Secure Device Provisioning Using SZTP

Gyger, Vanessa and Lenherr, Patrick (2024) Secure Device Provisioning Using SZTP. Other thesis, OST - Ostschweizer Fachhochschule.

[thumbnail of HS 2023 2024-SA-EP-Gyger-Lenherr-Infrastructure as Code — Open Slot.pdf] Text
HS 2023 2024-SA-EP-Gyger-Lenherr-Infrastructure as Code — Open Slot.pdf - Supplemental Material

Download (2MB)

Abstract

Initial Situation
Managing many network devices takes a lot of effort and poses risks of inconsistency in configuration. Furthermore, time is needed to plug the device in, attach your computer and connect to the console for configuration. With automation, this process can be made much more efficient and reliable. The classical approach for this is called Zero Touch Provisioning (ZTP), meaning the device doesn’t have to be touched to configure it. Instead, it is registered in an inventory and can load a predefined configuration automatically.

Objective
The objective of this term project is to lay the groundworks for a network controller that handles zero touch provisioning of newly installed devices, as well as transferring configuration in case of 1-to-1 device replacement. The scope of the controller is limited to Cisco devices for this project, but it should be extendable to support various other devices. Furthermore, the controller should also be open for future extension, providing more functionality like ongoing configuration after the provisioning process.

Result
The authors developed a controller that bridges between inventory management and network device. On one end Netbox is used to manage device parameters and context-dependent configuration. Both are rendered into the target devices configuration using a template. On the other end the devices use DHCP to get SZTP redirect information for the controller. The provisioning controller provides an endpoint for SZTP-compliant devices to securely get the data needed to bootstrap themselves via HTTPS. The bootstrapping data includes firmware target version, download source and integrity hash as well as the configuration itself. During the devices lifetime our backup controller is used to automatically retrieve configuration backups. Nornir and Napalm are used to run the backup task on all devices registered in Netbox. In the event of a hardware failure, a replacement device can quickly be set up. By simply setting the configuration source device in Netbox the provisioning controller will automatically load the backup configuration.

Item Type: Thesis (Other)
Subjects: Technologies > Programming Languages > Python
Technologies > Network
Brands > Cisco
Metatags > INS (Institute for Networked Solutions)
Divisions: Bachelor of Science FHO in Informatik > Student Research Project
Depositing User: OST Deposit User
Contributors:
Contribution
Name
Email
Thesis advisor
Baumann, Urs
UNSPECIFIED
Date Deposited: 16 May 2024 11:51
Last Modified: 16 May 2024 11:51
URI: https://eprints.ost.ch/id/eprint/1170

Actions (login required)

View Item
View Item