IPplan - IP address management and tracking

Revision History
Revision 3.012003-05-21Revised by: re
Revision History
Revision 3.002003-04-21Revised by: re
Revision History
Revision 2.992002-12-17Revised by: re
Revision 2.922002-07-04Revised by: re
Revision 2.912002-05-17Revised by: re

This is the official documentation for IPplan. IPplan is a web based, multilingual, IP address management and tracking tool based on php 4, simplifying the administration of your IP address space. IPplan can handle a single network or cater for multiple networks with overlapping address space. See the introduction section for more.


Table of Contents
1. Introduction
1.1. Copyright Information
1.2. Disclaimer
1.3. New Versions
1.4. Credits
1.5. Feedback
1.6. Translations
2. Requirements
2.1. Databases
2.2. Additional features
3. Downloads, bugs and forums
3.1. Screenshots
4. Mode of operation
4.1. Services company
4.2. ISP
5. Concepts
5.1. Deployment strategy
6. Administration
6.1. Admin user
6.2. Customer access
6.3. Subnet access
6.4. Group authority boundaries
7. Searching
8. Config file
9. Importing data
10. Templates
11. Authentication schemes
12. Problems
13. Limitations
14. Questions and Answers


1. Introduction

IPplan is a web based, multilingual, IP address management and tracking tool based on php 4, simplifying the administration of your IP address space. IPplan can handle a single network or cater for multiple networks with overlapping address space.

Current functionality includes

Two authentication methods are available - either IPplan's own internal authentication scheme, or alternatively make use of any external Apache authentication module. This includes single sign on systems like SiteMinder or your own scheme based on LDAP, or any other Apache compatible system.


1.1. Copyright Information

This document is copyrighted (c) 2002 Richard E and is distributed under the terms of the Linux Documentation Project (LDP) license, stated below.

Unless otherwise stated, Linux HOWTO documents are copyrighted by their respective authors. Linux HOWTO documents may be reproduced and distributed in whole or in part, in any medium physical or electronic, as long as this copyright notice is retained on all copies. Commercial redistribution is allowed and encouraged; however, the author would like to be notified of any such distributions.

All translations, derivative works, or aggregate works incorporating any Linux HOWTO documents must be covered under this copyright notice. That is, you may not produce a derivative work from a HOWTO and impose additional restrictions on its distribution. Exceptions to these rules may be granted under certain conditions; please contact the Linux HOWTO coordinator at the address given below.


1.2. Disclaimer

No liability for the contents of this documents can be accepted. Use the concepts, examples and other content at your own risk. As this is a new edition of this document, there may be errors and inaccuracies, that may of course be damaging to your system. Proceed with caution, and although this is highly unlikely, the author(s) do not take any responsibility for that.

All copyrights are held by their by their respective owners, unless specifically noted otherwise. Use of a term in this document should not be regarded as affecting the validity of any trademark or service mark.

Naming of particular products or brands should not be seen as endorsements.

You are strongly recommended to take a backup of your system before major installation and backups at regular intervals.


1.3. New Versions

See the CHANGELOG file for more information.


1.4. Credits

Thanks to ValueHunt Inc. for the use of their layout class used for rendering all HTML pages.

Thanks to Weblogs for the use of their generic database abstraction class.


1.5. Feedback

Feedback is most certainly welcome for this document. Without your submissions and input, this document wouldn't exist. Please send your additions, comments and criticisms to the following email address : .


1.6. Translations

See the INSTALL and TRANSLATIONS files on how to enable multilingual support and how to do a translation to your own language. Doing a translation does not require any programming experience. Current languages supported are English, French - Auto Translation, German - Auto Translation, Italian - Auto Translation, Norwegian - Auto Translation, Portuguese - Auto Translation and Spanish - Auto Translation.


2. Requirements

IPplan requires a working web server installation. Currently ONLY the Apache web server is supported. Apache works just fine on Windows platforms. For installing Apache on a Windows platform, follow these instructions. Or you can use AppServ which is a complete installation package of Apache, MySQL and PHP for Windows - just add IPPlan by following the installation instructions in the IPPLAN-WINDOWS file (part of IPPlan).


2.1. Databases

IPplan requires a working database installation. The following databases currently work:

The following may work, but are untested - Sybase. In fact, any database that supports SQL99 compliant joins, in particular LEFT JOIN, should work. See limitations section below for more.

The web scripting language php 4.0.4p1 or higher must also be installed as a module in Apache (NOT as a cgi). Php must have the preferred database driver compiled in and enabled. See the respective web sites and installation documents for more detail. IPplan works just fine with a combination of the Apache web server and php on a Windows platform - just read the relevant installation instructions for Windows carefully.


2.2. Additional features

To enable SNMP support, you will require the ucd-snmp package installed and configured in your environment. This must also be activated in the php configuration. SNMP support is only required if you wish to read routing tables directly from routers.


3. Downloads, bugs and forums

You can report bugs, contribute to forums and download it here and look at the latest TODO and CHANGELOG.


3.1. Screenshots

You can find some screen shots here.


4. Mode of operation

There are two modes of operation, one can be classified as a services company and the other as an ISP.


4.1. Services company

As a services company your primary use of IPplan will be to manage individual IP address records and the address plan of one or more customers.


4.2. ISP

In ISP mode, you will assign blocks of IP address space to your customers. In this mode, you will not be concerned at all with individual IP address records and how the customer breaks down his assigned address space. When you operate as an ISP, you may also generate SWIP/registrar entries, which are only useful if you deal directly with ARIN or any other registrar. (SWIP is enabled in the config.php file, see ARIN tutorial for more details). All the relevant SWIP/registrar information is entered when the customer is created.

When using this mode, I suggest creating a dummy customer which holds all the allocated address space from your regional registrar (ARIN?) already broken up into the various blocks that you will eventually assign to your customers. All these blocks should be called "free" to allow them to be found using the "Find free" menu option. Once you are ready to assign a block, create a new customer with all the relevant SWIP/registrar information completed, go to your dummy customer and move a block of address space to the newly created customer, and finally generate a SWIP/registrar entry for the new block. In this mode areas and ranges are not too relevant except for the dummy customer (see concepts below). You may also need to create a template for your registrar in the templates directory. If you have done this, feel free to contribute it to IPplan.


5. Concepts

The flow of address management is based on the creation of areas, then ranges which belong to areas, and finally, subnets which belong to ranges. Actually, only subnets are required, but on large networks it makes logical sense to group the network into areas to ease administration and to reduce routing updates on the network. There is a jpeg drawing included with the distribution that graphically shows these relationships. The methodology employed borrows significantly from OSPF routing concepts which are explained more fully here.


5.1. Deployment strategy

So in a new installation, first create the areas, then create ranges adding them to areas, and finally create subnets. Searching is now a simple matter of selecting an area which will display all the ranges for the area, or selecting no area and simply selecting a range from the total list of ranges, or simply selecting a base network address.

Note that within a customer or autonomous system, no overlaps are allowed. This follows standard IP address rules. To handle challenges like NAT or other overlapping address space, you will be required to create multiple autonomous systems. See 'Searching' below how to see information across multiple autonomous systems.


6. Administration

The access control is divided up into three layers and revolves around the creation of groups:


6.1. Admin user

Firstly you will need to create users and groups using the admin user defined in the config.php script. The admin user can only be used on the admin pages. Once you are done with the admin functions, you will be required to re-authenticate as one of the newly created users as soon as you access functions on the main index page.


6.2. Customer access

When a customer is created, a group must be assigned to the customer. This will be the customers admin group and all members of this group can create and delete both subnets, ranges, areas and individual IP address records for the customer.

When the subnet is created, the creator will choose a subnet admin group.


6.3. Subnet access

The users assigned to the group that has subnet access can only modify individual IP records for that subnet.

Initially I would create three groups, one group that can create customers, one group that can create subnets, areas and ranges, and another group which can only modify individual IP records. Normally in large networks the people that modify IP records are not the same people that administer routers and configure the IP address space.

If a group is set to see only a particular customer, the same group needs to be used for all operations for the customer. The side effect to this is that the users assigned to the group have full access to the customer and can make any changes to the customers data, including creating and deletion of subnets. This is not ideal and will be changed in future.


6.4. Group authority boundaries

Areas of responsibility can be assigned to a group, thus limiting what address space a group can create networks in. The default behavior allows administration anywhere. Care should be taken when using this feature as changing the boundaries at a later stage may orphan some parts of the database and yield it inaccessible.

Bounds are also useful to create users that only have read access to the IPplan information. Create a very restrictive bound for the group the user belongs to outside your normal address space.


7. Searching

Creating a special customer called 'All' allows searching for information across all the available customer/autonomous systems using the 'Display subnet' function. This special customer can contain areas and ranges that limit the scope of searches, just like normal customers. Using this feature allows a user to see the entire network picture in one view.

When creating new subnets, it is also beneficial to create unused subnets with a a description of either 'free' or 'spare'. These can be searched for at a later stage using the 'Find Free' function.

It may also be beneficial to give ASE (Autonomous System External, networks not local to yours) a special handle like EXTERNAL so that they can be searched for at a later stage. These networks often appear in routing tables as static routes to third parties (not via the Internet).

Searching can also be done on individual addresses using the 'Match any IP address in subnet' option of the 'Display subnet information' option. This is useful for finding which networks, either for a single customer, or for all customers an IP address belongs to. Using this option makes it easy to find the offending network in a complaint situation if you are an ISP.


8. Config file

A couple of setting can be changed in the config.php file. These include the database connection information, admin user and password, and the number of lines displayed in tables.


9. Importing data

Data can be imported via TAB delimited text files or from output generated in XML format by NMAP. A typical application for this would be to obtain data for networks that there are no records for. NMAP would be used to obtain the host info of all the addresses that are active on the network. Once this is done, the data can be read into IPplan. The NMAP parameters are:

 -sP -oX output.xml

To speed up the process, you can add -n to not resolve host names. The import process also understands the -O operating system detection parameter. To use -O, you will need to drop the -sP parameter. Using -O increases scanning time significantly.


10. Templates

Templates for sending information to registrars should be well formed XML stylesheets. See the existing templates for examples and which variables are available. Currently only the xsl:value-of select="variable"/ tag is understood and all other tags are stripped. This is to prevent requiring the XSLT php library. In future XML stylesheets will be supported in full.


11. Authentication schemes

IPplan supports either its own internal authentication scheme, or an external scheme based on the Apache webservers authentication modules. To use an external scheme, change the setting in the config.php file. Next, place the relevant .htaccess file in the IPplan user subdirectory. Do not place an equivalent file in the admin subdirectory as the admin account cannot be overridden.

Note that the relevant users requiring access to IPplan must still be created via the admin interface, but no password information is required as this is taken care of by the external authenticator. If the user is removed from the external authenticators database, the user will no longer be able to log in to IPplan even if the account still exists. This scheme only handles single signon and password changes, not single point of administration.

External authentication was tested against SiteMinder and the Apache auth_ldap module.


12. Problems


13. Limitations


14. Questions and Answers

Check the forums on SourceForge too.

This is a collection of the most common questions people have had.