ncclient通过NetConf对接Juniper虚拟交换机

其实主要目的是验证Juniper的虚拟交换机netconf是否ready

Testbed搭建

  • 基于EVE-NG平台
  • Juniper的虚拟交换机vmx使用vmx-14.1.R1来启动
  • 一台CentOS主机通过EVE上的net与vmx的em0连通

交换机配置

  • 启动交换机后,通过点击Web图标串口登录
  • 初始密码是root/root123
  • 进入配置模式
root@vMX-1% cli
root@vMX-1> configure 
Entering configuration mode

[edit]
root@vMX-1# 
  • 下发配置
set interfaces em0 unit 0 family inet address 192.168.122.102/24 
set system login user netops uid 203
set system login user netops class super-user
set system login user netops authentication plain-text-password
 > 要求输入密码:Test123
 > 要求再次输入同样的密码:Test123
set system services ftp
set system services ssh root-login allow
set system services ssh protocol-version v2
set system services netconf ssh port 830
  • 关于Juniper JUNOS plain-text-password vs. encrypted-password的区别,可以看这里

CentOS主机

  • 接口IP为:192.168.122.211/24,与vmx的带外管理口在同一个网段
  • 尝试使用netops/Testing来登录
[root@deployer juniper]# ssh [email protected]
Password:
--- JUNOS 14.1R1.10 built 2014-06-07 09:37:07 UTC
netops@vMX-1> exit 

Connection to 192.168.122.102 closed.
[root@deployer juniper]# 
  • 安装ncclient这个python包
pip install ncclient
  • 获取GitHub上的相关代码
[root@deployer ~]# git clone https://github.com/ncclient/ncclient
...
[root@deployer ~]# cd /root/ncclient/examples/juniper
[root@deployer juniper]# 

对接

  • 该文件夹下已经有很多适配Juniper交换机的脚本

通过netconf获取信息

  • 选取一个获取端口状态的脚本get-interface-status.py,修改最后一行
connect('192.168.122.102', 830, 'netops', 'Test123')
  • 运行脚本,可以获取到vmx的所有接口状态
[root@deployer juniper]# python get-interface-status.py
2020-03-30 17:38:17,083 INFO transport.py:1819 Connected (version 2.0, client OpenSSH_6.4)
2020-03-30 17:38:17,255 INFO transport.py:1819 Authentication (publickey) failed.
2020-03-30 17:38:17,281 INFO transport.py:1819 Authentication (password) successful!
2020-03-30 17:38:17,422 INFO ssh.py:506 [host 192.168.122.102 session 0x7f0e4c5bce90] Sending:
urn:ietf:params:netconf:capability:writable-running:1.0urn:ietf:params:netconf:capability:with-defaults:1.0urn:ietf:params:netconf:capability:rollback-on-error:1.0urn:liberouter:params:netconf:capability:power-control:1.0urn:ietf:params:netconf:capability:validate:1.0urn:ietf:params:netconf:capability:confirmed-commit:1.0urn:ietf:params:netconf:capability:url:1.0?scheme=http,ftp,file,https,sftpurn:ietf:params:netconf:base:1.0urn:ietf:params:netconf:base:1.1urn:ietf:params:netconf:capability:candidate:1.0urn:ietf:params:netconf:capability:notification:1.0urn:ietf:params:netconf:capability:xpath:1.0urn:ietf:params:netconf:capability:startup:1.0urn:ietf:params:netconf:capability:interleave:1.0]]>]]>
2020-03-30 17:38:18,060 INFO ssh.py:125 [host 192.168.122.102 session 0x7f0e4c5bce90] Received message from host
2020-03-30 17:38:18,094 INFO session.py:125 [host 192.168.122.102 session-id 7303] initialized: session-id=7303 | server_capabilities=
2020-03-30 17:38:18,097 INFO rpc.py:325 [host 192.168.122.102 session-id 7303] Requesting 'ExecuteRpc'
2020-03-30 17:38:18,165 INFO ssh.py:506 [host 192.168.122.102 session-id 7303] Sending:
]]>]]>
2020-03-30 17:38:19,155 INFO ssh.py:125 [host 192.168.122.102 session-id 7303] Received message from host
2020-03-30 17:38:19,223 INFO get-interface-status.py:26 ge-0/0/0 - up
2020-03-30 17:38:19,224 INFO get-interface-status.py:26 lc-0/0/0 - up
2020-03-30 17:38:19,226 INFO get-interface-status.py:26 pfe-0/0/0 - up
2020-03-30 17:38:19,227 INFO get-interface-status.py:26 pfh-0/0/0 - up
2020-03-30 17:38:19,227 INFO get-interface-status.py:26 ge-0/0/1 - up
2020-03-30 17:38:19,228 INFO get-interface-status.py:26 ge-0/0/2 - up
2020-03-30 17:38:19,228 INFO get-interface-status.py:26 ge-0/0/3 - up
2020-03-30 17:38:19,229 INFO get-interface-status.py:26 ge-0/0/4 - up
2020-03-30 17:38:19,230 INFO get-interface-status.py:26 ge-0/0/5 - up
2020-03-30 17:38:19,230 INFO get-interface-status.py:26 ge-0/0/6 - up
2020-03-30 17:38:19,231 INFO get-interface-status.py:26 ge-0/0/7 - up
2020-03-30 17:38:19,231 INFO get-interface-status.py:26 ge-0/0/8 - up
2020-03-30 17:38:19,232 INFO get-interface-status.py:26 ge-0/0/9 - up
2020-03-30 17:38:19,232 INFO get-interface-status.py:26 cbp0 - up
2020-03-30 17:38:19,233 INFO get-interface-status.py:26 demux0 - up
2020-03-30 17:38:19,234 INFO get-interface-status.py:26 dsc - up
2020-03-30 17:38:19,234 INFO get-interface-status.py:26 em0 - up
2020-03-30 17:38:19,234 INFO get-interface-status.py:26 em1 - up
2020-03-30 17:38:19,235 INFO get-interface-status.py:26 em2 - up
2020-03-30 17:38:19,235 INFO get-interface-status.py:26 em3 - up
2020-03-30 17:38:19,235 INFO get-interface-status.py:26 em4 - up
2020-03-30 17:38:19,236 INFO get-interface-status.py:26 em5 - up
2020-03-30 17:38:19,236 INFO get-interface-status.py:26 gre - up
2020-03-30 17:38:19,236 INFO get-interface-status.py:26 ipip - up
2020-03-30 17:38:19,236 INFO get-interface-status.py:26 irb - up
2020-03-30 17:38:19,237 INFO get-interface-status.py:26 lo0 - up
2020-03-30 17:38:19,237 INFO get-interface-status.py:26 lsi - up
2020-03-30 17:38:19,237 INFO get-interface-status.py:26 mtun - up
2020-03-30 17:38:19,237 INFO get-interface-status.py:26 pimd - up
2020-03-30 17:38:19,238 INFO get-interface-status.py:26 pime - up
2020-03-30 17:38:19,238 INFO get-interface-status.py:26 pip0 - up
2020-03-30 17:38:19,238 INFO get-interface-status.py:26 pp0 - up
2020-03-30 17:38:19,238 INFO get-interface-status.py:26 tap - up
2020-03-30 17:38:19,239 INFO get-interface-status.py:26 vtep - up
[root@deployer juniper]# 

通过netconf设置

  • 选取一个获取端口状态的脚本set-description.py,修改最后一行
connect('192.168.122.102', 830, 'netops', 'Test123', 'set interfaces %s description example' % interface)
  • 运行
[root@deployer juniper]# python set-description.py
2020-03-30 17:52:34,827 INFO transport.py:1819 Connected (version 2.0, client OpenSSH_6.4)
2020-03-30 17:52:35,054 INFO transport.py:1819 Authentication (publickey) failed.
2020-03-30 17:52:35,095 INFO transport.py:1819 Authentication (password) successful!
2020-03-30 17:52:35,276 INFO ssh.py:506 [host 192.168.122.102 session 0x7f6b8e54cd10] Sending:
urn:ietf:params:netconf:capability:writable-running:1.0urn:ietf:params:netconf:capability:with-defaults:1.0urn:ietf:params:netconf:capability:rollback-on-error:1.0urn:liberouter:params:netconf:capability:power-control:1.0urn:ietf:params:netconf:capability:validate:1.0urn:ietf:params:netconf:capability:confirmed-commit:1.0urn:ietf:params:netconf:capability:url:1.0?scheme=http,ftp,file,https,sftpurn:ietf:params:netconf:base:1.0urn:ietf:params:netconf:base:1.1urn:ietf:params:netconf:capability:candidate:1.0urn:ietf:params:netconf:capability:notification:1.0urn:ietf:params:netconf:capability:xpath:1.0urn:ietf:params:netconf:capability:startup:1.0urn:ietf:params:netconf:capability:interleave:1.0]]>]]>
2020-03-30 17:52:36,323 INFO ssh.py:125 [host 192.168.122.102 session 0x7f6b8e54cd10] Received message from host
2020-03-30 17:52:36,349 INFO session.py:125 [host 192.168.122.102 session-id 7522] initialized: session-id=7522 | server_capabilities=
2020-03-30 17:52:36,350 INFO rpc.py:325 [host 192.168.122.102 session-id 7522] Requesting 'Lock'
2020-03-30 17:52:36,426 INFO ssh.py:506 [host 192.168.122.102 session-id 7522] Sending:
]]>]]>
2020-03-30 17:52:36,434 INFO ssh.py:125 [host 192.168.122.102 session-id 7522] Received message from host
2020-03-30 17:52:36,469 INFO rpc.py:325 [host 192.168.122.102 session-id 7522] Requesting 'LoadConfiguration'
2020-03-30 17:52:36,536 INFO ssh.py:506 [host 192.168.122.102 session-id 7522] Sending:
set interfaces em0 description example]]>]]>
2020-03-30 17:52:36,550 INFO ssh.py:125 [host 192.168.122.102 session-id 7522] Received message from host
2020-03-30 17:52:36,585 INFO set-description.py:20 
  
    
  


2020-03-30 17:52:36,586 INFO rpc.py:325 [host 192.168.122.102 session-id 7522] Requesting 'Commit'
2020-03-30 17:52:36,652 INFO ssh.py:506 [host 192.168.122.102 session-id 7522] Sending:
]]>]]>
2020-03-30 17:52:37,873 INFO ssh.py:125 [host 192.168.122.102 session-id 7522] Received message from host
2020-03-30 17:52:37,911 INFO set-description.py:22 
  


2020-03-30 17:52:37,912 INFO rpc.py:325 [host 192.168.122.102 session-id 7522] Requesting 'Unlock'
2020-03-30 17:52:37,975 INFO ssh.py:506 [host 192.168.122.102 session-id 7522] Sending:
]]>]]>
2020-03-30 17:52:38,009 INFO ssh.py:125 [host 192.168.122.102 session-id 7522] Received message from host
2020-03-30 17:52:38,029 INFO rpc.py:325 [host 192.168.122.102 session-id 7522] Requesting 'CloseSession'
2020-03-30 17:52:38,110 INFO ssh.py:506 [host 192.168.122.102 session-id 7522] Sending:
]]>]]>
2020-03-30 17:52:38,118 INFO ssh.py:125 [host 192.168.122.102 session-id 7522] Received message from host
[root@deployer juniper]# 
  • 对比前后em0接口的配置,发现多了接口描述,和预期相同


    set_port_desc.png

你可能感兴趣的:(ncclient通过NetConf对接Juniper虚拟交换机)