Documentos de Académico
Documentos de Profesional
Documentos de Cultura
UserGuide
Version: 2.5
Cypherpath, Inc. 1
Copyright 2016 Cypherpath, Inc. All rights reserved. Cypherpath Virtual Container Platform software and
documentation contain proprietary information and are provided under a license agreement containing restrictions on
use and disclosure and are protected by copyright, patent, and other intellectual property laws.
Cypherpath is a registered trademark of Cypherpath, Inc. Other names may be trademarks of their respective owners.
Cypherpath, Inc.
800 W El Camino Real, Suite 180
Mountain View, CA 94040
USA
Tel: 1-650-713-3060
info@cypherpath.com
Cypherpath, Inc. 2
1Contents
2.Preface 13
2.1About 13
2.2IntendedAudience 13
2.3AccountAdministration 13
3.AccountAccess 14
3.1Login 14
3.2LogOut 14
4.Dashboard 14
4.1YourResourceUsage 15
4.2Status 15
4.3TopCPUConsumption 16
4.4TopRAMConsumption 16
4.5RecentlyAccessedContainers 17
4.6MostAccessedContainers 17
5.Storage 18
5.1DiskImages 18
5.1.1CreateDiskImage 18
5.1.1.1DiskIdentityandDefaultDiskSettings 19
5.1.1.1.1Name 19
5.1.1.1.2Description 19
5.1.1.1.3DiskSize 19
5.1.1.1.4RAM(MB) 19
5.1.1.1.5CPUCount 19
Cypherpath, Inc. 3
5.1.1.1.6DiskBus 19
5.1.1.1.7NICType 19
5.1.1.1.8CPUType 20
5.1.1.1.9VideoCard 20
5.1.1.1.10MachineRole 20
5.1.2UploadDisk 20
5.1.2.1OverwriteExisting 20
5.1.2.2DiskUploadStatus 21
5.1.3DiskActionsPanel 21
5.1.3.1EditingaDisk 21
5.1.3.2ShareDisk 22
5.1.3.3CopyDisk 23
5.1.3.4DownloadDisk 23
5.1.3.5DeleteaDisk 23
5.2ManagedStorage 23
5.2.1UploadingaFile 23
5.2.2DownloadingaFile 24
5.2.3DeletingaFile 24
5.2.4MovingaFile 24
5.25Folders 24
5.2.5.1AddingaFolder 24
5.2.5.2SearchCurrentFolders/Files 25
5.2.5.3BrowsingaFolder 25
5.2.5.4DeletingaFolder 25
5.3VPIFiles 25
5.3.1UploadingaVPIFile 26
Cypherpath, Inc. 4
5.3.2DownloadingaVPIFile 26
5.3.3ImportingaVPIFile 26
5.3.4DeletingaVPIFile 26
6.Containers 27
6.1YourQuotaUsage 27
6.1.1YourQuotaUsage 27
6.1.2PhysicalRAMUsage 27
6.1.3SystemRAMUsage 27
6.1.4VirtualCPUUsage 28
6.1.5AllContainers 28
6.1.6SharedwithMe 28
6.2CreatingaNewContainer 29
6.2.1ContainerName 29
6.2.2ContainerDescription 29
6.3DefaultDisplaySettings 29
6.3.1ManualLayout 30
6.3.2ComponentSpacing 30
6.3.3ComponentDensity 30
6.4ContainerList 30
6.4.1CPUs 31
6.4.2Memory 31
6.4.3Status 31
6.5ContainersActionPanel 31
6.5.1FilterContainers 32
6.5.2Start/StopaContainer 32
6.5.3ViewaContainer 32
Cypherpath, Inc. 5
6.5.4RenameaContainer 32
6.5.5SharingaContainer 33
6.5.6CopyaContainer 33
6.5.7Sharingyourcontainerwithagroup 33
6.5.8Revokingsharedaccesstousers 33
6.5.9Revokingsharedaccesstogroups 34
6.5.10CopyaContainer 34
6.5.11ExportContainer 35
6.5.12DeletingaContainer 35
7.Topology 37
7.1UnderstandingTopologies 37
7.2NavigatingaTopology 38
7.2.1Zoom 38
7.2.2Pan 38
7.3TopologyMenu 38
7.3.1SelectAll 39
7.3.2MachineStateControls 39
7.3.2.1Start 39
7.3.2.2Resume 39
7.3.2.3Pause 39
7.3.2.4Stop 39
7.3.2.5Delete 39
7.3.3ContainerSettings 39
7.3.4ContainerBatchCreator 40
7.4Toolbox 40
7.5DiskImageRoles 41
Cypherpath, Inc. 6
7.5.1Workstation 41
7.5.1Database 41
7.5.3Firewall 41
7.5.4Server 41
7.5.5StorageDevice 41
7.5.6Router 41
7.5.7CDROMs 42
7.6TopologyTree 42
7.7Properties 42
7.8History 42
7.9Start/StopButton 43
7.10InterfaceCount 44
8.DesigningaTopology 44
8.1Networks 44
8.1.1AddingaNetwork 44
8.1.2SelectingaNetwork 45
8.1.3DeletingaNetwork 45
8.1.4DeletingMultipleNetworksnotconnectedtoMachines 45
8.1.5AddingNetworkRoutes 45
8.2Machines 46
8.2.1AddingaMachinetoyourTopology 46
8.2.2SelectingaMachine 46
8.2.3DeletingaMachine 46
8.2.4ConnectingMachinestoNetworks 47
8.2.5DeletingMultipleMachinesconnectedtoNetworks 47
8.3BatchCreator 48
Cypherpath, Inc. 7
8.3.2Name 48
8.3.2MachineCount 48
8.3.3Images 49
8.34Networks 49
8.3.5RAM 49
8.3.6NumberofCPUs 49
8.4TopologySettings 49
8.4.1General 50
8.4.1.1CurrentPersistentStatus 50
8.4.1.2GlobalOn/GlobalOffButtons 50
8.4.1.3Defaultroutingprotocol 51
8.4.1.3.1None 51
8.4.1.3.2RIP 51
8.4.1.3.3OSPF 51
8.4.1.3.4RIPng 51
8.4.1.3.5OSPF6 51
8.4.1.4DefaultOUIPrefix 51
8.4.1.5Maximumruntimeinseconds 52
8.4.1.6SyncMachineClocks 52
8.4.1.7Startmachinesatcontainerstart 52
8.4.1.8Machinespersistentbydefault 52
8.4.1.9EnableSnapToGrid 53
8.4.1.10BackgroundGrid 53
8.4.2AutomaticLayoutSettings 53
8.4.2.1ComponentSpacing 53
8.4.2.2ComponentDensity 53
Cypherpath, Inc. 8
8.4.3ContainerCheckpoints 54
8.4.3.1AddCheckpoint 54
8.4.3.2LoadCheckpoint 54
8.4.3.3DeleteCheckpoint 54
8.4.4PortForwards 54
8.4.4.1PortForwarding 55
8.4.4.2AddingaPortForwarder 55
8.4.4.2RemovingaPortForwarder 55
7.5ComponentProperties 55
8.5.1MachineProperties 56
8.5.1.1MachineTab 56
8.5.1.1.1PowerOn 56
8.5.1.1.2Stop(ACPI) 57
8.5.1.1.3Stop(Kill) 57
8.5.1.1.4Resume 57
8.5.1.1.5Suspend 57
8.5.1.1.6Connect 57
8.5.1.1.7MachineName 57
8.5.1.1.8Description 57
8.5.1.1.9NumberofCPUs 57
8.5.1.1.10RAM 57
8.5.1.1.11BootOrder 58
8.5.1.1.12Role 58
8.5.1.1.13PersistentDiskImages 58
8.5.1.1.14Port/ForwardPort 58
8.5.1.2DrivesTab 59
Cypherpath, Inc. 9
8.5.1.2.1AddNewDrive 59
8.5.1.2.2DiskImage 60
8.5.1.2.3DiskBus 60
8.5.1.2.4DiskActions 60
8.5.1.2.5EjectedCDROM 61
8.5.1.2.6CDROMs 61
8.5.1.2.7HowtoinstallanewoperatingsystemfromanISO 62
8.5.1.3Interfaces 62
8.5.1.3.1AddNewInterface 63
8.5.1.3.2RemovingInterfaces 63
8.5.1.3.3IPAddress 64
8.5.1.3.4IPv6Address 64
8.5.1.3.5MACAddress 64
8.5.1.3.6Network 64
8.5.1.3.7NICType 64
8.5.1.3.8Usemachinenameashostname 65
8.5.1.4Advanced 65
8.5.1.4.1TCPHardwareSerial 65
8.5.1.4.2TCPVirtioSerial 66
8.5.1.4.3ServiceProbes 66
8.5.1.4.4AddNewTCP 66
8.5.1.4.5AddNewUDP 67
8.4.1.4.6AddNewPing 67
8.5.1.4.7MachineSnapshots 68
8.5.1.4.8Tag 68
8.5.1.4.9RestoreSnapshot 68
Cypherpath, Inc. 10
8.5.1.4.10DeleteSnapshot 68
8.5.1.4.11MachineClock 69
8.5.1.4.12BootDevice 69
8.5.1.4.13.BootMenutimeoutinseconds 69
8.5.1.4.14CPUType 69
8.5.1.4.15VideoCard 69
8.5.2VirtualContainerPlatformManagedStorage 69
8.5.3NetworkProperties 70
8.5.3.1NetworkTab 70
8.5.3.1.1Name 71
8.5.3.1.2Description 71
8.5.3.1.3Mode 71
8.5.3.1.4Physical 71
8.5.3.1.5Tools 71
8.5.3.2IPv4Tab 72
8.5.3.2.1DHCPEnabled 72
8.5.3.2.2DNSEnabled 72
8.5.3.2.3IPAddress 72
8.5.3.2.4Netmask 72
8.5.3.2.5DefaultGateway 72
8.5.3.2.6DefaultGatewaySelector 73
8.5.3.3IPv6Tab 73
8.5.3.3.1SLAAC 73
8.5.3.3.2IPv6Address 73
8.5.3.3.3DefaultIPv6Gateway 73
8.5.3.4RoutingGlobalSettings 74
Cypherpath, Inc. 11
8.5.3.5DeletingRoutes 75
8.5.3.6Advanced 75
8.5.3.7ProtocolRedistributeSettings 76
8.5.3.7.1IPv4DefaultGateway 77
8.5.3.7.2IPv6DefaultGateway 77
8.5.3.7.3RIPkeychains 77
8.5.3.8InterfaceProtocolSettings 77
8.5.3.8.1RIP(RoutingInformationProtocol)Versions 77
1and2
8.5.3.8.2OSPF(OpenShortestPathFirst)Version2 77
8.5.3.8.3RIPng(RIPNextGeneration)forIPv6 78
8.5.3.8.4OSPF6(OSPFVersion3)forIPv6 78
8.5.3.8.5NAT(NetworkAddressTranslation) 78
8.5.3.8.6NATPortForwarding 78
9.Profile 79
9.1ProfileSettings 79
9.1.1ChangingyourPassword 80
10.Notifications 80
11.Support 80
Cypherpath, Inc. 12
2 Preface
2.1 About
The Cypherpath Virtual Container Platform (VCP) delivers complete IT infrastructure on
demand by enabling any machines, networks, apps, storage, stacks, and app containers to be
placed inside a software-defined infrastructure container. Cypherpath eliminates the need for
proprietary hardware and rebuilding, rearchitecting, or reconfiguring infrastructure allowing IT
to instantly deliver anytime, anywhere.
Note:
This document assumes your administrator has provided you with a user account and that you have
access to the Cypherpath Virtual Container Platform 2.5 Web Interface using one of the supported web
browsers: IE 10 or newer, Firefox 42 or newer, Chrome 45 or newer, Opera 34 or newer.
3 Account Access
Cypherpath, Inc. 13
3.1 Login
Your Virtual Container Platform administrator will provide you with a URL address and
credentials where you can access the platforms web interface. Using your web browser
navigate to the provided URL. Once your browser has accessed the URL you will be prompted to
log in with your credentials.
Note:
If you are logged into your account and remain inactive for a period of time set by your administrator,
you will automatically be logged out.
4 Dashboard
After you log in you will be directed to the homepage where your dashboard is located. Your
dashboard is divided into six panels: Your Resource Usage, Status, Top CPU Consumption, Top
RAM Consumption, Recently Accessed Containers and Most Accessed Containers.
Note:
The Top CPU Consumption and RAM Consumption are only visible on your dashboard if you have at
least one running container.
Cypherpath, Inc. 14
4.1 Your Resource Usage
Your Resource Usage panel is used to display RAM, CPU, and Disk usage. These bars will show
the amount of system resources currently being used by your account. To see a more detailed
breakdown of your RAM, CPU, or Disk usage, hover your mouse over the bars.
4.2 Status
To the right of your dashboard is your Status panel. This shows your Total Containers, Running
Containers, Total Machines, Running Machines, Total Networks, Running Networks, and Total
Disk Images.
Cypherpath, Inc. 15
4.3 Top CPU Consumption
Your Top CPU Consumption shows you the five containers consuming the most virtual CPUs.
Hover over the blue CPU bar to see the number of CPUs.
Cypherpath, Inc. 16
4.5 Recently Accessed Containers
Your Recently Accessed Containers shows you which five containers you have most recently
accessed and allows you to quickly navigate to them. When you click on any container from this
list, you will be taken directly to the topology view of that container. If you have recently
accessed any shared containers, you will see this icon showing which containers are
shared with you. Hover over this icon to see who is sharing that container with you.
Cypherpath, Inc. 17
5 Storage
You can access your storage area by hovering over the Storage tab in your navigation bar. You
will see a drop-down list containing Disk Images, Managed Storage, and VPI Files. Under this
storage tab is where all your disk images and uploaded files are stored by VCP.
Within your storage area, you will maintain a set of master disk images. These form the baseline
disks for the machines in your containers. Each container does not receive full cop ies of the
master images; rather, each machine using a disk image gets a clone of that maste r image,
meaning that on each start of the container
, machines not marked as persistent will be recloned
from their master image. These clones are created using a technique called copy on write, which
means that only the differences from the original are stored for each clone. This conserves
space, allowing the system to maximize storage resources.
Note:
The Storage area may not appear for you, depending on how your account is set up by your
administrator.
Cypherpath, Inc. 18
5.1.1.1 Disk Identity and Default Disk Settings
This section contains the main properties of the disk you are creating. Your disk template is
metadata that defines a set of default machine characteristics to be applied to any new
machines that are created using this master image as a base. After creation, all properties of the
machine instance can be changed.
5.1.1.1.1 Name
The label used to identify the disk in the topology toolbox. This field is required to create
the disk.
5.1.1.1.2 Description
This optional field is where you will provide your disk image description.
IDE
SCSI (LSI 53C895A)
USB
Serial ATA
Virtio block
Virtio SCSI
Cypherpath, Inc. 19
5.1.1.1.8 CPU Type
This field determines the default CPU type to emulate on a machine created with this
image as the boot image.
VCP supports many popular image formats. The formats supported are ISO, QCOW, VMDK
(single file image), VDI, VHD, and raw. If you encounter any problems with uploading any other
formats, one solution may be to convert it to a raw format before uploading it.
Cypherpath, Inc. 20
Once you have made your choices in the Default Disk Settings, click the Browse button to
choose a file to upload. Only one file can be chosen at a time. If an unknown file type is
selected, you will get a warning message box stating that it was unable to detect the file
type.
Click
OK
then click the
Upload
button located to the right of your newly uploaded file.
Note:
Popular hypervisor formats will be automatically detected and handled by VCP.
Cypherpath, Inc. 21
can change the name of your disk image, add an optional description and modify your Default
Disk Settings. After you have made all your changes click the
Save
button.
will see this icon next to the disk image name in your disk images list indicating you are
sharing that disk.
To remove sharing from users and or groups, hover over their username or group name under
the Sharing with the following users, which will highlight in red, then click to remove.
Cypherpath, Inc. 22
5.1.3.3 Copying a Disk
When you click the Copy button after selecting your disk, you will create a new master disk
image that is a copy of that image. Every aspect of the new disk image will be the same, except
the name, which will have "Copy x of" prepended to it, where x is a number, starting at 1 and
incrementing as necessary with each new copy.
Note:
If a disk is being used by a container, it cannot be deleted. If you attempt to delete such a disk, you
will be prevented from doing so and notified which containers are using it.
Cypherpath, Inc. 23
To upload a file, click the Upload File(s) button which will open the upload pop-up window or
bring it to focus if it is already open. Select the Upload button at the top to browse and choose
any files that you wish to upload to your Managed Storage area. Once you have selected a file to
upload, it will immediately begin uploading. At any time during the upload, you may click the
Cancel button to cancel the upload. The progress bar will turn red and the upload will halt. Once
complete the file will appear in your managed file list.
To move a file, click the drop-down menu to select your folder and click the icon.
5.2.5 Folders
The interface for the Managed Storage displays folders exactly as they appear on the disk. If you
create a folder and add files to it, then add the Managed Storage device in the toolbox to a
container, that folder and set of files will be available inside of the container on the storage
device, and vice-versa. Folders cannot be downloaded as a whole; only files within the folders
can be downloaded by clicking on the name of the file.
Cypherpath, Inc. 24
5.2.5.2 Search Current Folders/Files
To search your list of current folders/files, begin typing the name of the file/folder you wish to
find. The list will be filtered based on your entry.
VPI files can be imported as new containers. The new container will be a duplicate of the
exported container, containing all the same machines and networks. In addition, all disk images
that were part of the original container will be made available in your Disk Image area.
Cypherpath, Inc. 25
5.3.1 Uploading a VPI File
To upload a file to the VPI File storage, hover over the Storage tab and click VPI Files button.
Click the Upload VPI(s) button to browse for a VPI file to upload to your VPI files storage area. If
you choose a file that does not have the .vpi file extension you will get a warning message and
your file will not appear in the list. Click the OK button to remove the message box.
Once you choose a valid VPI file it will show up in the file list with an indication of its size and
current upload progress. At any time during the upload, you may click the Cancel button to
cancel the upload. The progress bar will turn red and the upload will halt.
Cypherpath, Inc. 26
6 Containers
A "Container" is an isolated topology that is used to virtualize, automate, and configure IT
infrastructure.
To access the Containers page, hover over the Containers tab in your navigation bar and click
on
the All Containers
button. If a container has been shared with you, the Shared with Me panel
and the
My Containers button will appear as well.
This is where you can view your current RAM and CPU quotas as well as how much of each you
are consuming. Your RAM usage is broken up into Committed, Physical and System usage.
Cypherpath, Inc. 27
6.1.4 Virtual CPU Usage:
This is a breakdown of your virtual CPU quota usage.
Note:
A container shared with you does not affect your allowances. It affects the allowances of the owner
of that shared container.
Cypherpath, Inc. 28
6.2 Creating a New Container
To create a new container, click
Create
New Container button above the search containers field
and new container form will slide down.
In this panel, you can name your container as well as enter an optional description. Once you
have named your container and entered your optional description, click Save.
You will be presented with a Default Display Settings slide-down form. Using this form you can
adjust the spacing, visibility, and density of topology components for your containers. These
default display settings can be overridden from within an individual container.
Cypherpath, Inc. 29
6.3.1 Manual Layout
Manual Layout allows users to build topology designs by positioning each resource at a specific
location. Snap-To-Grid allows users to drag and drop components to desired positions on the
canvas. If Snap-To-Grid is off the canvas will use an automatic layout algorithm. Background
Grid will show a lined grid that can be used to easily position components.
Cypherpath, Inc. 30
6.4.1 CPUs
The CPU column shows the total number of CPUs committed to VMs inside the container.
When the container is running, this will also show the actual number of CPUs committed to
running VMs as well as the total.
6.4.2 Memory
The memory column shows the total amount of ram committed to VMs inside the container.
When the container is running, this will also show the actual RAM committed to running VMs as
well as the total.
6.4.3 Status
Displays the state of the container as Off, Starting, Running or Shutting Down.
Cypherpath, Inc. 31
6.5.1 Filter Containers
The search box located above the Container Actions panel allows you to filter your containers
for quick access. You can type any part of a containers name and it will filter out container
names that do not match. To turn off filtering, delete the contents of the search box.
If you stop a container that has at least one machine with persistence, an ACPI shutdown
message is sent to the persistent machines. The following message will appear on your screen.
Click Yes to continue with shutdown or click No to abort shutdown. Please note that if
machines do not respond to the ACPI shutdown then they must be powered down or killed
manually.
Note: It is possible to connect manually to a machine and shut it down (if, for example, it does not support
ACPI). Additionally, the machine can be powered off manually (killed) if waiting for a graceful shutdown is
not a concern.
Cypherpath, Inc. 32
Using this form allows you to rename the container and add an optional description. Once you
have renamed your container, click the Save button to save your changes.
To share your container, click on the container that you want to share in the container list. Click
the Share button from the Container Actions panel and a slide-down form will appear. Using this
form, you can perform several operations such as: choosing which users to share your container
with, which groups to share your container with, and which users and/or groups to revoke
sharing containers with.
Cypherpath, Inc. 33
6.5.8 Revoking shared access to users
To revoke access to a user, switch to
Users
and then hover over the name of the user and click
on the username displayed in the center of the form.
Note:
When you share a container with a user or group, you are granting them access to: edit the topology,
rename the container, share the container with others, and delete it, if they have the corresponding
permissions to perform those actions.
Note:
A master image is a disk image or ISO image uploaded into the Disk Images storage section of the
platform. Master images are never used directly in a container.
Cypherpath, Inc. 34
6.5.11 Export Container
When exporting container, it is exported as a VCP Image (VPI) file, which will be placed into
your VPI Files storage area. Your container will be unavailable while it is being exported. Making
a copy of a container is typically a faster operation than exporting it as a VPI.
Note:
Exporting large containers may take multiple hours to complete. While exporting you will not have
access to the container. It is advised to copy your container first and export the copy so that you can resume
use of your container while the export process completes.
The VPI is your entire container saved out as a single file. It can then be loaded into another
deployment, used as a backup or used as a starting template for another container. This is
explained in more detail in
Section 5.3
titled VPI Files.
To export a container to a VPI, first select the container that you would like to export from your
container list. In the Container Actions panel located at the right of the screen click the
Export
button. An estimated time of export will be calculated when the Export button is clicked. You will
be presented with a message box showing your estimated export time and given the option of
clicking Yes
to continue or
Noto abort.
Note: Export time estimates are based on previous VPI exports, so until the Virtual Container Platform has
enough data to provide an estimate, it will inform you that no estimate is available.
To access your VPI file, navigate to the VPI File page under your Storage tab in the navigation
bar.
Cypherpath, Inc. 35
To delete the container, type
DELETE in all caps and click
Yes. Clicking
No
will abort the
operation.
Warning:
When you delete a container, all of the topology elements for that container including
configuration and settings cannot be recovered!
7 Topology
Cypherpath, Inc. 36
production capacity. The whole topology can be shutdown and restarted returning the
infrastructure to a pristine state or to the previous state depending on the persistence setting.
By default, all new topologies are set to automatically persist. Persistence is a component's
ability to maintain its state between shutdown and the next startup. This means that VCP saves
changes made to the clones in a container for the machines that are set to persist, even when
the container is stopped. Both individual machines' persistence, as well as the default behavior
when creating machines, can be altered within the topology view for a container.
VCP utilizes a technology called Hyper-cloning, which is the automatic creation, optional
persistence, and automatic cleanup of virtual machine disk images. To facilitate this, virtual
machines make use of copy on write clones of master images which are created on boot up. When
persistence is turned on, these clones are kept indefinitely between start-ups of the container.
When the system detects that a given clone is no longer being used, the clone is cleaned up.
Copy on write is a technology that allows clones to take only as much space as needed for
machine deltas relative to their master image. This system of hyper-cloning allows the system to
create and destroy many virtual machines quickly. Combined with our container virtualization
this allows you to build up large topologies quickly and easily.
7.2.2 Pan
To pan, click and hold the left mouse button on an empty space on the topology (no network
equipment/machines under the mouse) and move the cursor in the direction you want to move
the topology.
Cypherpath, Inc. 37
Hover over your Components tab to see the drop-down list of options for use in selecting and
controlling machine behavior.
7.3.2.2 Resume
Click this button to resume your machine(s).
7.3.2.3 Pause
Click this button to suspend your machine(s).
7.3.2.4 Stop
Click this button to stop your machine(s). By default, Stop will send an ACPI shutdown
command to the selected machines. If these machines do not support ACPI or a clean shutdown
is not desired then the submenu may be used to select a
Kill
option instead.
7.3.2.5 Delete
Click this button if your want to delete your machine(s).
Hover over your Container tab to see the drop-down list of options for used for manipulating
the entire container.
7.3.3 Container Settings
Clicking the
Settings button under your View tab will take you to the topology settings dialog
box which is discussed later in
Section 8.4
titled Topology Settings".
Cypherpath, Inc. 38
7.3.4 Container Batch Creator
Clicking the
Batch Creator button under your
View tab will take you to the Batch Creator dialog
box which allows you to create several topology resources at once and is discussed later in
Section 8.3titled Batch Creator.
7.4 Toolbox
The Toolbox button allows you to add new components to your container topology, giving you
the ability to design your IT infrastructure. Click the
Toolbox tab and you will be presented with
a list of component headers to the left of your browser. Your Toolbox has a toggle button
which slides out for quicker access from the left side of your browser.
Within the topology menu fly-out, there will be several headers listing multiple disk image roles.
The Networks and Managed Devices headers have Cypherpath-based components that cannot
be added to or deleted from. VNC connections to Managed Devices are disabled since
interaction with these components is fully controlled by the platform. If features are required
that are beyond the scope available to these managed devices, then you will need to upload an
appropriate machine image with the functionality you require.
Cypherpath, Inc. 39
Workstations, Databases, Firewalls, Servers, Storage Devices, and Routers list the master
images that have been assigned that particular role in storage. The CD-ROMs area stores ISO
master images automatically when uploaded to your disk image storage. Roles have no effect on
the functionality of an image but are instead intended for user organization. Roles may affect
the way the canvas presents the image within the container topology.
If there are any master images shared with you by other users they will be shown below your
owned master images with a header titled Shared. Otherwise this shared header will not be
shown. You will use these different designer components in the toolbox to design IT
infrastructure. If there are no master images assigned to that header role in your storage you
will see No images are currently available".
When a machine is created using a specific master image as a base, a clone of that master image
is created and attached to the new machine as a hard drive. All changes made on the virtual
machine are saved to the clone if persistence is enabled, causing it to slowly diverge from the
master image. The divergence can be saved back to the master image or a new master image can
be created that includes the delta.
7.5.1 Workstation
This is a good option if you are not sure what role a particular disk image will be used for. For
example, on a workstation you can use a version of Linux or Microsoft Windows.
7.5.2 Database
Signifies a database server and the icon appears as a database server.
7.5.3 Firewall
A network security system that will control inbound and outbound traffic. For example, in the
firewall role you can use OpenWRT, pfSense, or commercial software.
7.5.4 Server
A system that will provide services to other systems. For example, on a server you could run
Apache on Linux to serve web pages or Windows Server and run IIS.
7.5.6 Router
A networking routing device.
Cypherpath, Inc. 40
7.5.7 CD-ROMs
An ISO image representing a CD-ROM or DVD-ROM.
Clicking this button will open up your Topology Tree navigation list that will show all of
your connected/unconnected components. If a machine has no interface connections, you will
see this icon next to the name. Only machines can be in a "Staged/unconnected" state. You
can drag connected and unconnected components onto your topology. If there is no icon next to
the name of your component this indicates it is already connected on your topology and when
you click and drag it will add to your interface count. When you click on any connected
component in your Topology Tree navigation list, the component will be selected and focused
on the center of the page.
7.7 Properties
Clicking this button will give you a fly-out menu from the right-hand side of your browser
which is discussed later in
Section 8.5titled Properties.
7.8 History
Clicking this button will show you a history timeline of activity regarding your container,
such as when your machines/networks were created, modified, and deleted, and by whom.
Cypherpath, Inc. 41
7.9 Start/Stop Button
The
Start and
Stop
buttons allow you to start and stop your container from within the topology
view. To start your container click the blue
Start
button located in the Topology menu.
Once you have clicked the blue Start button you will see in the notification panel at the top of
your browser that the system has initiated startup of your container and your machines will turn
green indicating they are powered on. Your blue Start button will now be your Stop button for
your container. Your machines will communicate over the networks they are attached to based
on their network design.
When a container is stopped, all machines inside of that container are stopped before the
container itself shuts down. Non-persistent machines are sent a hard power off (equivalent to
pulling the plug of a physical machine), while persistent machines are sent an ACPI shutdown
(equivalent to pushing the power button on a modern physical machine). If persistent machines
do not respond to ACPI events, they must be powered off by hand, either by connecting to the
machines console and shutting it down or by sending a hard power off command. While the
container is waiting for machines to shut down, it resends the ACPI shutdown command every
hour, in an attempt to ensure that the container stops. However, this will have no effect on
machines which do not support ACPI, so the manual intervention may still be required in some
cases.
Before a container shutdown commences, you will be warned as to the consequences of the
action. If all machines are persistent, the following message box appears; click
Yes to complete
the shutdown, or Noto abort it.
Cypherpath, Inc. 42
If your container is running in a mixed persistence mode then you will get the following message
box:
Once your machines shut down, they will no longer be green indicating they have powered
down. You also have the option to force a shutdown of a machine when a graceful shutdown is
not needed. To do this, you will need to individually select and click the Stop button in the
topology menu under the Edit tab in the machine state controls. If you have many machines you
can also choose the
Select All button under the
Edit tab in the topology menu then use the Stop
button in the machine state controls.
8 Designing a Topology
Cypherpath, Inc. 43
8.1 Networks
Cypherpath, Inc. 44
you will see a pop-up dialog box asking for confirmation. Click
Yes to delete your network or
No
to abort.
Optionally, you may upload your own router images and set the machines role property to
Router. Your uploaded router images are not managed by VCP so you are responsible for
properly configuring the image in accordance with your routing goals. VNC access to such an
image is not restricted. Once the images role is changed to Router it will appear under the
Router header within the toolbox of your topology menu. You may leverage the built-in DHCP
networking feature for address auto-configuration, or this feature may be disabled if manual IP
address configuration is preferred.
Cypherpath, Inc. 45
Note:
If a route is added to a running network, machines on that network can not directly be informed of
the new route since routes are acquired only when the network is brought up in the machine, which
typically happens at boot. Most operating systems will reacquire a network address and lease if their cable
is unplugged, which can be simulated by using the "Replug" command described in Section 8.5 titled
Properties". Alternatively you can connect to each machine over VNC and renew the IP if replugging
doesnt work, or as a last resort, reboot the machine.
8.2 Machines
Click and drag an unconnected machine from your list in the topology tree onto
your network.
Cypherpath, Inc. 46
Add an interface via the machine's properties button that is covered in
Section
8.5
titled Properties".
Cypherpath, Inc. 47
network(s). Everything you enter in the Template Overrides section of the Batch Creator is
applied to all machines created in the
Batch Creator only and will not affect other machines on
your topology. The Batch Creator allows anywhere from 1 to 100 machines to be created at one
time. After creation, each machine can be tailored individually as necessary. Machines created in
the
Batch Creator will be named based on the template name you enter followed by an
incremented number.
8.3.1 Name
The Name textbox is where you will enter the name to be applied to all the machines about to be
created. Each machine name will be followed by an incrementing number.
8.3.3 Images
In your Images list you will see your Available Disks. This is where you will find your list of
master images that are available. To choose a disk, click on it and it will appear over in the
Selected Disks area. To remove a disk from the Selected Disks area, click it and it will be put
back in your Available Disks list.
8.3.4 Networks
In your Networks list you will see your Available Networks. To choose a network, click on it and
it will appear over in the Selected Networks area. To remove a selected network click it and it
will be removed.
Cypherpath, Inc. 48
8.3.5 RAM
Amount of RAM, in megabytes, each machine will have.
8.3.6 Number of CPUs
Number of CPUs each machine will have.
Click the drop-downs for Disk Bus, NIC Type, Video Card, and CPU Type to see more options.
Click the
Settings
button located under the
Container
drop down tab in your topology menu to
open up the settings dialog box. Once you click the
Settings button you will see your Topology
Settings slide-down menu in the middle of your screen. There are four main sections: General
Settings, Automatic Layout Settings, Container Checkpoints, and Port Forwarders.
Cypherpath, Inc. 49
8.4.1.1 Current Persistent Status
Your current persistent status indicates whether some, all, or none of the machines in the
topology are set to persist.
If you click
Global On, your machines within the topology will be set to persist and the current
persistent status will change to "All.
If you click
Global Off
then all machines within the topology will be set to not persist and you
will see this message box. Click
YES
and the current persistent status will change to "None.
If some machines in the topology are set to persist and some are not, then the current
persistent status will be Mixed.
8.4.1.3.1 None
Routers will be created without any routing protocols configured.
Cypherpath, Inc. 50
8.4.1.3.2 RIP
Routing Information Protocol
8.4.1.3.3 OSPF
Open Shortest Path First
8.4.1.3.4 RIPng
Routing Information Protocol Next Generation
8.4.1.3.5 OSPF6
Open Shortest Path First version 3
Cypherpath, Inc. 51
8.4.1.7 Start machines at container start
Select this option to start all machines when the container is started. Otherwise, the container
will start without starting any machines, allowing you to selectively start machines.
Note:
If you set persistence on for a machine, then take a snapshot of that machine, the snapshot will save
across restarts of the container. It will also be exported along with the rest of the topology if you export the
container. By using the persistence controls and container checkpoints, you can do this for the entire
container.
Cypherpath, Inc. 52
8.4.2.1 Component Spacing
Component spacing allows you to specify the radius spacing for each component type such as
machines and networks. Be sure the value entered is less than or equal to 3000.
Note:
As the checkpoint completes, the counter on that checkpoint within the Load and Delete Checkpoint
drop-downs will increment until completed.
Cypherpath, Inc. 53
8.4.4 Port Forward
Click the Ports tab and you will be presented with a list of your port forwarders. Each forwarder
will list the machine that it forwards to, the network that the traffic will be forwarded across,
and the port on that machine that is forwarded to. The "forwarder" is the port on the web server
that forwards traffic to the designated port on the designated machine.
When editing a particular machine, you can also forward a single port on that machine
temporarily. This is covered in
Section 8.5
titled Properties.
If your VCP Web server is at 10.10.1.1 and the Forwarder port is 37600, then your device must
be able to reach this IP address and port in order for this feature to function. (e.g.,
http://10.10.1.1:37600)
Cypherpath, Inc. 54
8.5 Component Properties
After you have clicked on a component in your topology view you can click the Properties
tab located to the right of your browser. After clicking this button, you will be presented with a
list of options you can modify for the selected component.
Cypherpath, Inc. 55
8.5.1.1 Machine Tab
The machine's properties provide you with several tools that allow you to control the running
state of a machine. With these, you can start, stop, suspend, and resume a machine. Depending
on the machine's current state, only some of these buttons will be active.
8.5.1.1.1 Power On
Click this button to turn on your machine.
8.5.1.1.4 Resume
Click this button to resume your machine from a suspended state.
8.5.1.1.5 Suspend
Click this button to suspend your machine. This pauses the machine's running state without shutting it
down. Once resumed, the machine will continue.
Note:
A machine that is suspended is still shut down completely when the container is stopped and
will not retain its condition when restarted but will instead reboot.
8.5.1.1.6 Connect
When a topology is running you can access the machines' desktops or consoles. To access a machine's
desktop, open the properties of that machine. In the machine tab click the
Connect button which will
connect you to the machine's console/desktop. Shortcut: If the machine is green on the topology, then
double-click on it to show the console/desktop.
Note:
The
Connect
button will not be active unless the machine is running.
Cypherpath, Inc. 56
8.5.1.1.8 Description
Optional description of what the machine is for, or any other short note about the machine youd like
to keep.
8.5.1.1.10 RAM
The amount of RAM in megabytes that will be allocated to the machine. The default value for this is
set, when you create the machine, by the boot disk for the machine.
The following properties define the order of booting, persistence, and role.
8.5.1.1.12 Role
The role allows you to select your component to be labeled as a workstation, database, firewall, server,
Storage Device or router. These work as a machine template whose purpose is only for organization
within the topology. Assigning these roles to the uploaded image will display an icon specific to that
role when designing your container topology.
Note:
It is possible to have all machines set as workstations, regardless of actual machine usage.
The machine role is usually for organizational/informational and display purposes only. In the case
of routers the role will enable its interfaces to be selected as default gateways for connected
networks.
This will route all traffic through this port to the appropriate machine inside the container. Upon
successful port-forward creation, a message will appear indicating which port is now being forwarded
Cypherpath, Inc. 57
to the machine. This text box and button will not be active unless the container is running, and this
setting will only last until the container is shut down. If the machine has multiple network interfaces,
only the first will be used to forward.
Note:
If you would like port forwarding to persist between container restarts, then use the port
forwarding settings by clicking the
Container
button in your topology menu, then Settings, then
Ports
.
Note:
Forwarded ports established from Machine Properties will timeout after 24 hours of receiving no
traffic.
Cypherpath, Inc. 58
8.5.1.2.1 Add New Drive
Click the Add New Drive button and you will be presented with two drop-down boxes. Image allows
you to select your disk image from the drop-down list, which is populated by the master disk images
available in your disk image storage. Your second drop-down box is where you can select the
Bus
that
you would like to use for the disk image and then click the
Add
button.
IDE: This is an older disk bus that is no longer used, but has the most widespread operating system
support. Almost all operating systems will support IDE. Machines are limited to 4 IDE drives.
Serial ATA: The intended replacement for IDE, Serial ATA is faster than IDE and allows more
devices to be connected. Most new operating systems will support Serial ATA.
SCSI: SCSI is an older, largely superseded standard that was mainly used in servers. The model of
SCSI card virtualized is an LSI 53C895A, and operating systems may require special drivers to
support it.
USB: USB is typically used to attach external hard drives to a system. USB can be used to simulate
having a thumb drive or external drive and is widely supported. USB may be useful in order to
allow older operating system to get beyond the 4-drive limit imposed by IDE.
Virtio block: This is a specialized bus type that takes advantage of the fact that a virtual machine is
running to improve performance. It requires specialized drivers which are available natively under
Linux and FreeBSD.
Virtio SCSI: This is the successor to Virtio block, improving upon it. Only very recent Linux and
FreeBSD versions currently support Virtio SCSI.
Cypherpath, Inc. 59
8.5.1.2.4 Disk Actions
Save to Master: If you have made changes to a disk image by starting up the machine and making
alterations, you can save those changes to the master image so that all new machines using that
master image will make use of the changed image. To do this, you must either have the container
running and the machine stopped or you must have persistence checked on the machine and the
container stopped. You must also have booted the machine at least once. This option will not be
available on drives that use an image shared with you as their master image.
Once you have met these preconditions, you can save the changes by opening up the image to edit
and clicking the
Save to Master button. You will be presented with a message dialog box informing
you that this action will affect all other machines that use your master disk for your machine. Click
Yes
to continue saving your changes.
Note:
Any non-persistent machines that use the same master disk image will show the
changed disk image on their next boot. Persistent machines will continue to make use of the old
master image. In order for persistent machines to use the new master image, they must have
persistence turned off and the machine or container stopped and started again. Persistence
can then be turned back on.
8.5.1.2.6 CD-ROMs
Every new machine (created with the topology toolbox or the machine wizard) includes a CD Drive. If
the image used to create the machine is a CD-ROM, then the CD-ROM is inserted into that CD Drive.
If it is a regular image, then the CD Drive is left empty.
Cypherpath, Inc. 60
Click the Properties button located to the right of your browser then click
Advanced. Next to Boot
Device you will have a drop-down which allows you to choose the boot priority. If you select CD-ROM,
it will try to boot from the CD-ROM first, then from the Hard Disk. The reverse order is true if you
select Hard Drive.
1. Navigate to the Storage tab, go to disk images, and click Add Disk Images.
2. Upload Disk under Create Mode is selected by default.
3. Give the ISO a name and browse for the ISO that you would like to install.
4. Click the Upload button to the right of your disk name. You will see your disk upload status.
Once it completes move onto the next step.
5. Select Create Disk under Create Mode. You need a new disk for the ISO to install its operating
system on in the machine.
6. Set the name (optional description) and Default Disk Settings for the new disk image that the
ISO will be installed onto.
7. Set a disk size that you want the machine to have and click the Createbutton.
8. Click the X button to close the window then click Leave Page button in the message box that
pops up and your disk will appear in your disk image list.
9. Create a new container (unless there is already one made).
10. Double-click the container name or single click the container name and click the View button
from the Container Actions panel.
11. Click the Toolbox button and click on a network and drag it to your topology.
12. Click and drag your newly created disk that now appears in the toolbox and drop it onto the
network.
13. Select the disk you just added to the network and click the Properties button to the right of
your browser.
14. Click Drives and then click the drive labeled <Ejected CD-ROM>.
15. Next to the Image label, click the drop-down bar and select the ISO that you first uploaded.
16. Click the Save button.
17. Start the container by clicking the blue Start
button in the topology menu.
18. Double-click the machine to continue the installation in the VM as you would with a physical
computer.
19. Once installation is complete you can power off the machine and select the disk image in the
machine's Properties . You can then click Save to Master button which will save the
installation to your master image.
At this point, the new master image may be dragged onto the topology and cloned as the basis for new
machines.
Cypherpath, Inc. 61
8.5.1.3 Interfaces
Here you will see a list of all the machine's interfaces. An interface is a network card that
is attached to networks in your container. You can add and remove the machine's
interfaces.
Your interface options can also be edited by clicking on the interface currently assigned
to your machine. These options include IP Address, MAC Address, Network connected,
NIC Type, and the machines hostname.
Cypherpath, Inc. 62
8.5.1.3.3 IP Address
An Internet Protocol address is a numerical label assigned to each device participating in a computer
network that uses the Internet Protocol for communication.
8.5.1.3.6 Network
A telecommunications network that allows computers
to exchange
data. This value will reference a
network located within the same topology.
Intel E1000 Gigabit - Intel's E1000 device is supported by most modern operating systems.
Windows XP does not include native support for E1000, however, so a different NIC should be
chosen for that operating system; AMD Pcnet32 is recommended.
AMD Pcnet32 - As with the RTL-8029, this is an older card with support in many older operating
systems. This card should be used with Windows XP.
Cypherpath, Inc. 63
Linux Virtio - This is a card that attains high performance due to the fact that it has knowledge of
being inside a virtualized container. It is supported in newer versions of Linux and FreeBSD.
8.5.1.4 Advanced
Under the advanced tab, you will have an additional set of tools that you can use to modify your
machine.
Cypherpath, Inc. 64
address of the machines it is probing, machines must be attached to non-physical networks that have
DHCP enabled.
VCP ensures that all machines at each boot order level are running and responding to service probes
before starting machines at the next boot order level. Machines can have multiple probes of multiple
types. In addition, each probe has a timeout value associated with it. If the probe does not receive a
response before the timeout is reached, it will give up and consider that probe to have been successful.
As soon as a probe succeeds (i.e., once it has determined that the specified service is up), it stops
probing.
For example, if a web server should be running before any other machines can be brought up, it should
be set to boot order 1 and a be given a TCP service probe on port 80.
Note: Because probing involves making a connection to the target machine, probes may appear in
service logs or traffic analysis tools, and will be unsuccessful if they are blocked by a firewall.
Probes will come from the IP address associated with the DHCP server provided by the network.
Cypherpath, Inc. 65
8.5.1.4.5 Add New UDP:
Similar to TCP probes, UDP probes check whether specific UDP services are running. Unlike TCP,
arbitrary ports cannot be scanned due to the nature of UDP. Instead, specific service types can be
scanned for, and the UDP probe will consider the service up and running if it receives a reply to its
probe.
Cypherpath, Inc. 66
8.5.1.4.7 Machine Snapshots
A machine snapshot is the capture of a running machines RAM and hard drives current state. This
allows you to load a snapshot to the machines previous state. A snapshot can only be made when a
machine is running.
8.5.1.4.8 Tag
The Tag is used to label the snapshot taken of the machine.
Cypherpath, Inc. 67
The following options are not available for Managed Storage and Router devices:
The NFS share is exported at /mnt/export on the Managed Storage device. For example, if a
Managed Storage instance has an IP address of 10.1.0.1, a typical Linux command to mount the
NFS share would look as follows:
The SMB share may show up automatically in the network sharing area in Windows with the
name Managed-Storage. If it does not, you can directly connect to it by specifying the folder
Cypherpath, Inc. 68
path as either \\Managed-Storage\storage or \\10.1.0.1\storage. Any file type can be uploaded
into the Managed Storage.
Note:
File ownership and permissions cannot be set on files in Managed Storage devices. All files will be
created with user 0 and group 0, and will be set to mode 644 (rw-r--r--) for files, or 755 (rwxr-xr-x) for
directories.
You can make changes to the general properties of the network until it is configured properly
for your needs. Once you have made your modifications you will need to click the blue Save
button at the bottom to save your changes.
8.5.3.1.1 Name
The name of the network is auto generated until specified by you. This allows rapid creation of
multiple components in the topology toolbox.
8.5.3.1.2 Description
Optional description field for you to use to describe what the network is for.
8.5.3.1.3 Mode
Cypherpath, Inc. 69
The network mode determines if the network will behave as a switch or a hub. Switches directly pass
traffic between machines, while hubs broadcast traffic to all machines, forcing uninterested machines
to consider and drop irrelevant traffic. The switched mode should be used unless there are specific
requirements for the network.
8.5.3.1.4 Physical
Allows you to add the switch to a physical connection if the admin has provided you with that
permission. If you do not have permission you will only see the entry that says Do not attach. This is
equivalent to plugging a physical switch into this network. Any virtual machines attached to this
switch will have link-layer access to this network. This software switch acts similarly to a physical
switch, but does not currently support BPDU sharing and will not participate in Spanning Tree
Protocol if it is enabled on the physical network.
8.5.3.1.5 Tools
Under the tools header, a network replug can be requested. This causes all machines on the network
to have their cables unplugged for the specified amount of time, then plugged back in. Replugging a
container is a simulation of unplugging the network cable.
In many operating systems, this has the effect of forcing a re-acquisition of network properties, such
as IP address and routes. To request a replug, select the number of seconds (default is 15 seconds) to
unplug the network and then click on Replug. All machines on the network will be unplugged
immediately and then replugged after the specified amount of time.
Note: Different operating systems react differently to a cable replug. Some operating systems do
not consider a cable to have been replugged if it is plugged back in too quickly. The default value of
15 seconds should be safe for the majority of operating systems which support cable replugs.
Cypherpath, Inc. 70
8.5.3.2 IPv4 Tab
8.5.3.2.3 IP Address
The IP address of the network combined with the netmask provides the IP space of the network. The
provided IP address is also used to serve DHCP requests if DHCP is enabled.
8.5.3.2.4 Netmask
Combined with the IP address this provides the extent of the IP space. Machines added must fall in
this spacing.
Cypherpath, Inc. 71
8.5.3.2.6 Default Gateway Selector
The default gateway selector is populated with known router interfaces which are directly connected
to the selected network. You may select the desired router interface which will automatically populate
the Default Gateway field or you may manually enter an IP address into it. If you enter an IP address
that is not recognized as a router gateway, then the Default Gateway Selector will tag the IP address
as Unknown which indicates that you are managing this gateway and must ensure that the network
is properly configured in order for routing to behave as expected.
8.5.3.3.1 SLAAC
This setting allows VCP to utilize Stateless Address Autoconfiguration. Guests attached to the
network with a valid IPv6 address configured, and a default IPv6 gateway configured which points to a
VCP router on the same network will have their attached network interfaces automatically configured
with a valid IPv6 address which resides on the same network prefix as the networks IPv6 address.
Guest operating systems must have IPv6 support as well as support for SLAAC. Disabling this feature
disables managed IPv6 support in VCP, which leaves you the flexibility to manage IPv6 features
yourself.
Cypherpath, Inc. 72
configured for IPv6 will generally use this router as their IPv6 default gateway. This setting is only
available and valid if a VCP router is present on the network. Enabling SLAAC will cause the IPv6 VCP
gateway router to immediately advertise the IPv6 prefix which will cause guests supporting SLAAC to
configure their interface with an IPv6 address immediately. Disabling SLAAC may not immediately
disable IPv6 on the network due to guest OS configuration. Similarly, changing the IPv6 Default
Gateway may not immediately cause a guest to reconfigure their routing tables. It is suggested that
you use theReplug" command as described below.
Many operating systems will not reacquire network settings if the cable is unplugged for a short
period of time. A value of 15-30 seconds should be sufficient.
Warning:
When you attach a network to a physical connection, all machines attached to that
network are placed directly onto the physical connection. This is similar to attaching each of those
machines directly to the physical switch used by that particular network connection. In this case,
VCP will not provide any DHCP services to any of the interfaces that those machines have on that
network. You will need to either set their addresses statically within each operating system or
configure a DHCP server on your physical network to service them. This DHCP server may also be
a VM which you have configured within VCP. Additionally, port forwarding to machines via a
network that is attached to physical is disabled. This is because those machines are actually directly
on that network, so connections can be made directly to desired ports.
To access your router controls, click on your router in your topology then click the Properties
button located to the right of your browser. Under the Machine tab, you will be able to edit the
name of your router and provide a brief description. You can also change the number of CPUs
and RAM.
Cypherpath, Inc. 73
8.5.3.5 Deleting Routes
To delete a route click on the Properties tab then click on the interfaces tab. You will see a list of
all current routes. Click the white X on the routes you wish to delete.
8.5.3.6 Advanced
Under the Advanced tab, you will see a button labeled Manage Routing. Click the Manage
Routing button to open up the Routing Editor dialog box. The two main headers are Protocol
Redistribute Settings and Interface Protocol Settings.
Cypherpath, Inc. 74
8.5.3.7 Protocol Redistribute Settings
Generally, routing table distribution protocols will only advertise routes discovered via the
same protocol. Routes learned via OSPF will be shared with other routers running the OSPF
protocol, and similarly for each other protocol. The redistribute options tell the router to merge
routing table entries into advertisement which were learned by other means.
Under the OSPF redistribute setting if RIP is selected, then all routing table entries discovered
by RIP on this router will also be advertised by outgoing OSPF advertisements; similarly for
RIPng and OSPF6.
The Kernel option tells the router to bundle ALL routing table entries that the router knows
about into the selected protocol advertisements, regardless of how the router learned about the
routing entries. This includes directly connected networks.
The Connected options tell the router to bundle routes to directly connected interfaces into the
appropriate routing protocol advertisements. Routes to directly connected networks are
Cypherpath, Inc. 75
automatically entered into the router's routing table, but not automatically advertised to
neighboring routers.
Keychain:
Selects a routers globally configured RIP keychain for authentication. A valid
Auth
Modemust be selected along with this option.
Stub: Configures this area to be an OSPF stub so that only type-3 LSAs are passed into the area.
Type-4 and type-5s LSAs will not be passed into such areas.
ABR:
Tells this interface to summarize intra-area routes into one type-3 summary-LSA when
announcing routes to other areas. Summarizing type-1, type-2, and type-5 LSAs is supported.
Type-7 is not supported.
Auth ID: Sets the authentication ID used for authenticating OSPF routing tables between
neighboring routers. A valid
Auth Text
must be configured along with this option.
Cypherpath, Inc. 76
Auth Text:
Sets the authentication text used for authentication OSPF routing tables between
neighboring routers. A valid
Auth ID
must be configured along with this option.
Once a router interface has been configured as an internal private network it cannot be selected as an
external NAT interface. NAT is only available to platform routers which have two network interfaces.
It is suggested that these interfaces not be configured for handling routing protocols such as RIP,
OSPF, etc since NAT router will likely filter such traffic.
NAT Internal:
Used to set the router to internal private network setting.
IPv4:
Enables IPv4 NAT, turning this router interface into an internal private network.
WARNING: By leaving IPv6 deselected, IPv6 packets will be routed according to other IPv6
network settings.
IPv6:
Enables IPv6 NAT, turning this router interface into an internal private network.
WARNING: By leaving IPv4 deselected, IPv4 packets will be routed according to other IPv4
network settings.
External Network: The externally facing end of the NAT pair. Interfaces that are part of an
internal NAT pair cannot be selected. If ports are forwarded into the internal network then
outside guests must use this interfaces IPv4 or IPv6 address as the destination in order to
establish a connection. In order for traffic to be routed beyond the external network, you will need
to ensure that a valid gateway is set in this routers default gateway settings.
Cypherpath, Inc. 77
but be ignored until the IPv6 option is enabled. Note that in order to cross the router boundary
from the external network, packets will need to be destined to the external facing router
interface.
Protocol:
TCP or UDP may be selected for this port forwarding configuration.
Destination or Source:
You may choose to forward based on the source or destination port value.
Forwarding via the destination port is the most common configuration.
Original Port:
The incoming port number to be forwarded.
New Port: The outgoing (to the internal network) port value. This value may be the same as the
Original Port
number, but may be different if you intend to remap port numbers.
Cypherpath, Inc. 78
9 Profile
Your user profile can be accessed by clicking your username in the top right corner of your
browser. Once clicked you will be presented with a Profile Settings dialog box.
Note:
Display Name & Email Address can only be changed by your administrator.
Cypherpath, Inc. 79
10 Notifications
The Notifications icon is located at the top right corner of your browser. If any new notifications
are added, a notification preview will tick down from the top and display information on the
navigation bar. After a short period of time, it will tick down into the Notifications panel. To view
your notifications, click the Notification icon. The Notification icon will inform you if you have
encountered an error, initiated an action, or currently have an action pending.
Once you have viewed the notifications, the number in the Notification icon will reset to zero
but your notifications will still be available for you to view. To clear the list of notifications click
the white
X
next to the notification shield. To close the panel click on the Notification icon.
The Notification panel messages are denoted by color when hovered over. Red indicates an
error has occurred. Green indicates an action is occurring or has successfully completed. Blue
indicates a general information message.
11 Support
If you need further assistance, please contact your system administrator.
Cypherpath, Inc. 80