DOMOS6 WebUI
The DOMOS6 WebUI allows you to configure all necessary settings of your appliance and execute system maintenance tasks.
Login
Virtual Machine
To login to the DOMOS6 WebUI, open https://DHCP-IP:10000 in your web browser (default). The default username is admin and the password is secudos. It is recommended to change the password after first log in.
| Type | Detail |
|---|---|
| Default URL | https://DHCP-IP:10000 |
| Default Login | admin |
| Default Password | secudos |
Configure your workstation to an IP address in the same network as the IP adress given to your virtual machine to be able to connect to the DOMOS6 WebUI.
Hardware-Appliance
To login to the DOMOS6 WebUI, open https://192.168.2.1:10000 in your web browser (default). The default username is admin and the password is secudos. It is recommended to change the password after first log in.
| Type | Detail |
|---|---|
| Default URL | https://192.168.2.1:10000 |
| Default Login | admin |
| Default Password | secudos |
Configure your workstation to IP 192.168.2.2(for example) with netmask 255.255.255.0 to be able to connect to the DOMOS6 WebUI.
Default Password Warning
When logging into the DOMOS6 WebUI, you will be informed when default passwords are in enforced. We highly recommend you to change your passwords to more secure passphrases, as default passwords can impend a severe security risk to your system and network.
General Information
In the upper right corner you are able to see who is currently logged in via WebUI. To log out hit Logout.
After changing any configuration, click the Save button which is displayed everywhere you are allowed to make changes. To apply your changes hit Activate Settings. This may take a while. Restarting services return success or failure messages. If you have changed the IP of the appliance you will not receive any response, because your browser will wait for the WebUI to return from the old IP. You will have to log in again on the appliance by directing your browser to the new IP.
Overview
After logging in using the WebUI you will see the overview screen. This screen provides information about hostname, uptime, average CPU load, system time, DOMOS6 version and software as you can see in the following figure.

Network
By clicking on ”Network” in the menu on the left side an overview of the network configuration appears. This overview shows a basic summary of the network settings of your appliance, namely the network ports with their configuration such as IP and netmask, DHCP and an indicator if the interface is up or down.

Interfaces
This screen shows nearly the same information as the network overview, but here you are able to edit your configuration by selecting Edit of the interface.

Modifying Network Configuration
By selecting Edit in the interfaces overview you are lead to the configuration menu of a specific interface. At first basic information about the interface is given: The name. By activating DHCP the interface obtains its IP from a DHCP-Server. Otherwise configure the IP and the netmask manually. If you want to set the Maximum Transfer Unit (MTU) just edit the field beside MTU. The default setting is 1500. You can add multiple IPv4 addresses to an interface by clicking on the Add new IPv4 address button.
If you have restored an old DOMOS configuration file (DOMOS5 and older) the Virtual Interface configuration will be converted automatically to additional IPv4 address configuration.

VLAN (IEEE 802.1Q)
DOMOS6 provides the option to add VLAN interfaces to your network. To add a new VLAN interface, click Add new VLAN. You will be presented with a dialogue in which you will be requested to specify which device the VLAN is to be attached to, what VLAN ID the interface is to be configured to, the IP Address, Netmask and MTU. To have the VLAN device brought up at boot, please check the Activate on boot checkbox. Once completed, click save to complete the configuration of the VLAN. Should you like to edit the configuration of an existing VLAN interface, click the Edit button in the “Interfaces” overview. To delete a VLAN interface, click the Del button. Once you have made changes to the interfaces, please click Activate Settings to apply the changes.
Your network may need configuration to incorporate VLAN traffic.

Bonding
DOMOS6 allows you to bond interfaces using the Link Aggregation Control Protocol (LACP). This means that you can bind two interfaces together to operate as one. To add a new bond click on Add new bonding interface. You will be prompted to enter a Name - which will later be used to refer to this interface. The Bonding Mode defines the strategy used to run the bond.
Here you can choose between one of the following:
balance-rr - Round-robin policy: Transmit packets in sequential order from the first available slave through the last. This mode provides load balancing and fault tolerance.
active-backup - Active-backup policy: Only one slave in the bond is active. A different slave becomes active if, and only if, the active slave fails. This mode provides fault tolerance.
balance-xor - XOR policy: Transmit based on the selected transmit hash policy. This mode provides load balancing and fault tolerance. broadcast Broadcast policy: transmits everything on all slave interfaces. This mode provides fault tolerance.
802.3ad IEEE - 802.3ad Dynamic link aggregation. Creates aggregation groups that share the same speed and duplex settings. Utilizes all slaves in the active aggregator according to the 802.3ad specification.
balance-tlb - Adaptive transmit load balancing: channel bonding that does not require any special switch support. The outgoing traffic is distributed according to the current load (computed relative to the speed) on each slave. Incoming traffic is received by the current slave. If the receiving slave fails, another slave takes over the MAC address of the failed receiving slave.
balance-alb - Adaptive load balancing: includes balance-tlb plus receive load balancing (rlb) for IPV4 traffic and does not require any special switch support. The receive load balancing is achieved by ARP negotiation.
Furthermore you will have to specify a value for MiiMon.
miimon - specifies the MII link monitoring frequency in milliseconds. This determines how often the link state of each slave is inspected for link failures. A value of zero disables MII link monitoring. A value of 100 is a good starting point. The default value is 0.
Finally, you will have to select the interfaces you wish to bond. Clicking on Save will conclude the configuration. Click on Activate Settings to apply the changes.

Routing
In the routing screen you can change your default gateway and static routes for IPv4 and IPv6. All routing is disabled by default.

Default Gateway
In order to configure a default gateway enter the IP of your gateway.
Enable routing
To enable or disable routing press the Toggle button next to the option Enable routing.
Autoconfiguration (IPv6)
By default Autoconfiguration is disabled. If this is enabled and your network supports it, your network will provide a configuration for the routing which will be automatically applied.
Static Routes
To add a static route click Add new static route. If you like to Edit or Delete a static route click the according button next to the static route.

Hosts
Here you can define custom hostnames. This is especially useful, if you like to address hosts not covered by DNS. The overview titled “Host addresses” will display all locally defined hostnames. You can Edit existing hostnames or click Del to remove them one by one. By clicking Add a new host address you can add new hostnames. You will be requested to fill in the IP address, an FQDN (Fully Qualified Domain Name) and an Aliases. Clicking on Save will add the new hostname. To apply the changes, please click Activate Settings.
DNS
Here you can configure the hostname of your appliance and the DNS server(s) that will be used. You have to configure at least one working DNS server to allow the appliance to resolve domain names to IP addresses. Add a “Search Domain” to automatically append it to hostnames that are not addressed by its FQDN, which would otherwise fail to resolve.
Ping
You can use Ping to verify that a host is reachable. To do so, please enter the IPv4, IPv6 address or hostname of the target you like to verify the connection to. Optionally you can enter the amount of Ping packets you like to send. The default for this value is 10 packets. To start the ping command, click the Ping button.
The response will take a moment. Your browser will automatically refresh to update the displayed results. In our sample output we have sent four ping packets to a host.

Traceroute
Traceroute is a networking diagnosis tool used to show the route taken by packets across an Internet Protocol (IP) network. To initiate a traceroute, open the Traceroute dialogue, enter a target IPv4, IPv6 address or hostname of a target into the Destination field. If you want, you can adjust the Maximum TTL to a desired value. Clicking Traceroute will initiate the traceroute The response will take a moment. Your browser will automatically refresh to update the displayed results.

Date and Time
Time
This menu section displays information about the system timezone, time and date. If you have specified NTP servers, the button Synchronize now will trigger an NTP time synchronisation.
You can only synchronize the time if NTP is enabled
Timezone
Select your timezone here. To apply the changes in the timezone, you will have to click on Save followed by Activate Settings to apply the changes.
Changes to the timezone will also affect the current set time.
Clock
Set the time and date on your appliance. Clicking Save will instantly apply the changes. You do not need to click Activate Settings to apply this change.
NTP Client
If you want to synchronize the time and date via Network Time Protocol (NTP) you can select your NTP Servers here. By default, NTP is deactivated. For simplicity, the default time server pool pool.ntp.org is included in the list of time servers. To edit your list of prefered timeservers click Edit timeserver list to add or remove an entry from the list. On the edit page you can select a timeserver to delete it or add a new timeserver by inserting its hostname into the textbox.

User
This screen shows the current user who is logged-in on the WebUI.
System User
Here you can change the passwords for the root and admin users. You will be prompted to enter the current password and the required new password.
With DOMOS6 the old WebUI user was removed and the login on the WebUI uses the password of the system admin user.
SSH Keys
You can enable ssh key authentication for the admin user. These can allow a more secure authentication against the SSH deamon. By clicking on Add new SSH key, you will be prompted to provide a name for the SSH key and to specify the path to the according public SSH key file by clicking on Browse. Upload the key by clicking save. To enable SSH keys, check the “enable SSH key authentification for user admin” checkbox and Save the configuration. Clicking on Activate Settings the configuration will be applied.
It is unwise to use SSH keys without a passphrase. If somebody achieves to obtain a copy of the keyfile, he/she will have access to all accounts that grant access to that key. Please avoid exposure of the private key.
LDAP
This section allows to configure to get authentification data from an LDAP server. So additional users can login into the DOMOS system without having an account on the DOMOS system itself. Next to a normal password even a public SSHKey can be retrieved from LDAP to use passwordless pubkey authentification. After login on the commandline users can use the command sudo to gain root permissions. Users, identified by this way, can login into the DOMOS WebUI using own credentials.
The configuration is splitted into a dialog with the most useful settings and a page for advanced configuration settings.
Settings
Here the basic configuration can be done.

You can find the following configuration settings on this page.
LDAP Authentification - Switch this on to use LDAP authentification
WebUI Login - Allow LDAP users to login into DOMOS WebUI
SSH Login - Allow LDAP users to login via SSH
SSH Login using key authentification - Allow SSH pubkey authentification
Sudo - Allow LDAP users to gain root permissions using sudo
LDAP URI- URI of LDAP server (e.g. ldaps://FQDN:Port)
LDAP Schema - Select LDAP scheme to use. Currently the following are available: rfc2307, rfc2307bis and IPA
LDAP Check TLS Certificate - Select checking mode of TLS certificate
TLS CA Certificate - If needed an own CA certificate can be uploaded here. A short info of an already uploaded CA certificate will displayed here. The Upload New Certificate button allows to upload a new certificate and the Remove button deletes the certificate.
LDAP Search Base - The default base DN to use for performing LDAP user operations
LDAP Default Bind DN - Bind DN to access LDAP server
LDAP Default Authentication Token - Password for Bind DN
LDAP User Search Base - Optional base DN and Filter for users
LDAP Group Search Base - Optional base DN and Filter for groups
LDAP Sudo Search Base - Optional base DN and Filter for sudo access
LDAP Access Order - Access control options
LDAP AccessFilter - Search filter for users (needed if Access Order is set to filter)
The button Configuration leads you the the advanced configuration page.
Advanced Configuration
While the settings page allows a quick configuration of the most important settings, this page can be used to configure the access to the LDAP server in more detail.
Please refer to the manual pages of SSSD (sssd, sssd-ldap, sssd-ssh, sssd-nss, sssd-sudo, sssd-pam) for information about the offered configuration settings.

The page is divided into some sections. Each section shows a table of configuration. The first column show the name of the option, the next column shows the value. The Del buttons removes the option from the configuration und the Edit opens a dialog to change the value of the option.

Below each table you can find the button Add new Option. Pressing this button opens a dialog to select a new option and add a value to it.

Reset SSSD Cache
Sometimes there is need to reset the SSSD cache. Next to use of the sss_cache tool (using the -E flag for all or -u User) DOMOS will flush the cache if it finds the file /run/domos/sssd_clean_cache on Activate Settings.
ARP-GUARD
In this section you can verify if your ARP-GUARD is running.
ARP-GUARD Management
If ARP-GUARD service is running, here you will find a link to the ARP-GUARD management WebUI .

ARP-GUARD EULA
Before you can work with the ARP-GUARD software, you must first accept the EULA (ISL End User License Agreement). Read the license text, then check the ckeckbox below the text and click on the save button.

After that you have to start a reconfiguration by clicking on the Activate Settings button on the top of the page. After a short time the ARP-GUARD service is installed and started.
Please note, the EULA acception can’t be reset.
ARP-GUARD Backup
In the Backup section of ARP-GUARD you can configure that DOMOS6 includes ARP-GUARD data in its configuration backup.
SNMP WebUI
The SNMP WebUI allows you to configure the SNMP settings on your appliance. Clicking on the SNMP menu shows the status of the SNMP daemon.
General
On the General page you can enable the SNMP daemon in the SNMP service section. You can decide if you want to activate the version 1/2c and/or version 3 features of SNMP.

In the Common section a location description and a contact can be configured. The last section allows to change the network protocol (tcp or udp) and to bind the SNMP server on an arbitrary network interface. The default is to listen on any interface using the UDP protocol on port 161. The port number is fixed.
Communities
The “Communities” page allows the user to configure SNMP v1/v2c communities. This page has a table of defined SNMP communities, a link to add new SNMP communities and links to edit or delete SNMP communities. SNMP community name and access mode can be specified on this page.

Users
The SNMPv3 users on DOMOS6 are limitated to readonly. Also accessing has to happen using authentication and encryption. Therefore the “Users” page allows you to create SNMPv3 users in one manner. To create a new user click on the Add new SNMPv3 user button and fill in the user data in to the formular. After saving the data using the Save button the new created user will be displayed in the SNMP v3 Users table.
Please note that SNMPv3 supports only SHA1-96.

Backup/Restore NG
Last Configuration Backup
Latest Configuration Backup displays the time when the last backup of the system configuration files was done. Below the timestamp of the Latest Data Backup is shown. Below you can find a checkbox. If this is marked (default), the warning Backup is not configured. will be shown in the messages section of the page. The warning disappears if a backup job is configured. If you don’t want to configure a backup job you can disable the warning by unchecking the Display backup warning checkbox.

Config Backup
You can create a backup of your system configuration here by clicking on Create new configuration backup. Your browser will show a download dialog to copy the configuration to your workstation.
Config Restore
Select a configuration backup file from your workstation and upload it to the appliance to restore it. Once Restore is clicked, you will be shown Message: Restore done in the status bar.

Data Backup
This shows an overview of the configured backup jobs. At each backup you will see the following:
Name - a descriptive name for a backup.
Type - type of backup in question.
Target - a name for the backup target.
Furthermore will be displayed three Buttons for every configured Backup Job:
Start Backup - initiates a backup to the according target.
Del - deletes a configured target.
Edit - will let you modify the configuration of a target.

By clicking on Manage Targets, you can manage the configured backup targets. Add Backup Job will allow you to create a new backup procedure, which can be triggered manually or scheduled.
To create a new backup job, you will have to fill out the following:
-
Create a new backup job
Job name- a name for the backup job.Description- a short description.Type- select if you want to backup the configuration or data or a software partner.Target- select the required backup target. -
Scheduling
Scheduling enabled- if enabled, this task will run at the selected intervalHour- selects the hour of a day at which this task is running.Minute- selects the minute of a day at which this task is running.Day of month- selects the day of a month at which this task is running.Month- selects which month this task is running.Day of week- selects which week day this task is running
By clicking Save the backup job is saved.

Data Restore
The Data Restore tab gives you an overview of all available backup targets. To see which backups are available on a target the scan starts a scan of the target.
Name - displays the target name.
Type - the type of target.
Host - IP or hostname of the target.
Scan - this button starts a scan of the target for available backups.
The result of the scan is displayed as table below the targets table.
Target - displays the target name.
Backup - name of the backup
Restore - this button starts the restore of the backup.

Targets
Here you can configure your targets to be used in the DOMOS6 backup system. The Targets table lists all currently configured targets:
Name - a descriptive name for a Target.
Type - indicates the type of transport used for the backup. This can be:
FTPS- File Transfer Protocol using SSL
Host - hostname of the server used to backup to.
Test - this button tests if the backup server is available and the selected resource can be written to.
Edit - by clicking this button you can modify the configuration of a backup target.
Del - deletes a selected backup target.

Adding a Target - To add a Target, please click one of the following:
Add FTPs target - to add a FTPs target.
Currently just FTPs targets are possible. Other types will follow in future releases.
Add a target Depending on which type of target you are adding you will have to provide the following details:
Name - a name for the backup.
Description - a short description for personal reference.
Remote host - the remote host to be used for the backup.
TLS Connection - Check the box if certifcate check should be skipped.
TLS Version - If checked TLS v1.2 will be used. Default is to use latest available TLS version (currently TLS 1.3).
Port - Port number to connect to the target service.
Username - a username used to authenticate against the remote host.
Password - a password used to authenticate against the remote host.
Directory - select the directory used to store the backups to. If you backup to a FTP target
please keep the following in mind: If no directory is specified, the user directory
on the FTP server will be considered. If a directory is specified, the relative path
as configured in the ftp server will be used. This could also be influenced by any
enforced chroots. The directory must exist on the target server and will not be
created by the backup software.
