To install a standalone NFM-P system

Description

The following steps describe how to install a collocated or distributed main database and main server in a standalone configuration. The steps also include information about installing optional NFM-P components.

Ensure that you record the information that you specify, for example, directory names, passwords, and IP addresses.

Note: You require root user privileges on the main database and main server stations.

Note: Performing the procedure creates the following user accounts:

Note: The following RHEL CLI prompts in command lines denote the active user, and are not to be included in typed commands:

Steps
Check and configure firewalls
 

Before you attempt to deploy an NFM-P system, you must ensure that each firewall between NFM-P components allows the required traffic to pass between the components, or is disabled. You can configure and enable the firewall after the installation, if required.

Note: The RHEL firewalld service is typically enabled by default in a new RHEL OS installation.

Perform one of the following.

  1. Configure each firewall to allow the required traffic to pass. See the NSP Planning Guide for a list of the ports that must be open on each component.

    Note: The RHEL firewalld service must be configured using the firewalld rules in the NSP Planning Guide, which describes using NFM-P templates for rule creation.

  2. Disable each firewall; see the external firewall documentation, or perform To disable the RHEL firewalld service.


Download installation files
 

Download the following installation files to an empty directory on the main server station:

  • nsp-nfmp-jre-R.r.p-rel.v.rpm

  • nsp-nfmp-config-R.r.p-rel.v.rpm

  • nsp-nfmp-nspos-R.r.p-rel.v.rpm

  • nsp-nfmp-main-server-R.r.p-rel.v.rpm

  • nsp-nfmp-nodeexporter-R.r.p-rel.v.rpm

where

R.r.p is the NSP release identifier, in the form MAJOR.minor.patch

v is a version identifier

Note: In subsequent steps, the directory is called the NFM-P software directory.


Perform one of the following.

  1. For a collocated NFM-P deployment, download the following files to the NFM-P software directory on the station that hosts the main server and database:

    • nsp-nfmp-oracle-R.r.p-rel.v.rpm

    • nsp-nfmp-main-db-R.r.p-rel.v.rpm

  2. For a distributed NFM-P deployment, download the following files to an empty directory on the main database station:

    • nsp-nfmp-jre-R.r.p-rel.v.rpm

    • nsp-nfmp-config-R.r.p-rel.v.rpm

    • nsp-nfmp-oracle-R.r.p-rel.v.rpm

    • nsp-nfmp-main-db-R.r.p-rel.v.rpm

    • nsp-nfmp-nodeexporter-R.r.p-rel.v.rpm

    Note: In subsequent steps, the directory is called the NFM-P software directory.


Transfer the following downloaded file to an empty directory on the main database station:

  • OracleSw_PreInstall.sh


Install standalone database
 

Log in as the root user on the main database station.


Open a console window.


Navigate to the directory that contains the OracleSw_PreInstall.sh file.


Enter the following:

chmod +x OracleSw_PreInstall.sh ↵


Enter the following:

./OracleSw_PreInstall.sh ↵

Note: A default value is displayed in brackets []. To accept the default, press ↵.

Note: If you specify a value other than the default, you must record the value for use when the OracleSw_PreInstall.sh script is run during a software upgrade, or when the Oracle management user information is required by technical support.

The following prompt is displayed:

This script will prepare the system for a new install/restore of an NFM-P Version Release main database.

Do you want to continue? [Yes/No]:


10 

Enter Yes. The following prompt is displayed:

Enter the Oracle dba group name [group]:


11 

Enter a group name.

Note: To reduce the complexity of subsequent software upgrades and technical support activities, it is recommended that you accept the default.

The following messages and prompt are displayed:

Creating group group if it does not exist...

done

Enter the Oracle user name:


12 

Enter a username.

Note: To reduce the complexity of subsequent software upgrades and technical support activities, it is recommended that you accept the default.

The following messages and prompt are displayed:

Oracle user [username] new home directory will be [/opt/nsp/nfmp/oracle19].

Checking or Creating the Oracle user home directory /opt/nsp/nfmp/oracle19...

Checking user username...

Adding username...

Changing ownership of the directory /opt/nsp/nfmp/oracle19 to username:group.

About to unlock the UNIX user [username]

Unlocking password for user username.

passwd: Success

Unlocking the UNIX user [username] completed

Please assign a password to the UNIX user username ..

New Password:


13 

Enter a password. The following prompt is displayed:

Re-enter new Password:


14 

Re-enter the password. The following is displayed if the password change is successful:

passwd: password successfully changed for username

The following message and prompt are displayed:

Specify whether an NFM-P Main Server will be installed on this workstation.

The database memory requirements will be adjusted to account for the additional load.

Will the database co-exist with an NFM-P Main Server on this workstation [Yes/No]:


15 

Enter Yes or No, as required.

Messages like the following are displayed as the script execution completes:

INFO: About to set kernel parameters in /etc/sysctl.conf...

INFO: Completed setting kernel parameters in /etc/sysctl.conf...

INFO: About to change the current values of the kernel parameters

INFO: Completed changing the current values of the kernel parameters

INFO: About to set ulimit parameters in /etc/security/limits.conf...

INFO: Completed setting ulimit parameters in /etc/security/limits.conf...

INFO: Completed running Oracle Pre-Install Tasks


16 

When the script execution is complete, enter the following to reboot the main database station:

systemctl reboot ↵

The station reboots.


17 

When the reboot is complete, log in as the root user on the main database station.


18 

Open a console window.


19 

Navigate to the NFM-P software directory.

Note: Ensure that the directory contains only the installation files.


20 

Enter the following:

chmod +x * ↵


21 

Enter the following:

dnf install *.rpm ↵

The dnf utility resolves any package dependencies, and displays the following prompt:

Total size: nn G

Installed size: nn G 

Is this ok [y/d/N]: 


22 

Enter y. The following and the installation status are displayed as each package is installed:

Downloading Packages:

Running transaction check

Transaction check succeeded.

Running transaction test

Transaction test succeeded.

Running transaction check

The package installation is complete when the following is displayed:

Complete!


23 

Enter the following:

samconfig -m db ↵

The following is displayed:

Start processing command line inputs...

<db>


24 

Enter the following:

<db> show-detail ↵

The database configuration is displayed.


25 

To configure one or more parameters, enter the following; otherwise, go to Step 31:

<db> configure ↵

The prompt changes to <db configure>.


26 

As required, configure the general parameters in the following table.

Note: The instance parameter is configurable only during database creation.

Table 14-4: Standalone database parameters, general

Parameter

Description

ip

Database IP address

Default: IP address of primary network interface

instance

Database instance name, which must:

  • contain 8 or fewer characters

  • consist of ASCII characters only

  • have a letter as the first character

Default: maindb1


27 

If required, configure one or more passwords parameters in the following table, and then enter back ↵.

Note: After you save the configuration, you cannot use samconfig to change a database password; you must use the method described in the NSP System Administrator Guide.

Table 14-5: Standalone database parameters —
passwords

Parameter

Description

user

Database user password

Default: available from technical support

sys

Oracle SYS user password

Default: available from technical support

A password must:

  • be between 4 and 30 characters long

  • contain at least three of the following:

    • lower-case alphabetic character

    • upper-case alphabetic character

    • numeric character

    • special character, which is one of the following: # $ _

  • not contain four or more of the same character type in sequence

  • not be the same as the user name, or the reverse of the user name

  • not contain a space character


28 

To enable IP validation, which restricts the server components that have access to the main database; configure the parameters in the following table, and then enter back ↵.

Note: For security reasons, it is strongly recommended that you enable IP validation.

Note: When you enable IP validation on an NFM-P system that includes auxiliary servers, NSP Flow Collectors, or NSP analytics servers, you must configure the remote-servers parameter; otherwise, the servers cannot reach the database.

Table 14-6: Standalone database parameters —
ip-validation

Parameter

Description

main-one

IP address of main server

Configuring the parameter enables IP validation.

Default: —

remote-servers

Comma-separated list of the IP address of each of the following components that must connect to the database:

  • auxiliary servers

  • NSP Flow Collectors

  • NSP analytics servers

Default: —


29 

To enable the forwarding of NFM-P system metrics to the NSP; configure the parameters in the following table, and then enter back ↵.

Note: The parameters are required only for a distributed main database, so are not shown or configurable if the main server and database are collocated.

Table 14-7: Standalone main server parameters —
tls

Parameter

Description

keystore-pass

The TLS keystore password

Default: available from technical support

pki-server

The PKI server IP address or hostname

You must configure the parameter.

Default: —

pki-server-port

The TCP port on which the PKI server listens for and services requests

Default: 2391


30 

Verify the database configuration.

  1. Enter the following:

    <db configure> show-detail ↵

    The database configuration is displayed.

  2. Review each parameter to ensure that the value is correct.

  3. Configure one or more parameters, if required; see NFM-P samconfig utility for information about using the samconfig utility.

  4. When you are certain that the configuration is correct, enter the following:

    <db configure> back ↵

    The prompt changes to <db>.


31 

Enter the following to begin the database creation:

<db> apply ↵

The database creation begins, and progress messages are displayed.

The following is displayed when the database creation is complete:

DONE

db configurations updated.


32 

When the database creation is complete, enter the following:

<db> exit ↵

The samconfig utility closes.


33 

It is recommended that as a security measure, you limit the number of database user login failures that the NFM-P allows before the database user account is locked; see the NFM-P database management procedures in the NSP System Administrator Guide for more information.


Install standalone main server
 
34 

Log in as the root user on the main server station.


35 

Open a console window.


36 

Navigate to the NFM-P software directory.

Note: Ensure that the directory contains only the installation files.


37 

Enter the following:

chmod +x * ↵


38 

Enter the following:

dnf install *.rpm ↵

The dnf utility resolves any package dependencies, and displays the following prompt:

Total size: nn G

Installed size: nn G 

Is this ok [y/d/N]: 


39 

Enter y. The following and the installation status are displayed as each package is installed:

Downloading Packages:

Running transaction check

Transaction check succeeded.

Running transaction test

Transaction test succeeded.

Running transaction check

The package installation is complete when the following is displayed:

Complete!


40 

The initial NFM-P server installation on a station creates the nsp user account and assigns a randomly generated password.

If this is the first installation of an NFM-P main or auxiliary server on the station, change the nsp password.

  1. Enter the following:

    passwd nsp ↵

    The following prompt is displayed:

    New Password:

  2. Enter a password.

    The following prompt is displayed:

    Confirm Password:

  3. Re-enter the password.

  4. Record the password and store it in a secure location.


41 

Start the PKI server, regardless of whether you are using the automated or manual TLS configuration method; perform To configure and enable a PKI server.

Note: The PKI server is required for internal system configuration purposes.


42 

If you are using the manual TLS deployment method, generate and distribute the required TLS files for the system, as described in To generate custom TLS certificate files for the NSP.


43 

Enter the following:

samconfig -m main ↵

The following is displayed:

Start processing command line inputs...

<main> 


44 

Enter the following:

<main> configure ↵

The prompt changes to <main configure>.


45 

Enter the following:

<main configure> show-detail ↵

The main server configuration is displayed.


46 

As required, configure the general parameters in the following table.

Table 14-8: Standalone main server parameters, general

Parameter

Description

ip

The main server IP address

Default: IP address of primary network interface

domain

The NFM-P system identifier

Default: NFM-P

initial-admin-passwd

The NSP admin user password

It is strongly recommended that you change the password from the default; if you choose not to configure the parameter, the default password remains in effect

The parameter is configurable only during a main server installation.

A password must:

  • be a minimum of 8 characters

  • contain at least three of the following:

    • lower-case alphabetic character

    • upper-case alphabetic character

    • numeric character

    • special character, which is one of the following: ( ) ? ~ ! @ # $ & * _ +

  • not contain more than three consecutive instances of the same character

license

Absolute path of NFM-P license zip file

You cannot start a main server unless the main server configuration includes a current and valid license. You can use samconfig to specify the license file, or import a license, as described in the NSP System Administrator Guide.

Default: —

fips

Whether FIPS security is enabled for network management

See Enabling FIPS security for NFM-P network management for information about using FIPS security.

Default: false


47 

As required, configure the client parameters in the following table, and then enter back ↵.

Table 14-9: Standalone main server parameters —
client

Parameter

Description

nat

Whether NAT is used between the main server and the GUI and XML API clients

Default: false

hostname

The hostname of the main server, if NFM-P components are to use a hostname, rather than an IP address, to communicate with the main server

You must configure the parameter if one of the following is true:

  • The main server is to use multiple interfaces for GUI and XML API client communication.

  • NFM-P clients are to connect to the main server using IPv4 and IPv6 interfaces.

  • NAT is used.

  • The NFM-P clients, auxiliary or peer main servers, and NSP cluster VMs use different main server interfaces.

If the TLS certificate contains the FQDN, you must specify the FQDN as the parameter value.

Default: main server hostname

public-ip

The IP address that the GUI and XML API clients must use to reach the main server

The parameter is configurable when the hostname parameter is unconfigured.

Default: —

jndi-port

The TCP port on the main server station to use for EJB JNDI messaging to GUI clients

It is recommended that you accept the default unless another application uses the port, or there is a firewall between the GUI clients and the main server.

Default: 1099

delegates

A list of the client delegate servers in the NFM-P system

Use the following list format; a path value is the absolute file path of the client installation location on the client delegate server station:

address1;path1,address2;path2...addressN;pathN

Note: The installation location cannot include a space character.

Note: Before you can install a client delegate server, the main server configuration must include the client delegate server address and file path.

Default: —


48 

As required, configure the database parameters in the following table, and then enter back ↵.

Note: The NFM-P uses the database backup settings to initialize the database during installation only. To change the backup settings after installation, you must use the Database Manager form in the NFM-P client GUI, as described in the NSP System Administrator Guide.

Table 14-10: Standalone main server parameters —
database

Parameter

Description

ip

The IP address that the main server must use to reach the database; mandatory

Default: —

instance

Database instance name

Default: maindb1

user-password

Database user password

Default: available from technical support

backup-dest

The backup directory on the main database station

It is recommended that you specify a directory that can hold at least five times the expected database size, and can accommodate the database growth associated with network growth.

Default: /opt/nsp/nfmp/dbbackup

backup-interval

How frequently, in hours, to back up the main database

Default: 24

backup-sets

The number of main database backup sets to retain

Default: 3


49 

If the NFM-P system is to include auxiliary servers, configure the aux parameters in the following table, and then enter back ↵.

Note: At least one auxiliary server that you specify must be a Preferred auxiliary server.

Table 14-11: Standalone main server parameters —
aux

Parameter

Description

stats

If enabled, specifies that one or more auxiliary servers are to be used for statistics collection

Default: false

ip-to-auxes

The main server IP address that the auxiliary servers must use to reach the main server

Default: —

preferred-list

Comma-separated list of Preferred auxiliary server IP addresses

Default: —

reserved-list

Comma-separated list of Reserved auxiliary server IP addresses

Default: —

peer-list

Comma-separated list of Remote Standby auxiliary server IP addresses

Default: —


50 

As required, configure the mediation parameters in the following table, and then enter back ↵.

Note: Some device types do not support an SNMP port value other than 162. Before you configure the snmp-port parameter to a value other than the default, you must ensure that each device type in the managed network supports the port value.

Table 14-12: Standalone main server parameters —
mediation

Parameter

Description

nat

Whether NAT is used between the main server and the managed NEs

Default: false

snmp-ipv4

The IPv4 address that the managed NEs must use to reach the main server

Default: IPv4 address of primary network interface

snmp-ipv6

The IPv6 address that the managed NEs must use to reach the main server

Default: IPv6 address of primary network interface

snmp-port

The TCP port on the main server station that the managed NEs must use to reach the main server

Default: 162

traplog-id

The SNMP trap log ID associated with the main server

Default: 98


51 

Configure the tls parameters in the following table, and then enter back ↵.

Table 14-13: Standalone main server parameters —
tls

Parameter

Description

keystore-file

The absolute path of the TLS keystore file

To enable automated TLS deployment, enter no keystore-file.

Default: /opt/nsp/os/tls/nsp.keystore

keystore-pass

The TLS keystore password

Default: available from technical support

truststore-file

The absolute path of the TLS truststore file

To enable automated TLS deployment, enter no truststore-file.

Default: /opt/nsp/os/tls/nsp.truststore

truststore-pass

The TLS truststore password

Default: available from technical support

alias

The alias specified during keystore generation

You must configure the parameter.

Default: —

pki-server

The PKI server IP address or hostname

Default: —

pki-server-port

The TCP port on which the PKI server listens for and services requests

Default: 2391

regenerate-certs

Whether to regenerate the internal TLS certificates

Certificate regeneration is required when the current certificates are about to expire, or a new internal root certificate is available. A new internal root certificate is available when the root certificate is reset, or when the PKI server is run on a station other than the station used for the previous certificate deployment.

Default: false

hsts-enabled

Whether HSTS browser security is enabled

Default: false


52 

As required, configure the oss parameters in the following table, and then enter back ↵.

Note: The parameters are configurable only if no auxiliary servers are specified in Step 49. Otherwise, OSS access is restricted to the auxiliary servers, which require the configuration of OSS access parameters during installation.

Table 14-14: Standalone main server parameters —
oss

Parameter

Description

secure

Whether communication between the main servers and the XML API clients is secured using TLS

Default: secure

public-ip

The IP address that the XML API clients must use to reach the main server

Default: IP address of primary network interface

xml-output

The directory that is to contain the output of XML APIfile export operations

Default: /opt/nsp/nfmp/server/xml_output


53 

If the NFM-P includes an auxiliary database, configure the auxdb parameters in the following table, and then enter back ↵.

Table 14-15: Standalone main server parameters —
auxdb

Parameter

Description

enabled

Whether the auxiliary database is enabled in the main server configuration

secure

Whether TLS is enabled on the auxiliary database

If TLS is enabled on the main server, you must set the parameter to true, and enable TLS during the auxiliary database installation.

Default: true

ip-list

A list of the auxiliary database station IP addresses that are accessible to the main server, in the following format:

Note: For a geo-redundant auxiliary database, the order of the IP addresses must be the same on each main server in the geo-redundant system.

cluster_1_IP1,cluster_1_IP2,cluster_1_IPn;cluster_2_IP1,cluster_2_IP2,cluster_2_IPn

where

cluster_1_IP1, cluster_1_IP2,cluster_1_IPn are the external IP addresses of the auxiliary database stations in one data center

cluster_2_IP1, cluster_2_IP2,cluster_2_IPn are the external IP addresses of the stations in the other data center; required only for geo-redundant auxiliary database

Default: —

oam-test-results

Whether the auxiliary database is to store OAM test results

Default: false

redundancy-level

Boolean value that specifies whether the auxiliary database is to replicate data among multiple stations

If the auxiliary database is deployed on a single station, you must set the parameter to 0.

Caution: After you configure an auxdb parameter and start the main server, you cannot modify the redundancy-level parameter.

Default: 1


54 

As required, configure the aa-stats parameters in the following table, and then enter back ↵.

Table 14-16: Standalone main server parameters —
aa-stats

Parameter

Description

enabled

Whether the NFM-P is to collect AA accounting statistics

Default: false

formats

AA accounting statistics file formats; the options are the following:

  • ipdr—IPDR format

  • ram—format for NSP Analytics reporting

  • ipdr,ram—both formats

The parameter is configurable when the enabled parameter is set to true.

Default: ram

aux-db storage

Whether the NFM-P is to store the statistics in an auxiliary database

The parameter is configurable when the enabled parameter is set to true.

Default: false


55 

Configure the nspos parameters in the following table, and then enter back ↵.

Table 14-17: Standalone main server parameters —
nspos

Parameter

Description

ip-list

The NSP cluster IP addresses, separated by a semicolon

cluster1_address;cluster2_address

where

cluster1_address and cluster2_address are the NSP cluster advertised addresses

Specify only one IP address for a standalone NSP system.

Default: —

address-to-nspos

The main server IP address that is reachable by the nspOS server

Default: —

internal-certs

Whether internal certificates are used to secure nspOS communication between components; the parameter is configurable when the secure parameter is set to true.

The parameter is deprecated, and must be set to the same value as the secure parameter.

Default: false

secure

Whether communication with the nspOs servers is secured using TLS

It is strongly recommended to enable the parameter in an NFM-P-only deployment.

Default: false

dc-name

The nspOS DR data center name for aligning NSP components with the local NFM-P main server; must match the dcName value in the NSP configuration file

The parameter is required only in a redundant deployment; however, it is recommended that you configure the parameter, regardless of the NFM-P deployment type.

Default: —

mtls-kafka-enabled

Specifies whether mTLS is enabled for Kafka communication with the NSP

The parameter is displayed only:

  • if the ip-list parameter is set to a remote address

  • after the configuration is initially applied in a subsequent step

Note: The parameter is configurable only if the secure and internal-certs parameters are set to true.

Note: The function is supported only in an NSP system that uses separate interfaces for internal and client communication.

Default: false

authMode

NSP authentication mode, which is one of the following:

  • oauth2—OAUTH2 user authentication

  • cas—CAS user authentication (deprecated)

The parameter is configurable only in a shared-mode NSP deployment.

The parameter setting must match the authMode setting in the NSP cluster configuration.

Default: oauth2


56 

Configure the remote-syslog parameters in the following table, and then enter back ↵.

Table 14-18: Standalone main server parameters —
remote-syslog

Parameter

Description

enabled

Enable the forwarding of the NFM-P User Activity logs in syslog format to a remote server

Default: disabled

syslog-host

Remote syslog server hostname or IP address

Default: —

syslog-port

Remote server TCP port

Default: —

ca-cert-path

Absolute local path of public CA TLS certificate file copied from remote server

The file requires nsp:nsp ownership.


57 

Configure the server-logs-to-remote-syslog parameters in the following table, and then enter back ↵.

Table 14-19: Standalone main server parameters —
server-logs-to-remote-syslog

Parameter

Description

enabled

Enable the forwarding of the NFM-P server logs in syslog format to a remote server

Default: disabled

secured

Whether the communication with the remote server is TLS-secured

Default: disabled

syslog-host

Remote syslog server hostname or IP address

Default: —

syslog-port

Remote server TCP port

Default: —

ca-cert-path

Absolute local path of public CA TLS certificate file copied from remote server

The file requires nsp:nsp ownership.


58 

If the NFM-P deployment includes the 1830 SMS netHSM, configure the hsm parameters in the following table; otherwise, go to Step 60.

Table 14-20: Standalone main server parameters —
hsm

Parameter

Description

enabled

Whether HSM is enabled

Default: false

server-certs

The location of the 1830 SMS netHSM TLS client certificate for NFM-P access

Specify a client certificate location in the following format:

address#file_path

where

address is the 1830 SMS netHSM IP address or hostname

file_path is the absolute path and file name of the certificate file on the 1830 SMS netHSM

Default: —

mode

Operation mode; 0 specifies one HSM instance with load balancing disabled, and 2 specifies load balancing among multiple instances

Default: 0

client-key

The auto-generated TLS key file that the NFM-P provides to the 1830 SMS netHSM for two-way web-client authentication

Default: client.key

client-cert

The auto-generated TLS certificate file that the NFM-P provides to the 1830 SMS netHSM for two-way web-client authentication

Default: client.cert


59 

By default, the NFM-P generates TLS authentication files for web-client access to the NFM-P HSM server.

If you want to provide your own TLS authentication files, configure the twoway HSM parameters in the following table, and then enter back ↵.

Table 14-21: Standalone main server parameters —
hsm, twoway

Parameter

Description

keystore-file

The absolute path and name of the TLS keystore file for web-client access to the NFM-P HSM server

Default: —

keystore-pass

The keystore password

Default: —

keystore-alias

The keystore alias

Default: NSP

truststore-file

The absolute path and name of the TLS truststore file for web-client access to the NFM-P HSM server

Default: —

truststore-pass

The truststore password

Default: —

truststore-alias

The truststore alias

Default: NSP


60 

If the NFM-P is not integrated with an NSP cluster, you must skip this step..

If required, enable the forwarding of the EmsServer.log and server_console.log entries from the main server to NSP OpenSearch.

Enter the following:

<main configure> server-logs-to-opensearch enabled ↵

The prompt changes to <main configure server-logs-to-opensearch>.


61 

Enter back ↵.

The prompt changes to <main configure>.


62 

Verify the main server configuration.

  1. Enter the following:

    <main configure> show-detail ↵

    The main server configuration is displayed.

  2. Review each parameter to ensure that the value is correct.

  3. Configure one or more parameters, if required.

  4. When you are certain that the configuration is correct, enter the following:

    <main configure> back ↵

    The prompt changes to <main>.


63 

Enter the following:

<main> apply ↵

The configuration is applied.


64 

Enter the following:

<main> exit ↵

The samconfig utility closes.


65 

If you want to enable mTLS for internal Kafka authentication using two-way TLS, perform the following steps.

Note: Enabling mTLS for internal Kafka authentication is supported only in an NSP deployment that uses separate interfaces for internal and client communication.

Note: The parameter you must configure is displayed only if the ip-list parameter is set to a remote address.

Note: The parameter is configurable only if the secure and internal-certs parameters in the nspos section are set to true.

  1. Enter the following:

    samconfig -m main ↵

    The following is displayed:

    Start processing command line inputs...

    <main> 

  2. Enter the following:

    configure nspos mtls-kafka-enabled back ↵

  3. Enter the following:

    <main> apply ↵

    The configuration is applied.

  4. Enter the following:

    <main> exit ↵

    The samconfig utility closes.


Enable Windows Active Directory access
 
66 

If you intend to use Windows Active Directory, or AD, for single-sign-on client access, you must configure LDAP remote authentication for AD; otherwise, go to Step 85.

Open the following file as a reference for use in subsequent steps:

/opt/nsp/os/install/examples/config.yml

Note: Consider the following.

  • The NFM-P does not assign a default user group to users of a remote authentication source that you define for Windows AD; the authentication source must provide the user group attributes.

  • Windows AD supports the following LDAP server types for remote authentication:

    AD—The user group of an AD user is derived from the group_base_dn attribute in the server configuration; group search filters are not supported.

    AUTHENTICATED—The server configuration must include bind credentials; group search filters are supported. After NFM-P initialization, you add the AD server bind credentials to the NSP password vault using the NSP Session Manager REST API.


67 

Locate the section that begins with the following lines:

#   ldap:

#     enabled: true

#     servers:

#       - type: AUTHENTICATED/AD/ANONYMOUS

#         url: ldaps://ldap.example.com:636

#         security: SSL/STARTTLS/NONE


68 

Open the following file using a plain-text editor such as vi:

/opt/nsp/os/install/config.json


69 

Locate the section that begins with the following line:

"sso": {

The section has one subsection for each type of SSO access.

Note: You can enable multiple remote authentication methods such as LDAP and RADIUS in the config.json file, or by using the NFM-P GUI. Using the GUI also allows you to specify the order in which the methods are tried during login attempts; however, no ordering is applied to multiple methods enabled in the config.json file.


70 

In the sso section, create an ldap subsection as shown below using the parameter names from the ldap section of config.yml and the required values for your configuration.

The following example shows the LDAP configuration for two AD servers:

    "ldap": {
      "enabled": true,
      "servers": [
        {
          "type": "auth_type",
          "url": "ldaps://server1:port",
          "server1_parameter_1": "value",
          "server1_parameter_2": "value",
          .
          .
          "server1_parameter_n": "value",
          },
        {
          "type": "auth_type",
          "url": "ldaps://server2:port",
          "server2_parameter_1": "value",
          "server2_parameter_2": "value",
          .
          .
          "server2_parameter_n": "value",
          },
      }]
    }

where auth_type is AD or AUTHENTICATED


71 

Save and close the files.


72 

Enter the following:

samconfig -m main ↵

The following is displayed:

Start processing command line inputs...

<main> 


73 

Enter the following:

<main> apply ↵

The AD LDAP configuration is applied.


74 

Enter the following:

<main> exit ↵

The samconfig utility closes.


Enable CAC access
 
75 

If you do not intend to enable Common Access Card, or CAC, technology for NFM-P client access, go to Step 85.


76 

Download the federationmetadata.xml from the following ADFS link:

https://ADFS_server_name/FederationMetadata/2007-06/federationmetadata.xml

where ADFS_server_name is the ADFS server FQDN


77 

Add an ADFS server entry to the /etc/hosts file on the main server.

  1. Open the /etc/hosts file using a plain-text editor such as vi.

  2. Add the following line below the line that contains the main server IP address:

    IP_address FQDN

    where

    IP_address is the IP address of the ADFS server

    FQDN is the FQDN of the ADFS server

  3. Save and close the file.


78 

In order to enable CAC for client access, you must configure Active Directory Federation Services, or ADFS.

Open the following file using a plain-text editor such as vi:

/opt/nsp/os/install/config.json


79 

In the sso section, create an saml2 subsection as shown below using the parameter names from the saml2 section of config.yml and the required values for your configuration.

The following example shows the ADFS configuration.

Note: You must preserve the lead spacing of each line.

  "sso" : {

    "saml2": {

       "enabled": true,

       "service_provider_entity_id": "NFM-P_identifier",

       "service_provider_metadata_filename": "casmetadata.xml",

       "maximum_authentication_lifetime": 3600,

       "accepted_skew": 300,

       "destination_binding": "urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect",

       "identity_provider_metadata_path": "ADFS_metadata_file",

       "authn_context_class_ref": "urn:oasis:names:tc:SAML:2.0:ac:classes:TLSClient",

       "authn_context_comparison_type": "minimum",

       "name_id_policy_format": "urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified",

       "force_auth": true,

       "passive": false,

       "wants_assertions_signed": false,

       "wants_responses_signed": false,

       "all_signature_validation_disabled": false,

       "sign_service_provider_metadata": false,

       "principal_id_attribute": "UPN",

       "use_name_qualifier": false,

       "provider_name": "ADFS_server_URI",

       "requested_attributes": [{

         "name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/emailaddress",

          "friendly_name": "E-Mail Address",

          "name_format": "urn:oasis:names:tc:SAML:2.0:attrname-format:uri",

          "required": false

      } ],

       "mapped_attributes": [{

           "name": "http://schemas.xmlsoap.org/claims/Group",

           "mapped_to": "authorizationProfile"

      }, {

           "name": "http://schemas.xmlsoap.org/ws/2005/05/identity/claims/upn",

           "mapped_to": "upn"

      } ]

    },


80 

Configure the following parameters; leave all other parameters at the default:

  • "service_provider_entity_id": "NFM-P_identifier"

  • "identity_provider_metadata_path": "ADFS_metadata_file"

  • "provider_name": "ADFS_server_name"

NFM-P_identifier is the unique ADFS Relying Trust Party identifier

ADFS_metadata_file is the absolute path of the ADFS metadata XML file, for example, /opt/federationmetadata.xml

ADFS_server_name is the ADFS server FQDN


81 

Save and close the files.


82 

Enter the following:

samconfig -m main ↵

The following is displayed:

Start processing command line inputs...

<main> 


83 

Enter the following:

<main> apply ↵

The ADFS configuration is applied.


84 

Enter the following:

<main> exit ↵

The samconfig utility closes.


Start standalone main server
 
85 

Start the main server.

Note: If you did not specify a license file during the installation, you cannot start the main server until you import a license; see the NSP System Administrator Guide for information about importing a license.

  1. Log in as the nsp user on the main server station.

  2. Open a console window.

  3. Enter the following:

    bash$ cd /opt/nsp/nfmp/server/nms/bin ↵

  4. Enter the following:

    bash$ ./nmsserver.bash start ↵

  5. Enter the following:

    bash$ ./nmsserver.bash appserver_status ↵

    The server status is displayed; the server is fully initialized if the status is the following:

    Application Server process is running.  See nms_status for more detail.

    If the server is not fully initialized, wait five minutes and then repeat this step. Do not perform the next step until the server is fully initialized.


86 

If you have enabled CAC for NFM-P client access, download the casmetadata.xml file from the following URL, and then import the file into the ADFS server relying-trust-party:

https://server/cas/sp/metadata

where server is the main server IP address or hostname

After the download, the casmetadata.xml file is available in the following directory on the main server:

/opt/nsp/os/tomcat/conf/cas/saml


87 

If you have enabled Windows Active Directory access using the AUTHENTICATED type of LDAP server, you must add the LDAP server bind credentials to the NSP security configuration.

Use the NSP Session Manager REST API to add the bind credentials; see the Network Developer Portal for information.


88 

Specify the memory requirement for GUI clients based on the type of network that the NFM-P is to manage.

  1. Enter the following:

    bash$ ./nmsdeploytool.bash clientmem -option

    where option is one of the following:

    • m—medium, for management of limited-scale network

    • l—large, for a network of 15 000 or more NEs

  2. Record the setting, which is not preserved through an upgrade, for future use.

  3. Enter the following to commit the configuration change:

    bash$ ./nmsdeploytool.bash deploy ↵


89 

Close the console window.


Install optional components
 
90 

Install and enable one or more auxiliary servers, if required; see Auxiliary server installation.


91 

Install and enable an auxiliary database, if required; see Auxiliary database installation.


Install GUI clients
 
92 

Install NFM-P single-user GUI clients or client delegate servers, as required; see the following for information:

See the NSP NFM-P User Guide for information about using the NFM-P GUI.


Stop PKI server
 
93 

If no other components are to be deployed, stop the PKI server by entering Ctrl+C in the console window.


Configure and enable firewalls
 
94 

If you intend to use any firewalls between the NFM-P components, and the firewalls are disabled, configure and enable each required firewall.

Perform one of the following.

  1. Configure each external firewall to allow the required traffic using the port assignments in the NSP Planning Guide, and enable the firewall.

  2. Configure and enable firewalld on each component station, as required.

    1. Use an NFM-P template to create the firewalld rules for the component, as described in the NSP Planning Guide.

    2. Log in to the station as the root user.

    3. Open a console window.

    4. Enter the following:

      systemctl enable firewalld ↵

    5. Enter the following:

      systemctl start firewalld ↵

    6. Close the console window.

End of steps