit the traffic to 5000 packets per minute from all sources, enter the following command:
set ip_rate_limit add source all limit 5000/m
or
• To remove all of the rate limiting rules from all sources, enter:
set ip_rate_limit remove all
Note
If DNS Cache Acceleration is enabled on the IB-FLEX platform, the cache hit ratio is not updated for a minute
thus triggering a false traffic capture.
Note
If you enable the Include Support Bundle checkbox but do not specify the directory path for the support
bundle, NIOS transfers the support bundles to the directory path that you specify in the Directory Path
For Capture field.
10. In the Server Address field, enter the IP address of the FTP or the SCP server that you selected from the Export
to drop-down list.
11. In the Username and Password fields, enter the user credentials to upload to the FTP or SCP server.
12. Select the Enable Cache Hit Ratio Trigger checkbox if you want NIOS to trigger a traffic capture based on the
value of the cache hit ratio of recursive queries. If the cache utilization goes above the value you specify in the
Cache Utilization field and the cache hit ratio goes below the value you specify in the Hit Ratio Threshold Trigger
field, traffic capture is triggered. Once the cache hit ratio reaches the value you specify in the Reset field, NIOS
stops the traffic capture.
],
"name": " hhh.test.com",
"view": "default"
},
"object_type": "record:host",
"unique_id": "c326fcf8058c4022939050af96a0fdb2"
},
{
"_ref": "db_objects/Li5hbGxfY2hhbmdlZF9vYmplY3RzJDIx:38",
"object": {
"_ref":
"record:host_ipv6addr/ZG5zLmhvc3RfYWRkcmVzcyQuX2RlZmF1bHQuY29tLmthcmphZ2kuaG9zdDEuYWE6
OmFhLg:aa%3A%3Aaa/ hhh.test.com/default",
• When you update DNS host, host address, and host alias, NIOS updates the sequence IDs of child objects
associated with these parent objects even though the changes do not affect the child objects. For example, when
you update an existing comment in the host record, NIOS updates the sequence IDs of child objects associated
with the respective host record.
Example:
curl -k1 -u admin:infoblox -H content-type:application/json -X GET
https://10.32.2.202/wapi/v2.5/db_objects?start_sequence_id=2830689052:0\&object_types=
record:host,record:host_ipv4addr\;_return_fields=last_sequence_id,object,object_type,o
bject.comment\;_return_type=json-pretty
• When an IPv4 or an IPv6 host address changes, NIOS deletes the old record and creates a new record with the
updated IP address. Note that new sequence IDs are generated for the associated objects. When you query a
host record, NIOS displays the list of host addresses associated with it.
Example:
curl -k1 -u admin:infoblox -H content-type:application/json -X GET
https://10.32.2.202/wapi/v2.5/db_objects?start_sequence_id=2830689052:0\&object_types=
record:host,record:host_ipv4addr\;_return_fields=last_sequence_id,object,object_type\;
_return_type=json-pretty
"ipv4addrs": [
{
"_ref":
"record:host_ipv4addr/ZG5zLmhvc3RfYWRkcmVzcyQuX2RlZmF1bHQuY29tLnRlc3QuaGhoLjEuMC4wLjIu
:1.0.0.2/hhh.test.com/default",
"configure_for_dhcp": false,
"host": "hhh.test.com",
"ipv4addr": "1.0.0.2"
}
],
"name": "hhh.test.com",
"view": "default"
},
"object_type": "record:host"
"unique_id": "1ab6c989d8fd454ca06ffac6ac600fe6"
},
{
"_ref": "db_objects/Li5hbGxfY2hhbmdlZF9vYmplY3RzJDE:28",
"object": {
"_ref": "deleted_objects/Li5kZWxldGVkX29iamVjdHMkMA",
"object_type": "record:host_ipv4addr",
"unique_id": "68cad3406a244aa0b34b3ea3be383598"
},
"object_type": "deleted_objects"
"unique_id": "1ab6c989d8fd454ca06ffac6ac600fe4"
},
{
"_ref": "db_objects/Li5hbGxfY2hhbmdlZF9vYmplY3RzJDI:28",
"object": {
"_ref":
"record:host_ipv4addr/ZG5zLmhvc3RfYWRkcmVzcyQuX2RlZmF1bHQuY29tLnRlc3QuaGhoLjEuMC4wLjIu
:1.0.0.2/hhh.test.com/default",
• NIOS returns the shared records per zone when you query for them. For example, consider two zones, z1 and
z2, and a shared record group, srg1, which contains a shared record sr1. The shared record group srg1 is
associated with the zones z1 and z2. Hence, the shared record sr1 is shared between two zones, z1 and z2, but
NIOS saves only a single copy of the shared record sr1 in the database. When you query for shared record
updates, NIOS returns two records for z1 and z2, as sr1 is associated with both the zones, z1 and z2, and saves
these records with a UUID and a sequence ID in the table. The response also contains new records with zone
pointing to the zone it belongs to, UUID and sequence ID of the new records and a shared_record_group, which
indicates that it is a shared record and not a normal resource record. When you enable Object Change Tracking
feature, NIOS clears this table and recreates a new table for the existing shared records.
• Note that NIOS generates two leases in the database when a client sends a DHCP request to the NIOS DHCP
server, which is configured with failover association. You can perform either a full or an incremental
synchronization in this scenario. Infoblox recommends that you ignore the lease that is generated by the failover
DHCP server with binding_state as BACKUP and consider the lease with binding_state as ACTIVE.
• File distribution service automatically removes old files from wapi_output directory if there is no sufficient space
for new files. NIOS allocates 50% each of the file distribution area to wapi_output directory and normal files. For
example, if the file distribution area is allocated 500 MB, then 250 MB is used for wapi_output directory and the
remaining 250 MB is used for normal files.
• NIOS does not support WAPI paging mechanism. As the synchronization results are displayed in the order of
sequence_id, you must specify _max_results to achieve paging mechanism for synchronization.
• NIOS deletes all previous scheduled tasks after a restore or an upgrade operation.
Note
This operation might take a longer time to complete when you have a large database. For
example, 1 million objects on an IB-4015 appliance takes approximately 1 hour. Infoblox
recommends that you enable this feature during off-peak hours.
• Maximum number of deleted objects that will be tracked: Specify the total number of deleted objects that
must be present in the database. The minimum value is 2,000 and the maximum value is 20,000. The
default value is 4,000.
3. Save the configuration.
NIOS saves the output file in the file distribution area if you do not specify an output location as shown in the code below:
curl -k1 -u admin:infoblox -X POST 'https://..../wapi/v2.5/fileop?_function=read' -H 'Content-
Type: application/json; charset=UTF-8' -d '{"_filename": "test.json",
"_output_location":"FILE_DISTRIBUTION","_object": "db_objects",
"all_object_types_supported_in_version": "2.5","_encoding": "ROWJSON"}'
You can fetch this file using the following API request:
curl -k1 -u admin:infoblox -X GET https://10.32.2.202/http_direct_file_io/req_id-OBJECTS-1/
nios-db-objects-1.JSON -H 'Content-Type: application/json; charset=UTF-8'
• If you specify _output_location = "local" and do not schedule the task, then NIOS returns an URL and a
token:
curl -k1 -u admin:infoblox -X POST 'https://127.0.0.1/wapi/v2.5/fileop?_function=read'
-H 'Content-Type: application/json; charset=UTF-8' -d
'{ "_output_location":"LOCAL","_object": "db_objects",
"all_object_types_supported_in_version": "2.5","_encoding": "JSON"}'
"eJy1kU1vwyAMhu/8kfaSD/JB0t5aZZU2Ta3UTtrRSoB2nlJggUztv5+ZtJ123QFk/L7mMUZK6+4w\n6QujTVr
jwzTLYCfmOFtKNGc7jPaWWqPjCnenPev60MNRn5krmAQYZhwDGgCmUAbmSrZUrmKnhb45\nnO4Q8KoXzNVsxyt
RtKVYFU0qqqpuBWf+tJinkWRBBW8hOL/OMp6nZZ2KtG2ymAKF1FuAM44a0GaT\n/gBUSXd43T8fNl3C85xnBq1
P1AB2eCevT5J8leR1UuRcQFGsy3pN1KfTYU+sJmJRUdQS9a/rSFpF\nk6KnUsxz8mWe5tJfdBau7n/64vyHCdp
Iq9BcYrYg+Pbx21D+Gq5WxanyOOhu87KB48Munmvmw9Fx\nET+BNyTi0DtA4+YAn3ryaE20tWzvh/QLT4Gbhw=
=\n",
"url":
"https://10.35.6.87/http_direct_file_io/req_id-DOWNLOAD-1001/nios-db_objects--09-05-20
16_22:35:27.JSON"
}
• To save the file in a local area instead of the file distribution area:
curl -k1 -u admin:infoblox -X POST 'https://127.0.0.1/wapi/v2.5/fileop?
_function=read&_schedinfo.schedule_now=true' -H 'Content-Type: application/json;
charset=UTF-8' -d '{"_output_location": "LOCAL", "_object": "db_objects",
"all_object_types_supported_in_version": "2.5", "_encoding": "JSON"}'
NIOS returns the scheduled task reference so that you can query and find out when will the scheduled task be
complete:
https://127.0.0.1/wapi/v2.5/scheduledtask/b25lLnF1ZXVlZF90YXNrJDE:1/WAITING_EXECUTION
Note that the result is in either JSON or XML format. You can fetch the output file from the wapi-output directory of
the file distribution area when the scheduled task is complete.
Note
Infoblox recommends that you use fileop->read for incremental synchronization when the updated objects
are large in number.
https://10.35.6.87/wapi/v2.5/db_objects?start_sequence_id=992684967:0\&all_object_type
s_supported_in_version=2.5\;return_fields=last_sequence_id,object,object_type,unique
_id\;_return_type=json
The response for the above API request contains all fields of all object types.
• To get an A record and an auth zone object update:
curl -k1 -u admin:infoblox -H content-type:application/jason -X GET
https://10.32.2.202/wapi/v2.5/db_objects?
start_sequence_id=183566281:0\&object_types=r
ecord:a,zone_auth\;_return_fields=last_sequence_id,object,object_type,unique_id\;_return_type=
json
• NIOS returns deleted objects as synthetic deleted objects. To get updates on deleted host objects:
curl -s -k1 -u admin:infoblox -H content-type:application/json -X GET
https://10.34.19.220/wapi/v2.5/db_objects?start_sequence_id=1207501969:0\&object_types
=record:host,bulkhost,record:host_ipv4addr,record:host_ipv6addr\&exclude_deleted=false
• To dump incremental synchronization updates into a file using fileop->read operation when the updated objects
are large in number, you can specify _object=db_objects and all the necessary parameters for incremental
synchronization:
curl -k1 -u admin:infoblox -X POST 'https://10.34.19.100/wapi/v2.5/fileop?_function=read' -H
'Content-Type: application/json; charset=UTF-8' -d '{"_output_location": "LOCAL", "_object":
"db_objects", "start_sequence_id" : "1973553522:0","all_object_types_supported_in_version":
"2.5", "_max_results": 1000000,"_encoding": "JSON"}'
For more information about supported objects in the Infoblox API and Restful API, refer to the Infoblox API
Documentation and the Infoblox WAPI Documentation.
The output includes the token for this transaction and the URL from where to download the Ptop logs as follows:
{
"token":
"eJytUEFuwyAQvPOR5BLM2jEkvaVyI1WqEimp1OPKBuwi2YYCqZK+vhA2jZ2WFmR0rrbuj1\nQNIl7Ryiv8hoPXFAltL
Mve1Ge6V21vnEm9OBNG1s8aR74koiEbuLGaOZEYkyMhJXkaVya3Je6Ksz\n/
obRTHpBXE32UIs156LiQDeMiRK2JJwXFz8mmCfCe4wuPBQFMAoloyVQYKLIXVQm2YvYmjm+HV6Ou2YFUNaMV5yB4ExUd
eGidaMdaGw9Hb7S/yJLGZWi5/G7t5UjXVwBKnCCmX\ndtBFnNw/
mQL4EUEvOzw97fO7JiGeHPCcOogE9kKO3kWn9nbcgh79+1Ds3sLhE/tQ/GzhnbJqy6567j3wFfoFk=\n",
"url": "https://10.12.21.107/http_direct_file_io/req_id-DOWNLOAD-1125063601760735/
ptoplog.tar.gz"
}
3. To ensure that the URL does not remain open for a long time, use the token obtained in step 1 and close the URL
as follows:
$curl -k -u admin:infoblox -H 'Content-Type:application/json' -X POST https://10.12.21.107/
wapi/v2.9.7/fileop?_function=downloadcomplete -d '{"token":
"eJytUEFuwyAQvPOR5BLM2jEkvaVyI1WqEimp1OPKBuwi2YYCqZK+vhA2jZ2WFmR0rrbuj1\nQNIl7Ryiv8hoPXFAltL
Mve1Ge6V21vnEm9OBNG1s8aR74koiEbuLGaOZEYkyMhJXkaVya3Je6Ksz\n/
obRTHpBXE32UIs156LiQDeMiRK2JJwXFz8mmCfCe4wuPBQFMAoloyVQYKLIXVQm2YvYmjm+HV6Ou2YFUNaMV5yB4ExUd
eGidaMdaGw9Hb7S/yJLGZWi5/G7t5UjXVwBKnCCmX\ndtBFnNw/
mQL4EUEvOzw97fO7JiGeHPCcOogE9kKO3kWn9nbcgh79+1Ds3sLhE/tQ/GzhnbJqy6567j3wFfoFk=\n"}'
{}
The NIOS appliance utilizes DHCP fingerprint detection to identify IPv4 and IPv6 mobile devices such as laptop
computers, tablets and smart phones, on your network. Due to the broadcast and pervasive nature of DHCP, using
DHCP fingerprint detection is an efficient way to perform system identification and inventory. You can use DHCP
fingerprint detection to track devices on your network, block those that are not allowed (such as gaming consoles and
home routers), and plan for future growth by accessing trending information such as the number of Apple iPhones versus
that of Android phones.
When a remote DHCP client sends a DHCP REQUEST message, it includes a set of DHCP options, such as option 55
and 60. Option 55 contains an option number sequence the appliance uses to interpret the list of DHCP options that the
client requests. The appliance returns the values of these requested options if the information is available.
The option number sequence for an Apple Mobile Device can be one of the following:
1,121,3,6,15,119,252,0,0,0,0,0,0,0,0,0
1,121,3,6,15,119,252,118
1,3,6,12,15,28,44,121
1,3,6,15,19
1,3,6,21,1,25,2,82
Additionally, DHCP option 60 tracks the vendor ID. The vendor ID can be generic or specific. For example, the vendor ID
MSFT 5.0 for a Microsoft Windows Kernel 5.1 or 5.2 system and a Microsoft Windows Kernel 6.0 system can be the
same. For certain Microsoft Windows Kernel 5.0 systems, the vendor ID can be MSFT, which is generic, or it can be MSFT
5.0, which is specific. Depending on how specific the option number sequence and the vendor ID are, this information
can form a unique identifier, the DHCP fingerprint for a remote client.
Note
If you have enabled a firewall and if the corresponding firewall rules or policies are set to modify options 55 and
60 of the remote DHCP client to mask the identity of the client, then fingerprinting clients cannot be achieved.
Note
When you upgrade to NIOS 6.7 and later, DHCP fingerprint detection is disabled during the upgrade. You must
enable it if you want the appliance to use DHCP fingerprint detection. For information,
see Enabling and Disabling DHCP Fingerprint Detection.
Administrative Permissions
DHCP fingerprint detection is enabled by default for new installations. For upgrades, you must enable this feature after
the upgrade is completed. For information, see Enabling and Disabling DHCP Fingerprint Detection. No special licenses
are required for this feature.
Superusers can add, modify, and delete DHCP fingerprints and DHCP fingerprint filters. Limited-access users with Read/
Write permission to DHCP fingerprints can add, modify, and delete DHCP fingerprints while those who have Read-only
permission can only view information in the Data Management tab -> DHCP tab -> Fingerprints tab. For information
about administrative permissions, see About Administrative Permissions .
Note
The appliance periodically updates the cached DHCP fingerprints. When you add, modify, or delete a DHCP
fingerprint, you do not need to restart the services, but it may take up to two minutes before the appliance
updates the DHCP fingerprint.
Related topic
Understanding Simple Network Management Protocol
Configuring SNMP
You can configure the appliance to receive SNMP queries from specific management systems and send SNMP traps to
specific trap receivers. SNMP operation supports both IPv4 and IPv6 networks. The appliance supports SNMPv1,
SNMPv2, and SNMPv3. You can set up either SNMPv1/SNMPv2 or SNMPv3, or all of them for the Grid. You can also
override the Grid settings at a member level.
Note
If an SNMPv3 user is configured to send SNMP queries, you cannot delete the user.
3. Click Next to define extensible attributes. For information, see Using Extensible Attributes.
4. Save the configuration.
Note
You cannot schedule the deletion of an SNMPv3 user.
Note
Sometimes you may see high CPU usage on Network Insight discovery members. In most
cases, this high CPU usage is the result of CPU-intensive tasks run by the MySQL database
during the consolidation of customer data. Network Insight is not a real-time system, so high
CPU usage itself does not lead to loss of functionality. Therefore this alert should not be treated
as critical if no other negative symptoms are observed on discovery members.
• Database Objects: The percentage of database capacity that is currently in use. The default Trigger value
is 80%, and the default Reset value is 70%.
• Disk: The percentage of the primary hard disk that is currently in use. The default Trigger value is 85%,
and the default Reset value is 70%.
• File Distribution Usage: The percentage of the file distribution storage capacity that is currently in use on
the selected member. The default Trigger value is 90%, and the default Reset value is 70%.
• IPAM Utilization: For a network, this is the percentage based on the IP addresses in use divided by the
total addresses in the network and for a network container that contains subnets, this is the percentage of
the total address space defined within the container regardless of whether any of the IP addresses in the
subnets are in use. The default Trigger value is 95% and the default Reset value is 85%. The status icon
turns red when utilization crosses the configured trigger value. When utilization is below the trigger value,
the status color turns blue.
• Memory: The percentage of the system memory that is currently in use. The default Trigger value is 90%,
and the default Reset value is 80%.
• Network Capacity: When the Grid is part of a Master Grid, this is the percentage of the Master Grid's
network capacity that is used by the Grid's networks. The default Trigger value is 85% and default Reset
value is 75%.
• Recursive Clients: The percentage of the limit of concurrent recursive queries. The default Trigger value is
80%, and the default Reset value is 30%. You must also enable the recursive client limit in order for the
appliance to send recursive client traps. For information about how to set this limit, see Restricting
Recursive Client Queries. When you configure the Trigger and Reset values, ensure that you do not set
them too low or too close together. If the Trigger and Reset values are too close together, the appliance
may send excessive traps and email notifications because both trigger and reset traps are sent based on
the calculated value of simultaneous recursive client queries. For example, when you set the recursive
client limit at 50, Trigger value at 71%, and Reset value at 70%, the value for simultaneous recursive
client queries is calculated at 50 x .71 = 35 (integer math truncation) and 50 x .70 = 35. This could result
in the appliance sending trigger and reset traps for the same value of simultaneous recursive client
queries.
• Root File System: The percentage of the root file system ("/") that is currently in use. The default Trigger
value is 85%, and the default Reset value is 70%.
• Swap Usage: The percentage of the swap area that is currently in use. The factory default trigger value is
50% and the factory default reset value is 30%. Grid Manager displays zero for both the trigger and reset
values indicating the optimized usage of platform specific default values. For information about available
memory on each appliance model, see Overview of Available Memory for Infoblox Appliance
Models table.
• Reporting: The number of reports created on the system that can trigger an SNMP trap. The default
Trigger value is 85, and the default Reset value is 70. Note that the maximum number of reports
supported per Grid is 300. This field is displayed only when you have configured a reporting server.
• Reporting Volume: The percentage of data transmissions to the reporting server. The default Trigger value
is 80%, and the default Reset value is 71%. This field is displayed only when you have configured a
reporting server.
• Threat Protection Dropped Traffic: The percentage of packets dropped based on the threat protection rule
configuration. The default Trigger value is 90%, and the default Reset value is 70%. This field is displayed
only when Threat Protection licenses are installed on the appliance. When the percentage of Threat
Protection dropped traffic exceeds the Trigger value or drops below the Reset value, the appliance sends
Automated Traffic Sends notifications each time traffic capture is enabled 01:09:57.938095 IP (tos 0x0, ttl 60, id 37373, offset 0, flags
Capture or disabled or a support bundle is downloaded. For [DF], proto UDP (17), length 356)
more information, see Enabling Automated Traffic 10.34.172.4.54004 > 10.120.20.61.162: [udp sum ok]
Capture. { SNMPv2c { V2Trap(309) R=1114072091
.1.3.6.1.2.1.1.3.0=5985
.1.3.6.1.6.3.1.1.4.1.0=.1.3.6.1.4.1.7779.3.1.1.1.1.7
.1.3.6.1.4.1.7779.3.1.1.1.2.1.0="infoblox.localdomain"
.1.3.6.1.4.1.7779.3.1.1.1.2.2.0=2
.1.3.6.1.4.1.7779.3.1.1.1.2.5.0="Automated Traffic Capture"
.1.3.6.1.4.1.7779.3.1.1.1.2.4.0=4
.1.3.6.1.4.1.7779.3.1.1.1.2.11.0="Automated traffic capture
triggered by hitting Queries per second threshold:
threshold=100, current=0" } }
BGP Sends notifications when the BGP software has failed. 2012-11-22 04:49:06
For more information, see ibProbableCause Values eng-lab-883.inca.infoblox.com [UDP: [10.35.3.115]:38185-
(OID 3.1.1.1.2.4.0) >[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (45366)
0:07:33.66
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.2
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.3.115"
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibRevokedLicense(53)
IB-TRAP-MIB::ibTrapDesc.0 = STRING: An BGP routing
daemon failure has occurred.
BloxTools Sends notifications about the status of bloxTools. For 2011-09-13 20:38:46
more information, see Object State Change Traps.
10.34.42.4 [UDP: [10.34.42.4]:38187->[10.34.42.2]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(742156) 2:03:41.56
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
CPU Sends notifications about the status of CPU usage. For 2012-04-12 01:54:59
more information, see Threshold Crossing Traps. eng-lab-631.inca.infoblox.com [UDP: [10.35.2.119]:42546-
>[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(786308) 2:11:03.08
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.3
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.2.119"
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 5
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 3
CaptivePortal Sends notifications about the Captive Portal service. For 2016-01-08 02:58:23
more information, see ibPreviousState (OID
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0) 10.35.107.4 [UDP: [10.35.107.4]:45111->[10.120.20.21]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
Cisco ISE Sends notifications about the status of the Cisco ISE 2016-01-07 22:26:19
service. For more information, see Object State Change
Traps. 10.40.240.111 [UDP: [10.40.240.111]:47355->[10.120.20.21]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
Clear Sends notifications when the SNMP trap is cleared. 2015-11-12 22:46:21
When you select the checkbox, the CLEAR trap is sent
for the following software failures: LDAP servers, OCSP 10.35.124.1 [UDP: [10.35.124.1]:48446->[10.120.20.21]]:
responders, LCD, Serial Console, OSPF, OSPF6, BGP,
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (12793)
HSM, Controld, SSH, HTTP, Cluster, Login, and
0:02:07.93
Duplicate IP. For file distribution, the trap is sent when
the service is restored. If you deselect the checkbox, the SNMPv2-MIB::snmpTrapOID.0 = OID:
CLEAR trap is not sent when any of the mentioned
software fails. For more information, see Processing and IB-TRAP-MIB::ibProcessingFailureTrap
Software Failure Traps.
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.124.1"
Cloud API Sends notifications about whether the Cloud API service 2014-11-13 00:52:37
is functioning or not. for information about Cloud
Network Automation, see Introduction to Cloud Network 10.35.114.10 [UDP: [10.35.114.10]:57772->[10.120.20.21]]:
Automation. DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(480221) 1:20:02.21
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
Cluster Sends notifications about the status of NIOS clusterd 2011-12-10 09:43:23
process. For more information, see Processing and
Software Failure Traps. infoblox.localdomain [UDP: [10.35.2.70]:44193->[10.35.2.70]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibSubsystemName.0 = STRING:
Clusterd_Monitor
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibFDSoftwareFailure(32)
Controld Sends notifications about the NIOS controld process. 2012-08-17 05:29:30
For more information, see Processing and Software
Failure Traps. <UNKNOWN> [UDP: [10.32.2.80]:43475->[10.32.2.80]:162]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibControldSoftwareFailure(11)
DHCP Sends notifications about the status of DHCP service. 2016-04-18 02:42:36
For more information, see ibPreviousState (OID
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0). 10.35.139.15 [UDP: [10.35.139.15]:35531->[10.120.21.204]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
DNS Sends notifications about the status of DNS service. For 2016-01-08 01:10:53
more information, see ibPreviousState (OID
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0). 10.35.3.154 [UDP: [10.35.3.154]:59876->[10.120.20.12]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(324160) 0:54:01.60
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IB-TRAP-MIB::ibObjectName.0 = STRING:DNS
DNS Attack Sends notifications about the status of the DNS attacks. 2016-01-07 23:55:56
For more information, see ibPreviousState (OID
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0). 10.35.3.201 [UDP: [10.35.3.201]:33199->[10.120.21.204]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
DNS Forwarding Sends notifications about whether DNS 2017-11-03 14:06:19 192.168.1.3 [UDP: [192.168.1.3]:33577-
to BloxOne Threat forwarding to BloxOne Threat Defense Cloud is >[192.168.1.2]:162]: Trap, DISMAN-EVENT-
Defense Cloud functioning or not. For information about MIB::sysUpTimeInstance =
DNS forwarding to BloxOne Threat Defense Cloud, see Timeticks: (180166) 0:30:01.66, SNMPv2-MIB::snmpTrapOID.0
Forwarding Recursive Queries to BloxOne Threat = OID:
Defense Cloud. SNMPv2-SMI::enterprises.7779.3.1.1.1.1.4, SNMPv2-
SMI::enterprises.7779.3.1.1.1.2.1.0=STRING: "192.168.1.3",
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.2.0 =INTEGER: 2,
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.3.0 =STRING: "DNS",
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.9.0 =INTEGER: 32,
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.10.0= INTEGER: 133,
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.11.0= STRING: "The
appliance is still serving DNS even though forwarding DNS
queries to BloxOne Threat Defense Cloud is not functioning
properly.
DNS Integrity Sends notifications about whether DNS integrity check 2014-06-03 05:35:45
is functioning or not. For information about DNS integrity
Check check, see About DNS Integrity Check for Authoritative 10.34.82.121 [UDP: [10.34.82.121]:42577->[10.120.20.232]]:
Zones. DISMAN-EVENT-MIB::sysUpTimeInstance =
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 =INTEGER:
ibDNSIntegrityCheckNameserversFailed(102)
DNS Integrity Sends notifications about whether DNS integrity check 016-01-12 05:10:27
connection is functioning or not. For more information,
Check see ibPreviousState (OID 3.1.1.1.2.9.0) and 10.35.129.15 [UDP: [10.35.129.15]:35201->[10.120.20.12]]:
ibCurrentState (OID 3.1.1.1.2.10.0). DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
Connection (213856) 0:35:38.56
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IB-TRAP-MIB::ibNodeN ame.0 = STRING: "10.35.129.15"
Database Sends notifications about the database status. For more 2013-04-05 02:27:01
information, see Processing and Software Failure Traps.
10.35.116.2 [UDP: [10.35.116.2]:45332->[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(120021) 0:20:00.21
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibThresholdCrossingEvent
IB-TRAP-MIB::ibCurThresholdValue.0 = INTEGER: 1
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 85
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 0
Disconnected Grid Sends notifications about whether a Grid has been 2011-12-27 23:38:44
disconnected from the Master Grid. For more eng-lab-089.inca.infoblox.com [UDP: [10.35.0.89]:53010-
information, see Object State Change Traps. >[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (1049)
0:00:10.49
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.0.89"
Discovery Sends notifications about the discovery status. For 2013-10-22 01:35:53
information about the Discovery feature, see Infoblox eng-lab-302.inca.infoblox.com [UDP: [10.35.1.46]:57126-
Network Insight. >[10.120.20.102]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(122717) 0:20:27.17
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.1.46"
Discovery Conflict Sends notifications about conflicts between the DHCP 2014-06-20 00:48:06
address and the existing IP address. For more
information, see Processing and Software Failure Traps. 10.34.125.2 [UDP: [10.34.125.2]:36159->[10.120.20.232]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibDHCPHostConflict(66)
Discovery Sends notifications related to the discovery of 2015-02-09 22:53:57 10.35.103.18 [UDP:
Unmanaged unmanaged devices and networks. You can configure [10.35.103.18]:45156->[10.120.20.46]]:
the maximum number of unmanaged objects the
appliance discovers and how often it notifies about DISMAN-EVENT-MIB::sysUpTimeInstance =Timeticks: (46090)
these events. For more information about how to 0:07:40.90
configure these parameters, see Defining Seed Routers
SNMPv2-MIB::snmpTrapOID.0 = OID:
for Probe Members.
IB-TRAP-MIB::ibOperationTrap
Disk Sends notifications about the status of the primary disk. 2012-11-22 03:34:32
For more information, see Threshold Crossing Traps. eng-lab-883.inca.infoblox.com [UDP: [10.35.3.115]:37542-
>[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (87141)
0:14:31.41
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.3
IB-TRAP-MIB::ibNodeName.0 = STRING:"10.35.3.115"
IB-TRAP-MIB::ibTrapSeverity.0 = INTEGER: minor(3)
IB-TRAP-MIB::ibThresholdHigh.0 =INTEGER: 10
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 5
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(7239201) 20:06:32.01
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibDuplicateIPAddressFailure(52)
ENAT Sends notifications about the Ethernet port status. For 2012-08-27 03:05:25
more information, see ibPreviousState (OID
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0). 10.36.3.132 [UDP: [10.36.3.132]:47962->[10.120.20.232]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
File Distribution Sends notifications about the HTTP file distribution 2016-01-08 01:48:57
Usage process. For more information, see Processing and
Software Failure Traps. 10.40.240.113 [UDP: [10.40.240.113]:41443->[10.120.20.21]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(183757) 0:30:37.57
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibFDSoftwareFailure(42)
FTP Sends notifications about the status of FTP service. For 2016-01-07 23:27:22
more information, see Processing and Software Failure
Traps. 10.40.240.113 [UDP: [10.40.240.113]:36063->[10.120.20.21]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(380473) 1:03:24.73
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibSubsystemName.0 = STRING:
Fan Sends notifications about the status of the system fan. 2012-02-23 23:34:50
For more information, see lEquipment Failure Traps.
10.32.1.222 [UDP: [10.32.1.222]:42742->[10.35.109.24]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibEquipmentFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibFan1Failure(37)
HA Sends notifications about the status of the HA port link. 2014-05-23 00:49:32
For more information, see ibPreviousState (OID eng-lab-589.inca.infoblox.com [UDP: [10.35.2.77]:46426-
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0). >[10.36.0.200]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (3912)
0:00:39.12
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.20.70"
HSM Sends notifications about the status of the HSM 2016-01-12 20:52:12
operation. For more information, see ibPreviousState
(OID 3.1.1.1.2.9.0) and ibCurrentState (OID 10.39.13.77 [UDP: [10.39.13.77]:44962->[10.120.20.21]]:
3.1.1.1.2.10.0). DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(131909) 0:21:59.09
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IB-TRAP-MIB::ibCurrentState.0 = INTEGER: 55
HTTP Sends notifications about the status of the HTTP 2016-01-07 23:16:40
service. For more information, see ibPreviousState (OID
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0). 10.40.240.113 [UDP: [10.40.240.113]:36063->[10.120.20.21]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(316247) 0:52:42.47
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IFMAP Sends notifications about the status of the IF-MAP 2016-04-20 23:40:00
service. For more information, see ibProbableCause
Values (OID 3.1.1.1.2.4.0). 10.34.41.60 [UDP: [10.34.41.60]:33231->[10.120.21.204]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibIFMAPSoftwareFailure(50)
IPMI Device Sends notifications about the status of the IPMI device. 2015-03-24 04:10:21
For more information, see ibProbableCause Values eng-lab-598.inca.infoblox.com [UDP: [10.35.2.86]:56092-
(OID 3.1.1.1.2.4.0). >[10.120.20.21]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(103490) 0:17:14.90
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibOperationTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.2.86"
IPAM Utilization Sends notifications about the percentage of IPv4 2014-07-06 19:33:01
addresses that are used in a network. For a network eng-lab-514.inca.infoblox.com [UDP: [10.35.2.2]:33413-
container that contains subnets, this indicates the >[10.120.20.21]]:
percentage of the total address space defined within the DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
container regardless of whether any of the IP addresses (1038846) 2:53:08.46
are used in the subnetwork. For more information, see SNMPv2-MIB::snmpTrapOID.0 = OID:
Threshold Crossing Traps. IB-TRAP-MIB::ibThresholdCrossingEvent
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.2.2"
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 5
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 3
Load Balancer Device Sends notifications about whether the LB device is in 2013-07-08 02:36:39
sync or not. For more information, see ibPreviousState
(OID 3.1.1.1.2.9.0) and ibCurrentState (OID 10.35.113.2 [UDP: [10.35.113.2]:45568->[10.120.20.21]]:
3.1.1.1.2.10.0). DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(996274) 2:46:02.74
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
LCD Sends notifications about the status of the LCD process. 2011-12-01 06:31:28
For more information, see Processing and Software ib-10-35-3-125.infoblox.com [UDP: [10.35.3.125]:56609-
Failure Traps. >[10.35.3.125]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(187334) 0:31:13.34
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.3.125"
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibLCDSoftwareFailure(18)
IB-TRAP-MIB::ibTrapDesc.0 = STRING: An LCD failure has
occurred.
LDAP Servers Sends notifications about whether LDAP servers are 2012-12-17 03:33:58
available or not. For more information, see
ibPreviousState (OID 3.1.1.1.2.9.0) and ibCurrentState 10.35.106.6 [UDP: [10.35.106.6]:35751->[10.120.20.249]]:
(OID 3.1.1.1.2.10.0). DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (4043)
0:00:40.43
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
License Sends notifications when the license has been revoked. 2014-05-23 00:49:32
For more information, see Revoked License Trap. eng-lab-589.inca.infoblox.com [UDP: [10.35.2.77]:46426-
>[10.36.0.200]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (3912)
0:00:39.12
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.6.0
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.34.196.165"
IB-TRAP-MIB::ibSubsystemName.0 = STRING: vnios
Login Sends notifications when the login details are incorrect. 2013-04-30 02:56:49
For more information, see Processing and Software
Failure Traps. 10.34.132.2 [UDP: [10.34.132.2]:35453->[10.120.20.160]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibGUILoginFailure(58)
MGM Sends notifications about the status of the multi-Grid 2013-04-03 23:48:34
configuration. For more information, see ibPreviousState eng-lab-482.inca.infoblox.com [UDP: [10.35.1.226]:37893-
(OID 3.1.1.1.2.9.0) and ibCurrentState (OID >[10.120.20.160]]:
3.1.1.1.2.10.0). DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (24697)
0:04:06.97
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.4
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.116.2"
IB-TRAP-MIB::ibPreviousState.0 = INTEGER: 23
IB-TRAP-MIB::ibCurrentState.0 = INTEGER: 24
MSServer Sends notifications about the status of Microsoft Servers 2013-07-10 03:29:42
for Microsoft management. For more information, see
ibPreviousState (OID 3.1.1.1.2.9.0) and ibCurrentState 10.35.113.2 [UDP: [10.35.113.2]:51679->[10.120.20.21]]:
(OID 3.1.1.1.2.10.0). DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(1066392) 2:57:43.92
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
Memory Sends notifications about the status of the system 2012-04-17 03:09:46
memory. For more information, see Threshold Crossing
Traps. 10.35.119.4 [UDP: [10.35.119.4]:37664->[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(359835) 0:59:58.35
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.3
IB-TRAP-MIB::ibCurThresholdValue.0 = INTEGER: 46
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 50
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 30
NTP Sends notifications about the status of the NTP service. 2013-04-02 23:58:19
For more information, see ibPreviousState (OID
3.1.1.1.2.9.0) and ibCurrentState (OID 3.1.1.1.2.10.0) 10.35.116.6 [UDP: [10.35.116.6]:37505->[10.120.20.160]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
Network Sends notifications about the status of the LAN port. For 2013-01-06 23:52:01
more information, see Threshold Crossing Traps.
10.35.3.62 [UDP: [10.35.3.62]:49255->[10.120.20.160]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.3
IB-TRAP-MIB::ibCurThresholdValue.0 = INTEGER: 8
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 5
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 3
OCSP Responders Sends notifications about the status of OCSP 2016-01-14 03:21:14
responders. For more information, see ibPreviousState
(OID 3.1.1.1.2.9.0) and ibCurrentState (OID 10.34.9.91 [UDP: [10.34.9.91]:34663->[10.120.21.204]]:
3.1.1.1.2.10.0). DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (4599)
0:00:45.99
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
OSPF Sends notifications about the ospfd process. For more 2012-11-22 04:49:56
information, see Processing and Software Failure Traps. eng-lab-883.inca.infoblox.com [UDP: [10.35.3.115]:38185-
>[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (50414)
0:08:24.14
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibTrapOneModule.2
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.3.115"
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibOSPFSoftwareFailure(35)
IB-TRAP-MIB::ibTrapDesc.0 = STRING: An OSPF routing
daemon failure has occurred.
OSPF6 Sends notifications about the ospf process for IPv6. For 2016-01-13 02:03:07
more information, see ibProbableCause Values (OID eng-lab-396.inca.infoblox.com [UDP: [10.35.1.140]:45733-
3.1.1.1.2.4.0). >[10.120.20.21]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (3970)
0:00:39.70
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.1.140"
PowerSupply Sends notifications about the status of the power supply. 2012-01-20 22:45:01 nextgen.com [UDP:
For more information, see lEquipment Failure Traps. [10.32.111.110]:45323->[10.32.111.110]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (21044)
0:03:30.44
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibEquipmentFailureTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.32.111.110"
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibSystemRestart(61)
IB-TRAP-MIB::ibTrapDesc.0 = STRING: Power supply 2 is OK.
RAID Sends notifications about the RAID array status. For 2016-01-15 14:30:20
more information, see lEquipment Failure Traps. eng-lab-418.inca.infoblox.com [UDP: [10.35.1.162]:57616-
>[10.120.21.204]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (8737)
0:01:27.37
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibEquipmentFailureTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.1.162"
Recursive Clients Sends notifications about whether the DNS recursive 2015-01-13 02:05:55
server is under flood attacks. For more information, see eng-lab-078.inca.infoblox.com [UDP: [10.35.0.78]:55233-
Threshold Crossing Traps. >[10.120.20.21]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(168817) 0:28:08.17
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibThresholdCrossingEvent
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.0.78"
RIR SWIP Sends notifications about the status of the RIR SWIP 2016-01-11 02:05:17
registration. For more information, see ibProbableCause
Values (OID 3.1.1.1.2.4.0). 10.34.11.100 [UDP: [10.34.11.100]:52957->[10.120.21.204]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibRIRSWIPRegistrationFailure(89)
Reporting Sends notifications about the status of the reporting 2012-01-06 08:59:55 10.35.101.27 [UDP:
database. For more information, see Threshold [10.35.101.27]:59714->[10.35.117.24]]:DISMA
Crossing Traps.
N-EVENT-MIB::sysUpTimeInstance = Timeticks: (289200)
0:48:12.00
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibThresholdCrossingEvent
IB-TRAP-MIB::ibCurThresholdValue.0 = INTEGER: 85
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 80
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 71
RPZ Hit Rate Send Notifications about the percentage of RPZ Hit 2016-04-18 02:52:29
Rate. For more information, see Threshold Crossing
Traps. 10.35.139.15 [UDP: [10.35.139.15]:35531->[10.120.21.204]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibThresholdCrossingEvent
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 1
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 0
RootFS Sends notifications about the status of the root file 2011-11-29 06:36:24
system. For more information, see Threshold Crossing ib-10-35-1-144.infoblox.com [UDP: [10.35.1.144]:59707-
Traps. >[10.35.1.144]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(197388) 0:32:53.88
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibThresholdCrossingEvent
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.1.144"
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 90
SNMP Sends notifications about the status of the SNMP server. 2012-02-17 06:24:11
For more information, see Processing and Software eng-lab-630.inca.infoblox.com [UDP: [10.35.2.118]:57802-
Failure Traps. >[10.120.20.174]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(855217) 2:22:32.17
SNMPv2-MIB::snmpTrapOID.0 = OID:
SNMPv2-SMI::enterprises.7779.3.1.1.1.1.2
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.1.0 = STRING:
"10.35.2.118"
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.2.0 = INTEGER: 4
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.5.0 = STRING:
"snmp"
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.4.0 = INTEGER: 13
SNMPv2-SMI::enterprises.7779.3.1.1.1.2.11.0 = STRING:
"SNMP Server failure has occurred."
SSH Sends notifications about the status of the sshd process. 2011-09-21 21:33:17
For more information, see Processing and Software
Failure Traps. 10.34.42.6 [UDP: [10.34.42.6]:49776->[10.34.42.2]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
SerialConsole Sends notifications when the serial console login has 2014-12-15 02:47:59
failed or the admin failed to login to the serial console.
For more information, see Processing and Software UDP/IPv6: 2620:10a:6000:2400::8104]:55038 [UDP/IPv6:
Failure Traps. [2620:10a:6000:2400::8104]:55038]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(501585) 1:23:35.85
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibNodeName.0 = STRING:
"2620:10a:6000:2400::8104"
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibSerialConsoleLoginFailure(59)
Swap Usage Sends notifications about whether the swap usage has 2013-11-25 05:35:56 10.35.129.1 [UDP: [10.35.129.1]:49489-
exceeded the trigger or reset value. For more >[10.120.20.21]]:
information, see Defining Thresholds for Traps.
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (24009)
0:04:00.09
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibThresholdCrossingEvent
IB-TRAP-MIB::ibThresholdHigh.0 = INTEGER: 5
IB-TRAP-MIB::ibThresholdLow.0 = INTEGER: 2
Syslog Sends notifications when the syslog process stops. For 2016-01-14 01:29:42
more information, see Processing and Software Failure
Traps. 10.34.142.105 [UDP: [10.34.142.105]:37566->[10.120.21.204]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(296285) 0:49:22.85
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibSubsystemName.0 = STRING:
check_syslog_conf
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibSyslogFailure(67)
System Sends notifications about the status of the NIOS system. 2014-03-14 05:54:42
For more information, see Process Started and Stopped eng-lab-636.inca.infoblox.com [UDP: [10.35.2.124]:33232-
Traps. >[10.36.0.200]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks:
(2654067) 7:22:20.67
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.120.17"
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibSystemRestart(61)
IB-TRAP-MIB::ibTrapDesc.0 = STRING: The system is being
restarted.
TAXII Sends notifications when you start and stop the TAXII 2016-01-06 20:16:13
service. For more information, see Object State Change eng-lab-242.inca.infoblox.com [UDP: [10.35.0.242]:42213-
Traps. >[10.120.20.21]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (17553)
0:02:55.53
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.0.242"
IB-TRAP-MIB::ibTrapSeverity.0 = INTEGER: info(2)
IB-TRAP-MIB::ibObjectName.0 = STRING: taxii
IB-TRAP-MIB::ibPreviousState.0 = INTEGER: 122
IB-TRAP-MIB::ibCurrentState.0 = INTEGER: 119
IB-TRAP-MIB::ibTrapDesc.0 = STRING: TAXII Service is
working.
TFTP Sends notifications about the status of the TFTP service. 2011-09-16 06:54:08
For more information, see Processing and Software eng-lab-443.inca.infoblox.com [UDP: [10.35.1.187]:35794-
Failure Traps. >[10.120.20.160]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (50382)
0:08:23.82
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibProcessingFailureTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.1.187"
IB-TRAP-MIB::ibProbableCause.0 = INTEGER:
ibTFTPDSoftwareFailure(27)
IB-TRAP-MIB::ibTrapDesc.0 = STRING: A TFTPD daemon
failure has occurred.
Threat Analytics Sends notifications about the status of the Threat 2016-01-08 00:19:34
Analytics service. For more information, see
ibProbableCause Values (OID 3.1.1.1.2.4.0). 10.35.3.154 [UDP: [10.35.3.154]:59876->[10.120.20.12]]:
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
Threat Analytics DNS Sends notifications about the DNS tunneling detection. 2016-01-08 00:22:07
Tunneling For more information, see ibProbableCause Values
(OID 3.1.1.1.2.4.0). 10.35.3.154 [UDP: [10.35.3.154]:59876->[10.120.20.12]]:
DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (31567)
0:05:15.67
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibOperationTrap
IB-TRAP-MIB::ibNodeName.0 = STRING: "10.35.3.154"
Threat Protection Sends notifications about whether the threat protection 2016-04-18 22:48:08
service for Infoblox DNS Protection is functioning
properly. For more information, see ibPreviousState 10.35.139.15 [UDP: [10.35.139.15]:54407->[10.120.21.204]]:
(OID 3.1.1.1.2.9.0) and ibCurrentState (OID DISMAN-EVENT-MIB::sysUpTimeInstance = Timeticks: (3926)
3.1.1.1.2.10.0) 0:00:39.26
SNMPv2-MIB::snmpTrapOID.0 = OID:
IB-TRAP-MIB::ibStateChangeEvent
MIB Hierarchy
OBJECT-TYPE sysObjectID
MAX-ACCESS read-only
STATUS current
DESCRIPTION "The vendor's authoritative identification of the network management subsystem contained in the entity.
This value is allocated within the SMI enterprises subtree (1.3.6.1.4.1) and provides an easy and
unambiguous means for determining `what kind of box' is being managed. For example, if vendor
`Flintstones,Inc.' was assigned the subtree 1.3.6.1.4.1.424242, it could assign the identifier
1.3.6.1.4.1.424242.1.1 to its `Fred Router'."
The below table lists the enterprise IDs and their corresponding Infoblox hardware platforms that an SNMP query can
return when you request the sysObjectID value. Note that the IDs shown in the table do not include 1.3.6.1.4.1.7779.1.
(the infobloxProducts prefix).
ID Description Definition
Infoblox MIBs
You can configure a NIOS appliance as an SNMP-managed device so that an SNMP management station can send
queries to the appliance and retrieve information from its MIBs. Perform the following tasks to access the Infoblox MIBs:
1. Configure a NIOS appliance to accept queries, as described in Configuring SNMPv3 Users.
2. Load the MIB files onto the management system. To obtain the latest Infoblox MIB files:
a. From the Data Management tab, select the Grid tab -> Grid Manager tab, and then select Download ->
SNMP MIBs from the Toolbar.
b. In the Save As dialog box, navigate to a directory to which you want to save the MIBs.
c. Click Save.
3. Use a MIB browser or SNMP management application to query the objects in each MIB.
The NIOS appliance allows read-only access to the MIBs. This is equivalent to the Get and Get Next operations in
SNMP.
NET-SNMP MIBs
NIOS appliances support NET-SNMP (formerly UCD-SNMP), a collection of applications used to implement the SNMP
protocol. The NET-SNMP MIBs provide the top-level infrastructure for the SNMP MIB tree. They define, among other
things, the objects in the SNMP traps that the agent sends when the SNMP engine starts and stops. For information
about NET-SNMP and the MIB files distributed with NET-SNMP, refer to http://net-snmp.sourceforge.net/.
For SNMP traps to function properly, you must download the following NET-SNMP MIBs directly from http://net-
snmp.sourceforge.net/docs/mibs
Note
Ensure that you save the MIBs as text files in the directory to which you save all the other MIB files.
BGP4 MIB
Infoblox supports BGP4 (Border Gateway Protocol) for DNS anycast addressing. BGP is configured to send SNMP traps
to neighboring routers, as defined in RFC4273DefinitionsofManagedObjectsforBGP-4. You must enable and configure
the SNMP trap receiver on the Grid member for the member to send SNMP traps.
The BGP protocol service is configured to send SNMP queries about BGP runtime data. The information is returned
using the following OIDs and definitions:
OID Definition
For each configured BGP peer (a, b, c, d), the information is returned using the following OIDs and definitions:
OID Definition
1.3.6.1.2.1.15.900.1.9.a.b.c.d.3 ASN
1.3.6.1.2.1.15.900.1.9.a.b.c.d.4 Prefixes
ibTrap MIB
NIOS appliances send SNMP traps when events, internal process failures, or critical service failures occur. The ibTrap
MIB defines the types of traps that a NIOS appliance sends and the value that each MIB object represents. The Infoblox
SNMP traps report objects which the ibTrap MIB defines. The below figure illustrates the ibTrap MIB structure. It provides
the OID and textual description for each object.
Note
OIDs shown in the illustrations and tables in this section do not include the prefix .1.3.6.1.4.1.7779.
The ibTrap MIB comprises two trees, ibTrapOneModule and ibNotificationVarBind. The ibTraponeModule tree contains
objects for the types of traps that a NIOS appliance sends. The ibNotificationVarBind tree contains objects that the
Infoblox SNMP traps report. You cannot send queries for the objects in this MIB module. The objects are used only in the
SNMP traps.
SNMPv2-SMI::enterprises.
synchronization."
The sample trap lists the OIDs and their corresponding values that can help you identify the cause of an event or
problem. To identify the possible cause and recommended actions for the trap, use the ibTrapDesc tables.
You can interpret the sample trap as follows:
Using the ibTrapOneModule table, you find out OID 7779.3.1.1.1.1.4.0 represents an Object State Change trap. This trap
includes the following objects: ibNodeName, ibOjectName, ibPreviousState, ibCurrentState, and ibtrapDesc. For each
object, the trap displays the OID and its corresponding value. The following is how you can interpret the rest of the trap:
• ibNodeName (OID 7779.3.1.1.1.2.1.0)
• Using the ibNotificationVarBind (OID 3.1.1.1.2) table, you find out OID 7779.3.1.1.1.2.1.0 represents the
MIB object ibNodeName, which is the IP address of the appliance on which the trap occurred. Therefore,
the statement "7779.3.1.1.1.2.1.0 = STRING: "10.35.1.156" SNMPv2-SMI::enterprises." tells
you the IP address of the appliance on which the trap occurred.
• ibObjectName (OID 7779.3.1.1.1.2.3.0)
• The statement "7779.3.1.1.1.2.3.0 = STRING: "ntp_sync" SNMPv2-SMI::enterprises." tells you
the MIB object ibOjectName, which is the name of the object for which the trap was generated, has a
value of "ntp_sync" that indicates NTP synchronization issues.
• ibPreviousState (OID 7779.3.1.1.1.2.9.0)
• The statement "7779.3.1.1.1.2.9.0 = INTEGER: 15 SNMPv2-SMI::enterprises." tells you the MIB
object ibPreviousState, which indicates the previous state of the appliance, has a value of 15. Using the
ibPreviousState and ibCurrentState Values table, you know that 15 represents "ntp-sync-up", which
means the NTP server was up and running.
• ibCurrentState (OID 7779.3.1.1.1.2.10.0)
• The statement "7779.3.1.1.1.2.10.0 = INTEGER: 16 SNMPv2-SMI::enterprises." tells you the MIB
object ibCurrentState, which indicates the current state of the appliance, has a value of 16. Using the
ibPreviousState and ibCurrentState Values table, you know that 16 represents "ntp-sync-down", which
means the NTP server is now out of sync.
• ibTrapDesc (OID 7779.3.1.1.1.2.11.0)
• The last statement "7779.3.1.1.1.2.11.0 = STRING: "The NTP service is out of
synchronization." states the description of the trap. Using the Object State Change Traps table for
ibTrapDesc, you can find out the trap description and recommended actions for this problem.
Note
Some SNMP traps for ibThresholdCrossingEvent, ibStateChangeEvent, ibProcStartStopTrap, and
ibRevokedLicenseTrap do not have an associated ibProbableCause. The following table lists traps that provide
ibProbableCause and those that do not have an ibProbableCause value.
ibTrapOneModule
Trap Binding Variables (OID 3.1.1.1.2)
3.1.1.1.1.1 Equipment Failure ibEquipmentFailureTrap The NIOS appliance generates this trap when a
hardware failure occurs. This trap includes the
following objects:
• ibNodeName
• ibTrapSevertiy
• ibObjectName (equipment name)
• ibProbableCause
• ibTrapDesc
3.1.1.1.1.2 Processing and Software Failure ibProcessingFailureTrap The NIOS appliance generates this trap when a
failure occurs in one of the software processes.
This trap includes the following objects:
• ibNodeName
• ibTrapSeverity
• ibSubsystemName
• ibProbableCause
• ibTrapDesc
3.1.1.1.1.3 Threshold Crossing ibThresholdCrossingEvent The NIOS appliance generates this trap when any
of the following events occur:
3.1.1.1.1.4 Object State Change ibStateChangeEvent The NIOS appliance generates this trap when
there is a change in its state, such as:
3.1.1.1.1.5 Process Started and Stopped ibProcStartStopTrap The NIOS appliance generates this type of trap
when any of the following events occur:
• ibNodeName
• ibTrapSeverity
• ibSubsystemName
• ibTrapDesc