Configuring HDR via the ACLI
This section provides procedures for configuring HDR. HDR configuration includes:
- setting parameters to govern sample and push intervals, and start/end times for collection
- setting parameters to support HDR across a high availability (HA) node
- setting group parameters to inform the Oracle Communications Session Border Controller (OCSBC), which groups of records to collect, when to start and stop collecting, and how often to sample for a specific group.
- setting push receivers that transport the records forwarded by the
OCSBC
Note:
If you modify the HDR configuration parameters using the ACLI, the changed parameters DO NOT take affect until you reboot the OCSBC
Enabling HDR Collection
You access the parameters that enable and support HDR using the ACLI system-config path.
To enable HDR collection:
Setting Global Collection
You access the collection configuration through the ACLI system-configuration menu. Once in the collection configuration, you can establish the global settings for HDR collection.
To set HDR global collection:
Setting HDR for an HA Node
If you are using the HDR feature on a High Availability (HA) node (or redundant pair of OCSBCs), several parameters in the collection configuration must be set for HDR to perform properly.
Oracle recommends strongly that you do not change these parameters from their defaults for a normal HA node configuration. Therefore, if you need to change them to support HDR, you should do so with caution.
To set HDR support across an HA node:
Setting Multiple Collection Groups
You can configure the OCSBC to collect multiple groups of statistics. Collection group settings are accessible through the collection configuration. For specific group names, group statistics, and values, see HDR Groups and Group Statistics.
The sample-interval, start-time, and end-time parameters that you set for multiple collection groups override the same parameters set for global collection.
Note:
For multiple collection groups, the sample-interval value must always be smaller than the global collection parameter value for push-interval.To set multiple collection groups:
Setting Servers as Push Receivers
You can configure multiple push receivers that represent FTP or SFTP destination servers for which the OCSBC pushes records. Push receiver settings are accessible through the collection configuration.
If you configure more than one server, the OCSBC sends data to all of the servers. If one server fails, the OCSBC generates an SNMP trap. The OCSBC makes 3 attempts to send data to the failed server. If the server cannot receive the data, the OCSBC clears the data for that server. For example, if there are four servers configured, and the OCSBC successfully pushes data to three of them, the OCSBC generates a trap indicating the fourth server is down and after 3 attempts to send the data, the data is cleared.
To set servers as push receivers:
Creating a Public Key Profile
The Secure Shell (SSH) and related Secure Shell File Transfer (SFTP) protocols provide for the secure transfer of audit files and for the secure transfer of management traffic across the wancom0 interface. When using password or public key authentication with push receiver configurations, use the procedures described below to create your profiles.
Create your profile by configuring:
- SSH Properties
- Import an SSH Host Key
- Create the public key profile
The following two tasks are required for public key authentication mode only.
- Generate an SSH Key Pair
- Copy the OCSBC public key to the SFTP server
After the above, you can use this profile within the context of your FTP push configuration.
SSH Operations
SSH Version 2.0, the only version supported on the OCSBC, is defined by a series of five RFCs.
- RFC 4250, The Secure Shell (SSH) Protocol Assigned Numbers
- RFC 4251, The Secure Shell (SSH) Protocol Architecture
- RFC 4252, The Secure Shell (SSH) Authentication Protocol
- RFC 4253, The Secure Shell (SSH) Transport Layer Protocol
- RFC 4254, The Secure Shell (SSH) Connection Protocol
RFCs 4252 and 4253 are most relevant to OCSBC operations.
The transport layer protocol (RFC 4253) provides algorithm negotiation and key exchange. The key exchange includes server authentication and results in a cryptographically secured connection that provides integrity, confidentiality and optional compression. Forward security is provided through a Diffie-Hellman key agreement. This key agreement results in a shared session key. The rest of the session is encrypted using a symmetric cipher, currently 128-bitAES, Blowfish, 3DES, CAST128, Arcfour, 192-bit AES, or 256-bit AES. The client selects the encryption algorithm to use from those offered by the server. Additionally, session integrity is provided through a crypto-graphic message authentication code (hmac-md5, hmac-sha1, umac-64 or hmac-ripemd160).
The authentication protocol (RFC 4252) uses this secure connection provided and supported by the transport layer. It provides several mechanisms for user authentication. Two modes are supported by the OCSBC: traditional password authentication and public-key authentication.
ACLI Instructions and Examples
This section provides ACLI procedures for SFTP push configurations, including SSH property configuration, certificate import, and public key profile configuration on your OCSBC.
Configuring SSH Properties
The single instance ssh-config configuration element specifies SSH re-keying thresholds.
Import an SSH host Key
Importing a host key requires access to the SFTP server or servers which receive audit log transfers. Access is generally most easily accomplished with a terminal emulation program such as PuTTY, SecureCRT, or TeraTerm.
View a Public key on the OCSBC
You can use the show security ssh-pub-key command to display information about SSH keys imported to the OCSBC with the ssh-pub-key command; you cannot display information about keys generated by the ssh-pub-key command.
ORACLE# show security ssh-pub-key brief login-name: acme74 finger-print: 51:2f:f1:dd:79:9e:64:85:6f:22:3d:fe:99:1f:c8:21 finger-print-raw: 0a:ba:d8:ef:bb:b4:41:d0:dd:42:b0:6f:6b:50:97:31 login-name: fedallah finger-print: c4:a0:eb:79:5b:19:01:f1:9c:50:b3:6a:6a:7c:63:d5 finger-print-raw: ac:27:58:14:a9:7e:83:fd:61:c0:5c:c8:ef:78:e0:9c ORACLE#
This command displays summary information for all SSH imported keys.
- login-name: contains the name assigned to the RSA or DSA public key when it was first imported.
- finger-print: contains the output of an MD5 hash computed across the base64-encoded public key.
- finger-print-raw: contains the output of an MD5 hash computed across the binary form of the public key
ORACLE# show security ssh-pub-key brief fedallah login-name: fedallah finger-print: c4:a0:eb:79:5b:19:01:f1:9c:50:b3:6a:6a:7c:63:d5 finger-print-raw: ac:27:58:14:a9:7e:83:fd:61:c0:5c:c8:ef:78:e0:9c ORACLE#
This command displays summary information for a specific SSH public key (in this case fedallah).
ORACLE# show security ssh-pub-key detail fedallah host-name: fedallah comment: "2048-bit RSA, converted from OpenSSH by klee@acme54" finger-print: c4:a0:eb:79:5b:19:01:f1:9c:50:b3:6a:6a:7c:63:d5 finger-print-raw: ac:27:58:14:a9:7e:83:fd:61:c0:5c:c8:ef:78:e0:9c pub-key: AAAAB3NzaC1yc2EAAAABIwAAAQEA7OBf08jJe7MSMgerjDTgZpbPblrX4n17LQJgPC7clLcDGEtKSiVt5MjcSav3v6AEN2pYZihOxd2Zzismpoo019kkJ56s/IjGstEzqXMKHKUr9mBVqvqIEOTqbowEi5sz2AP31GUjQTCKZRF1XOQx8A44vHZCum93/jfNRsnWQ1mhHmaZMmT2LShOr4J/Nlp+vpsvpdrolV6Ftz5eiVfgocxrDrjNcVtsAMyLBpDdL6e9XebQzGSS92TPuKP/yqzLJ2G5NVFhxdw5i+FvdHz1vBdvB505y2QPj/iz1u3TA/3O7tyntBOb7beDyIrg64Azc8G7E3AGiH49LnBtlQf/aw== modulus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exponent: (1) 23 ORACLE#
This command displays detailed information for specific SSH public key (in this case fedallah, an RSA key).
- host-name: contains the name assigned to the RSA key when it was first imported
- finger-print: contains the output of an MD5 hash computed across the base64-encoded RSA public key
- finger-print-raw: contains the output of an MD5 hash computed across the binary form of the RSA public key
- public key: contains the base64-encoded RSA key
- modulus: contains the hexadecimal modulus (256) of the RSA key
- exponent: (also known as public exponent or encryption exponent) contains an integer value that is used during the RSA key generation algorithm. Commonly used values are 17 and 65537. A prime exponent greater than 2 is generally used for more efficient key generation.
ORACLE# show security ssh-pub-key detail acme74 host-name: acme74 comment: DSA Public Key finger-print: 51:2f:f1:dd:79:9e:64:85:6f:22:3d:fe:99:1f:c8:21 finger-print-raw: 0a:ba:d8:ef:bb:b4:41:d0:dd:42:b0:6f:6b:50:97:31 pub-key: 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 p: (128) F63C64E1D8DB2152240E97602F47470347C5A7A1BF1E70389D2BCD9773A12397C5B1135BA4E81EFF03D5427FCFECC7A3D162928E57C9B6670C86810C7B5B950F98A7B4ADC7296D1E75C5D582DF283D46E13E8962B747608D783A6D5E83D7B836709195E6AAA193C5DD419F6626BA6D7AC64D07F7809AB67BB622B24FE017ED55 q: (20) DBF03E5CBF01D64D90CF7D7D03DACF5177B341BD g: (128) 94DF76F816FB0F828B624DC8C116D76E5C177643E0800E297DDB56F6F19F274FD11DDF8D8C1E1EA350FED1D8B1EAD5F060637B3CA4B947F1573CDC311CF6A9723F6E2F5267D80590D9DB249DFFA2FC5000BE2A143E499D31CD33B96A12384B12361543B57DD676F55C19C06AF5C7ADCEBB4E2963A8709989F34A9A7714D11ED5 pub_key: (128) DEC263E28ABF5807A51CC5C1D426EC72BD6DBD4B028D8AC1AA179DA74581EA6D34141E4971B5BCEF89B2FA6154C04973D1D29F6E1562D62DB0CBBBE2A5EF8988F3895B9C58A8E32846F5D63BAA9C5D060E50775559B11CB9B19C0CFAE3758AE3667B74B339B18DBDA2E7B3BF85F3D8FB8C721E5518F3FE083AB308CE25A16815 ORACLE#
This command displays detailed information for specific SSH public key (in this case acme74, a DSA key).
- host name: contains the name assigned to the DSA public key when it was first imported
- comment: contains any comments associated with the DSA key
- finger-print: contains the output of an MD5 hash computed across the base64-encoded DSA public key
- finger-print-raw: contains the output of an MD5 hash computed across the binary form of the DSA public key
- public key: contains the base64 encoded DSA key
- p: contains the first of two prime numbers used for key generation
- q: contains the second of two prime numbers used for key generation
- g: contains an integer that together with p and q are the inputs to the DSA key generation algorithm
ORACLE# show security ssh-pub-key detail ... ... ... ORACLE#
This command displays detailed information for all SSH imported keys.