Tip
This is the documentation for the 20.02 version. Looking for the documentation of the latest version? Have a look here.
Zero-to-Ping¶
This document is a crash course in getting TNSR up and running quickly after installation. The topics included here are covered in more detail throughout the remainder of the documentation.
Each section contains a list of additional related resources with more detail in a See Also box. Follow these links for more information on each topic.
First Login¶
When TNSR boots, it will present a login prompt on the console (video and
serial). Login at this prompt using either the default tnsr
account or an
administrator account created during the installation process.
Note
For installations from ISO and for hardware shipped with TNSR
preinstalled, the default password for the tnsr
user is tnsr-default
.
For cloud-based installs such as AWS and Azure, by default the tnsr
account can only login with key-based ssh authentication. See
Default Accounts and Passwords for more information.
The tnsr
user automatically enters the TNSR CLI when used to login
interactively. Manually created administrative users do not have this behavior,
and using them to login interactively will result in a login shell.
Alternately, if the host OS management interface was configured in the installer, login using an SSH client connecting to that interface.
Changing the Password¶
The password for administrator accounts was set during the installation process,
but the default tnsr
account should have its password reset before making
other changes.
Login to the tnsr
account with the default tnsr-default
password and
change it using the shell passwd
command from the TNSR CLI:
tnsr# shell passwd
Changing password for user tnsr.
Changing password for tnsr.
(current) UNIX password:
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
tnsr#
Alternately, login in as an administrator and change the password for the
default tnsr
account using sudo
:
tnsr# shell sudo passwd tnsr
Changing password for user tnsr.
New password:
Retype new password:
passwd: all authentication tokens updated successfully.
tnsr#
Note
These examples use the TNSR prompt and shell
command. The same
commands may be used without the shell
prefix from a non-TNSR shell
prompt.
Warning
Use a strong password for this account as it will be able to make changes to the TNSR configuration, unless restricted by a custom NACM configuration.
Interface Configuration¶
There are two types of interfaces on a TNSR system: Host OS interfaces for managing the device and dataplane interfaces which are available for use by TNSR.
Host OS Management Interface¶
A host management interface may be configured manually in the installer or later in TNSR or in CentOS. See Installation for the full procedure to configure a host OS management interface during installation, and Host Interfaces for information on configuring host OS interfaces from within TNSR.
At a minimum, the host OS interface must have an IP address, subnet mask, and a
default gateway configured. The default gateway is necessary so that the host OS
may retrieve updates as that traffic does not flow through TNSR, but over the
management interface. Additionally, other host traffic may flow through the
management interface, such as the ping
command from within the TNSR CLI.
If an interface was not configured for management in the installer, it will need to be manually changed back to host OS control and then configured for network access. See Remove TNSR NIC for Host Use for instructions on how to return an interface from TNSR back to host OS control so it can be used for management. This procedure will require rebooting the TNSR device.
Consult CentOS 7.7 documentation for the specifics of network configuration for other environments.
Warning
Once the Host OS is capable of reaching the Internet, check for updates (Updating TNSR) before proceeding. This ensures the security and integrity of the router before TNSR interfaces are exposed to the Internet.
Dataplane Interfaces¶
Interfaces not configured for host OS management control in the installer will be setup in such a way that they are available for use by the dataplane and thus TNSR.
Enter the TNSR CLI (Entering the TNSR CLI) and configure the network interfaces:
tnsr# configure
tnsr(config)# dataplane dpdk dev ?
0000:00:14.0 Ethernet controller: Intel Corporation Ethernet
Connection I354 (rev 03)
0000:00:14.1 Ethernet controller: Intel Corporation Ethernet
Connection I354 (rev 03)
0000:00:14.2 Ethernet controller: Intel Corporation Ethernet
Connection I354 (rev 03)
0000:00:14.3 Ethernet controller: Intel Corporation Ethernet
Connection I354 (rev 03)
0000:03:00.0 Ethernet controller: Intel Corporation I211 Gigabit
Network Connection (rev 03)
0000:04:00.0 Ethernet controller: Intel Corporation I211 Gigabit
Network Connection (rev 03) ( Active Interface enp4s0 )
tnsr(config)# dataplane dpdk dev 0000:00:14.1 network
tnsr(config)# dataplane dpdk dev 0000:00:14.2 network
tnsr(config)# service dataplane restart
tnsr(config)# exit
See also
TNSR Interfaces¶
Next, the interfaces inside TNSR must be configured with addresses and routing.
WAN DHCP Client¶
In this example, WAN will be set as a DHCP client and configured as the
outside
NAT interface:
tnsr# configure terminal
tnsr(config)# interface GigabitEthernet0/14/1
tnsr(config-interface)# description Internet
tnsr(config-interface)# dhcp client ipv4
tnsr(config-interface)# enable
tnsr(config-interface)# ip nat outside
tnsr(config-interface)# exit
tnsr(config)# exit
See also
LAN Interface¶
Next, configure an address for the internal network and set it as the inside
NAT interface:
tnsr(config)# interface GigabitEthernet0/14/2
tnsr(config-interface)# ip address 172.16.1.1/24
tnsr(config-interface)# description Local
tnsr(config-interface)# ip nat inside
tnsr(config-interface)# enable
tnsr(config-interface)# exit
See also
NAT¶
Configure TNSR to use the WAN interface address for NAT, and enable NAT forwarding:
tnsr(config)# nat pool interface GigabitEthernet0/14/1
tnsr(config)# nat global-options nat44 forwarding true
DHCP Server¶
Setup a basic DHCP server on the LAN side to hand out addresses, also instruct clients to use TNSR as their gateway and DNS server.
tnsr(config)# dhcp4 server
tnsr(config-kea-dhcp4)# description LAN DHCP Server
tnsr(config-kea-dhcp4)# interface listen GigabitEthernet0/14/2
tnsr(config-kea-dhcp4)# subnet 172.16.1.0/24
tnsr(config-kea-subnet4)# pool 172.16.1.100-172.16.1.245
tnsr(config-kea-subnet4-pool)# exit
tnsr(config-kea-subnet4)# interface GigabitEthernet0/14/2
tnsr(config-kea-subnet4)# option domain-name-servers
tnsr(config-kea-subnet4-opt)# data 172.16.1.1
tnsr(config-kea-subnet4-opt)# exit
tnsr(config-kea-subnet4)# option routers
tnsr(config-kea-subnet4-opt)# data 172.16.1.1
tnsr(config-kea-subnet4-opt)# exit
tnsr(config-kea-subnet4)# exit
tnsr(config-kea-dhcp4)# exit
tnsr(config)# dhcp4 enable
See also
DNS Server¶
Configure TNSR to act as a DNS server for local clients, using upstream
forwarding DNS servers of 8.8.8.8
and 8.8.4.4
:
tnsr# configure
tnsr(config)# unbound server
tnsr(config-unbound)# interface 127.0.0.1
tnsr(config-unbound)# interface 172.16.1.1
tnsr(config-unbound)# access-control 172.16.1.0/24 allow
tnsr(config-unbound)# forward-zone .
tnsr(config-unbound-fwd-zone)# nameserver address 8.8.8.8
tnsr(config-unbound-fwd-zone)# nameserver address 8.8.4.4
tnsr(config-unbound-fwd-zone)# exit
tnsr(config-unbound)# exit
tnsr(config)# unbound enable
See also
Ping¶
From the Host¶
The TNSR CLI includes a ping
utility which will send an ICMP echo request
out.
tnsr# ping 203.0.113.1
PING 203.0.113.1 (203.0.113.1) 56(84) bytes of data.
64 bytes from 203.0.113.1: icmp_seq=1 ttl=64 time=0.680 ms
64 bytes from 203.0.113.1: icmp_seq=2 ttl=64 time=0.176 ms
64 bytes from 203.0.113.1: icmp_seq=3 ttl=64 time=0.505 ms
64 bytes from 203.0.113.1: icmp_seq=4 ttl=64 time=0.453 ms
64 bytes from 203.0.113.1: icmp_seq=5 ttl=64 time=0.420 ms
64 bytes from 203.0.113.1: icmp_seq=6 ttl=64 time=0.144 ms
64 bytes from 203.0.113.1: icmp_seq=7 ttl=64 time=0.428 ms
64 bytes from 203.0.113.1: icmp_seq=8 ttl=64 time=0.494 ms
64 bytes from 203.0.113.1: icmp_seq=9 ttl=64 time=0.163 ms
64 bytes from 203.0.113.1: icmp_seq=10 ttl=64 time=0.346 ms
--- 203.0.113.1 ping statistics ---
10 packets transmitted, 10 received, 0% packet loss, time 9000ms
rtt min/avg/max/mdev = 0.144/0.380/0.680/0.167 ms
tnsr#
By default this will follow the host OS routing table, but by specifying a
source
address, it will use addresses from TNSR:
tnsr# ping 203.0.113.1 source 203.0.113.2
PING 203.0.113.1 (203.0.113.1) from 203.0.113.2 : 56(84) bytes of data.
64 bytes from 203.0.113.1: icmp_seq=1 ttl=64 time=0.700 ms
64 bytes from 203.0.113.1: icmp_seq=2 ttl=64 time=0.353 ms
64 bytes from 203.0.113.1: icmp_seq=3 ttl=64 time=0.590 ms
64 bytes from 203.0.113.1: icmp_seq=4 ttl=64 time=0.261 ms
64 bytes from 203.0.113.1: icmp_seq=5 ttl=64 time=0.395 ms
64 bytes from 203.0.113.1: icmp_seq=6 ttl=64 time=0.598 ms
64 bytes from 203.0.113.1: icmp_seq=7 ttl=64 time=0.490 ms
64 bytes from 203.0.113.1: icmp_seq=8 ttl=64 time=0.790 ms
64 bytes from 203.0.113.1: icmp_seq=9 ttl=64 time=0.155 ms
64 bytes from 203.0.113.1: icmp_seq=10 ttl=64 time=0.430 ms
--- 203.0.113.1 ping statistics ---
10 packets transmitted, 10 received, 0% packet loss, time 9001ms
rtt min/avg/max/mdev = 0.155/0.476/0.790/0.187 ms
See also
From LAN Client¶
At this stage a LAN client will be able to connect to the network (port or switch) connected to the LAN interface. It can pull an IP address and other configuration via DHCP, resolve domain names via DNS, and reach hosts beyond TNSR using it as a gateway.
A ping executed on a client will flow through TNSR and replies will return.
Save the TNSR Configuration¶
TNSR maintains three separate configuration databases: startup, candidate, and running. The running copy is the active configuration. TNSR loads the startup copy at boot time.
To ensure the expected configuration is loaded when TNSR is rebooted, copy the running configuration to the startup configuration after making changes:
tnsr# configure
tnsr(config)# configuration copy running startup
Optionally, create a backup copy of the configuration which can be loaded later if necessary:
tnsr(config)# configuration save running backup.xml
Next Steps¶
From here, click the Next button at the bottom of the page to continue on to the next section of the documentation, or choose a topic from the table of contents to the left.
Other suggested next steps include:
Configure updates (non-trial version only)
See more practical examples, such as setting up the RESTCONF API
Configure IPsec tunnels
Configure time synchronization