...
Code Block | ||
---|---|---|
| ||
[service] # Just suggested format of network name, eg: DOMAIN = "LOC.nsi.geant.net" and LOC = "mx1.ams.nl" or "ams" as per previous convention # NOTE: When configuring aggregator, the domain should look like the following: DOMAIN = "nsi.geant.net". network=DOMAIN user=opennsa logfile=/home/opennsa/logs/opennsa-LOC.log ## Host can often be detected. ## Default port is 9080/9443 depending on tls host=OPENNSA_HOST_IP port=9444 # Good practise is to use 9443 for main/aggregator process database=opennsa-LOC dbuser=opennsa dbpassword= tls=false # Location of topology description file # NOTE: When configuring aggregator, NO NRM FILE should be configured. Just comment out/delete the nrmmap line. nrmmap=/home/opennsa/topology/opennsa-LOC-top.nrm # Peering: with domainaggregate feature uPAs should not have any peers defined! # peers=http://ANY_OPENNSA_HOST_IP_OF_PEER:PORT_OF_PEER/NSI/discovery.xml # http://ANY_OPENNSA_HOST_IP_OF_PEER:PORT_OF_PEER/NSI/discovery.xml # Backend configuration here is for the gts Junos MX platform with ssh channel against router ... # Always uncomment/use just one backend at the time. More description can be found on OpenNSA wiki. # NOTE: When configuring aggregator, NO BACKEND should be configured. Just comment out/delete the backend section. # use this dummy backend without any further configs. Useful for testing. #[dud] # JunosMX is the backend for Juniper MX platform supporting VLAN,MPLS and port based STPs. [junosmx] host=MANAGEMET_IP user=opennsa fingerprint=XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX publickey=/home/opennsa/.ssh/opennsa_rsa.key.pub privatekey=/home/opennsa/.ssh/opennsa_rsa.key # LOOPBACK_IP for beeing used as LSP target from different PE routers # All routers in dataplane needs to be listed here. routers=ROUTER_LOC1:LOOPBACK_IP # LOOPBACK_IP for beeing used as LSP target from different PE routers ROUTER_LOC2:LOOPBACK_IP #JunosEX is the backend for Juniper EX 4550 platform supporting VLAN based STPs only. #It supports label swapping using CCC feature. [junosex] host=MANAGEMET_IP user=opennsa fingerprint=XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX publickey=/home/opennsa/.ssh/opennsa_rsa.key.pub privatekey=/home/opennsa/.ssh/opennsa_rsa.key #Section for JUNOS SPACE backend configuration. Uncomment just one backend config for the configured instance [junosspace] space_user=USERNAME space_password=PASSWORD space_api_url=https://IPADDR/api/space configlet_activate_local=CONFIGLET_ID_IN_JUNOSSPACE configlet_activate_remote=CONFIGLET_ID_IN_JUNOSSPACE configlet_deactivate_local=CONFIGLET_ID_IN_JUNOSSPACE configlet_deactivate_remote=CONFIGLET_ID_IN_JUNOSSPACE # LOOPBACK_IP for beeing used as LSP target from different PE routers # All routers in dataplane needs to be listed here. routers=gtstest2:589838:IPADDR2 # FORMAT OF THE 3 tuple: network_name:router_id_in_junosspace:loopback_ip gtstest1:589834:IPADDR1 |