Cisco Prime Infraestructure
Cisco Prime Infraestructure
2 User Guide
November 9, 2015
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL
STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT
WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCBs public
domain version of the UNIX operating system. All rights reserved. Copyright 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED AS IS WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Cisco Prime Infrastructure 2.2 User Guide
2012-2015 Cisco Systems, Inc. All rights reserved.
CONTENTS
PART
Getting Started
CHAPTER
CHAPTER
Adding Licenses
1-1
2-1
CHAPTER
1-1
2-1
3-1
3-1
3-1
3-6
CHAPTER
3-8
3-10
3-11
3-11
Grouping Devices
4-1
CHAPTER
3-8
4-1
5-1
iii
Contents
PART
Viewing Dashboards
6-1
Adding Dashboards
6-3
Configuring Dashboards
6-3
CHAPTER
Troubleshooting Dashboards
6-7
6-7
7-1
PART
7-1
CHAPTER
8-3
9-1
9-1
9-2
8-4
8-5
8-1
8-3
CHAPTER
5-4
Watching Dashboards
CHAPTER
5-3
9-4
9-4
9-5
iv
OL-32122-01
Contents
CHAPTER
10
Monitoring Alarms
9-6
10-1
10-2
10-2
10-4
10-4
10-4
CHAPTER
11
CHAPTER
12
10-6
11-1
11-1
10-6
10-6
10-6
12-1
12-1
Monitoring Interferers
12-4
12-5
12-5
12-6
Chokepoints 12-7
Adding a Chokepoint to the Cisco Prime Infrastructure Database 12-7
Adding a Chokepoint to a Cisco Prime Infrastructure Map 12-8
Removing a Chokepoint from the Cisco Prime Infrastructure Database 12-9
Removing a Chokepoint from a Cisco Prime Infrastructure Map 12-9
Editing a Chokepoint 12-9
Wi-Fi TDOA Receivers 12-10
Enhancing Tag Location Reporting with Wi-Fi TDOA Receivers 12-10
Adding Wi-Fi TDOA Receivers to Cisco Prime Infrastructure and Maps
12-10
Contents
CHAPTER
13
CHAPTER
14
Troubleshooting
12-12
13-1
14-1
14-1
14-3
14-3
14-4
14-4
14-4
14-6
14-6
15
14-7
14-7
CHAPTER
14-5
14-9
15-1
15-2
PART
Configuring Devices
CHAPTER
15-3
16
16-1
16-1
16-2
16-3
16-4
vi
OL-32122-01
Contents
16-6
16-7
CHAPTER
17
17-1
17-12
17-2
17-13
17-13
17-14
17-19
vii
Contents
CHAPTER
18
18-1
18-1
CHAPTER
19
18-10
19-1
CHAPTER
20
CHAPTER
21
18-2
19-2
19-5
20-1
21-1
21-1
viii
OL-32122-01
Contents
21-20
21-23
21-27
ix
Contents
21-36
OL-32122-01
Contents
CHAPTER
22
22-1
22-8
22-8
22-10
22-12
PART
CHAPTER
CHAPTER
23
24
Viewing Devices
23-1
23-1
23-3
24-1
24-1
xi
Contents
24-2
24-2
24-3
24-3
24-4
24-7
24-7
CHAPTER
25
25-1
25-3
25-3
25-2
25-4
25-5
CHAPTER
26
25-6
26-1
Configuration Archives
25-5
26-1
26-2
26-3
26-5
26-6
26-6
26-6
26-7
xii
OL-32122-01
Contents
CHAPTER
27
27-1
27-1
27-2
27-3
27-3
27-3
27-4
27-4
27-5
27-5
PART
27-6
CHAPTER
27-4
28
28-1
28-1
28-1
28-2
28-3
28-3
28-3
xiii
Contents
CHAPTER
29
29-1
29-3
PART
29-11
CHAPTER
29-10
30
30-1
30-1
30-4
30-14
xiv
OL-32122-01
Contents
30-17
30-21
30-30
xv
Contents
CHAPTER
31
31-4
31-4
31-5
31-7
31-7
32-1
CHAPTER
32
Troubleshooting Applications
CHAPTER
33
Using Mediatrace
31-1
33-1
xvi
OL-32122-01
Contents
CHAPTER
34
CHAPTER
35
Application Servers
CHAPTER
36
Network Services
34-1
35-1
36-1
CHAPTER
37
36-1
37-1
37-1
37-1
37-3
CHAPTER
38
38-1
38-1
38-4
38-4
37-7
38-3
38-5
xvii
Contents
CHAPTER
39
39-1
39-1
39-2
39-2
CHAPTER
40
Managing Reports
40-1
40-2
40-3
APPENDIX
39-5
40-4
40-4
A-1
A-1
A-18
xviii
OL-32122-01
PART
Getting Started
Adding Licenses
Grouping Devices
CH A P T E R
Note
Classic viewCorresponds closely to the GUI in Cisco Prime Network Control System 1.1 or Cisco
Wireless Control System (WCS). The Cisco Prime Infrastructure Classic View Configuration Guide
for Wireless Devices, Release 2.2 describes features available in the classic view.
The Classic view is being deprecated and might not be available in future Prime Infrastructure releases.
Caution
You are strongly advised not to enable third-party browser extensions. In Internet Explorer, you can
disable third-party browser extensions by choosing Tools > Internet Options and unselecting the Enable
third-party browser extensions check box on the Advanced tab.
1-1
Chapter 1
Table 1-1
Task Area
Description
Used By
Dashboard
Monitor
Configure
Inventory
Maps
Services
Report
Administration
Network Engineers
1-2
OL-32122-01
CH A P T E R
Adding Licenses
You must purchase licenses to access the Cisco Prime Infrastructure features required to manage your
network. Each license also controls the number of devices that you can manage using those features.
You need a base license and the corresponding feature licenses (such as the assurance or the lifecycle
license) to get full access to the respective Prime Infrastructure features to manage a set number of
devices.
When you install Prime Infrastructure for the first time, you can access the lifecycle, assurance,
collector, and data center features using the built-in evaluation license that is available by default. The
default evaluation limitations are as follows:
The Lifecycle and Assurance license is valid for 60 days for 100 devices.
The Collector License is valid for 60 days for 20,000 Netflow per seconds.
Cisco Prime Infrastructure 2.2 Quick Start GuideContains descriptions of the different licenses,
how to order licenses, and license entitlement.
Step 2
Step 3
Select the licenses that you have ordered with the required device limit, then click Add.
Step 4
See the Cisco Prime Infrastructure 2.2 Administrator Guide for information about managing licenses,
deleting licenses, troubleshooting licensing issues, and verifying license details.
2-1
Chapter 2
Adding Licenses
2-2
OL-32122-01
CH A P T E R
Import devices from a CSV fileSee Importing Devices from Another Source.
Add devices manually by entering IP address and device credential informationSee Adding
Devices Manually.
Configuring discovery settingsThis method is recommended if you want to specify settings and
rerun discovery in the future using the same settings. See Running Discovery.
Running Quick DiscoveryQuick Discovery quickly ping sweeps your network and uses SNMP
polling to get details on the devices. See Running Quick Discovery.
Using ICMP ping, determine if each device is reachable. If Prime Infrastructure is unable to reach
the device, the device Reachability status is Unreachable.
2.
Verify the SNMP credentials. If the device is reachable by ICMP, but the SNMP credentials are not
valid, the device Reachability status is Ping Reachable.
If the device is reachable by both ICMP and SNMP, the device Reachability status is Reachable.
3.
3-1
Chapter 3
4.
5.
Running Discovery
Prime Infrastructure discovers devices with IPv4 and IPv6 addresses.
To run discovery, follow these steps:
Step 1
Step 2
Click New.
Step 3
Step 4
Table 3-1
Click Save to save your discovery settings and schedule your discovery to run at a specified time.
Field
Description
Protocol Settings
Prime Infrastructure gets a list of IP address ranges from a specified combination of IP address
and subnet mask, then pings each IP address in the range to check the reachability of devices.
See Sample IPv4 IP Addresses for Ping Sweep for more information.
Layer 2 Protocols
CDP Module
Prime Infrastructure reads the cdpCacheAddress and cdpCacheAddressType MIB objects in the
cdpCacheTable from CISCO-CDP-MIB on every newly found device as follows:
1.
The cdpCacheAddress MIB object is gathered from the current device. This provides a list
of neighbor device addresses.
2.
If the neighbor device addresses do not already exist in the global device list, they are added
to the local cache.
Select the Cross Router Boundary check box to specify that Prime Infrastructure should
discover neighboring routers.
LLDP
Advanced Protocols
Routing Table
Queries and analyzes routing tables on seed routers to discover subnets and next-hop routers.
This process discovers a router for every subnet on its list of known networks.
3-2
OL-32122-01
Chapter 3
Table 3-1
Field
Description
Address Resolution
Protocol
The ARP Discovery Module depends on the Routing Table Discovery Module (RTDM), and is
executed only when RTDM is processed. This precondition is identified based on the flags
processed by the ARP Discovery Module, which are part of the DeviceObject.
The entries coming out of the ARP Discovery Module do not need to pass through RTDM
because (per the router Discovery algorithm) active routers are those that RTDM must process
and identify.
When the ARP table is fetched and the entries are not already discovered by RTDM, these entries
(though they may represent routers) are not active routers and need not be passed on to RTDM.
This is ensured by setting the ARP Discovery Module flag to Processed and leaving the RTDM
flag set to Unprocessed.
When the RTDM comes across an entry with the RTDM flag unset and the ARP flag set, RTDM
identifies the entry as a inactive router or other device and it leaves the entry as unprocessed. The
ARP Discovery Module also ignores the entry according to the algorithm, based on the Processed
flag set against the ARP Discovery Module.
When the ARP Discovery Module is checked, the device MAC address needs to be updated in
the device information. Applications can retrieve this information in the adapter through the
DeviceInfo object. By scanning the device MAC address, the applications can distinguish
between Cisco and non-Cisco devices.
ARP cache from the device is collected using CidsARPInfoCollector. The MAC ID of the device
is retrieved from this data and set in the DeviceInfo object.
The BGP Discovery Module uses bgpPeerTable in the BGP4-MIB to find its BGP peer. The table
contains its peers IP addresses, which are added as clues to the local cache.
Open Shortest Path First (OSPF) protocol is an interior gateway routing protocol that uses the
ospfNbrTable and ospfVirtNbrTable MIBs to find neighbor IP addresses.
Filters
IP Filter
Includes or excludes devices based on IP address. For example, you can enter any of the
following strings and specify whether to include or exclude the devices found during discovery:
192.0.2.89
192.0.2.*
192.0.[16-32].89
[192-193].*.55.[16-32]
Advanced Filters
Includes or excludes devices based on the sysObjectID string set on the device.
DNS Filter
Includes or excludes devices based on the domain name string set on the device.
Credential Settings
Credential Set
The credential set lists all the available credential profiles in Prime Infrastructure. You can
associate credential profile with a range of IP addresses. The devices will be discovered based
on the selected credential profile. For more information see, Using Credential Profiles.
SNMPv2 Credential
SNMP community string is a required parameter for discovering devices in the network using
SNMPv2. You can enter multiple rows of credentials mapped to a specific IP address, or the IP
address can be a wildcard; for example, *.*.*.*, 10.1.1.*. You cannot save or use the discovery
settings if you do not specify SNMP credentials.
3-3
Chapter 3
Table 3-1
Field
Description
SNMP V3 Credential
Prime Infrastructure supports SNMPv3 discovery for devices. The following SNMP V3 modes
are available:
Telnet Credential
You can specify the Telnet credentials during discovery so that Prime Infrastructure can collect
the device configurations and fully manage the devices. If you do not specify Telnet credentials
in the discovery settings, Prime Infrastructure discovers the devices but is unable to collect the
full inventory of the device until you specify the Telnet credentials.
SSH Credential
For full device support via SSH, you must use SSHv2 with a 1024 bit key. You can configure
SSH before running discovery.
We recommend that you select SSHv2 as the protocol for communicating with the device CLI
because it allows the use of Web Services Management Agent (WSMA) for configuring devices.
(For more information see, Configuring the Device using WSMA.)
Preferred Management IP (how Prime Infrastructure attempts to find the preferred management address for devices)
Use Loopback IP
Prime Infrastructure uses the preferred management IP address from the loop back interface. If
the device does not have a loopback interface, Prime Infrastructure uses similar logic to the OSPF
algorithm to select the routers preferred management IP address.
Use SysName
Prime Infrastructure gets the preferred management IP address for the device using DNS lookup
of the SysName for the device.
Use DNS Reverse Lookup Prime Infrastructure gets the preferred management IP address by doing a reverse DNS lookup
on the device IP address, followed by a forward DNS lookup.
After running discovery, choose Inventory > Device Management > Network Devices. See Device
Work Center for more information.
Subnet Range
Number of Bits
Number of IP
Addresses
Sample Seed IP
Address
Start IP Address
End IP Address
255.255.240.0
20
4094
10.104.62.11
10.104.48.1
10.104.63.254
255.255.248.0
21
2046
10.104.62.11
10.104.56.1
10.104.63.254
255.255.252.0
22
1022
10.104.62.11
10.104.60.1
10.104.63.254
3-4
OL-32122-01
Chapter 3
Table 3-2
Subnet Range
Number of Bits
Number of IP
Addresses
Sample Seed IP
Address
Start IP Address
End IP Address
255.255.254.0
23
510
10.104.62.11
10.104.62.1
10.104.63.254
255.255.255.0
24
254
10.104.62.11
10.104.62.1
10.104.63.254
255.255.255.128
25
126
10.104.62.11
10.104.62.1
10.104.63.126
255.255.255.192
26
62
10.104.62.11
10.104.62.1
10.104.63.62
255.255.255.224
27
30
10.104.62.11
10.104.62.1
10.104.63.30
255.255.255.240
28
14
10.104.62.11
10.104.62.1
10.104.63.14
255.255.255.248
29
10.104.62.11
10.104.62.9
10.104.63.14
255.255.255.252
30
10.104.62.11
10.104.62.9
10.104.63.10
255.255.255.254
31
10.104.62.11
255.255.255.255
32
10.104.62.11
10.104.62.11
10.104.62.11
Step 2
Step 3
Verifying Discovery
When discovery has completed, you can verify that the process was successful.
To verify successful discovery, follow these steps:
Step 1
Step 2
Choose the discovery job for which you want to view details.
Step 3
Under Discovery Job Instances, expand the arrow to view details about the devices that were discovered.
If devices are missing:
Change your discovery settings, then rerun the discovery. See Table 3-1 for information about
discovery settings.
3-5
Chapter 3
Add devices manually. See Adding Devices Manually for more information.
Choose Inventory > Device Management > Network Devices, then click Bulk Import.
Step 2
Step 3
Enter or browse to the CSV file that contains the devices that you want to import.
Step 4
Click the link to download a sample file that contains all of the fields and descriptions for the information
that must be contained in your imported file. See Figure 3-1.
Figure 3-1
Make sure that you retain the required information in the CSV file as explained in CSV File
Requirements for Importing Devices.
If the importing CSV file contains any UDF parameters, ensure that UDF is configured in
Administration > System Settings > User Defined Field prior to importing the devices. The UDF
column in the CSV file must be begin with UDF: as indicated in the sample CSV template.
Step 5
Click Import.
Step 6
Step 7
Click the arrow to expand the job details and view the details and history for the import job.
3-6
OL-32122-01
Chapter 3
in Figure 3-1.
When you download a sample CSV template for importing devices or sites, the extent to which Prime
Infrastructure can manage your devices depends on the information you provide in the CSV file. If you
do not provide values for CLI username, password, and enable password, Prime Infrastructure will have
limited functionality and cannot modify device configurations, update device software images, and
perform many other valuable functions. You can specify the credential profile in the CSV file to apply
the credentials to a set of devices. If you specify the credential profile and also enter the values manually
in the CSV file then the manually entered credentials takes high priority and the device is manged based
on the combination of manually entered credentials and credential profile. For example, if the CSV file
contains credential profile with SNMP and Telnet credentials in addition to manually entered SNMP
credentials then the device is managed based on the manually entered SNMP credentials and the Telnet
credentials in the credential profile.
For partial inventory collection in Prime Infrastructure, you must provide the following values in the
CSV file:
Device IP address
SNMP version
SNMP read-only community strings
SNMP write community strings
SNMP retry value
SNMP timeout value
For full inventory collection in Prime Infrastructure, you must provide the following values in the
CSV file:
Device IP address
SNMP version
SNMP read-only community strings
SNMP write community strings
SNMP retry value
SNMP timeout value
Protocol
You must also provide values for the fields that correspond to the protocol you specify. For
example, if you specify SNMPv3, you must specify values for the SNMPv3 fields in the sample
CSV file such as the SNMPv3 username and authorization password.
CLI username
CLI password
CLI enable password
CLI timeout value
3-7
Chapter 3
After adding a device in the Converged view with profile, if you edit the device (which is associated with
Credential Profile) in the Classic view, the Credential Profile association of the device is removed.
To add devices manually, follow these steps:
Step 1
Step 2
Step 3
Complete the required fields. See Enabling IPSec Communication When Adding Devices for
information about enabling IPSec.
Step 4
(Optional) Click Verify Credentials to verify the device credentials before adding the device.
Note
Step 5
Prime Infrastructure provides HTTP credentials verification support for NAM devices only.
Click Add to add the device with the settings you specified.
Note
User Defined Field (UDF) parameters are available only if you added them under
Administration > System Settings > User Defined Field. Do not use the special characters : ;
and # for UDF field parameters.
Step 2
Step 3
Step 4
Under IPSec Parameters, click Enable IPSec Communication, then complete the required fields.
Step 5
Click Add to add the device with the settings you specified.
3-8
OL-32122-01
Chapter 3
Verify that the devices you have added appear in the list. Click a device name to view the device
configurations and that the software images that Prime Infrastructure collected from the devices.
View details about the information that was collected from the device by hovering your mouse
cursor over the Inventory Collection Status field and clicking the icon that appears.
Check the Device Reachability Status column. See Table 3-3 for status descriptions. HTTP/HTTPS
parameters are verified on NAM devices only.
Check the Admin Status column. See Table 3-4 for descriptions of the possible Admin Status values.
To view details about the collection job and the details and history for the import job, choose
Administration > Jobs.
See Troubleshooting Unmanaged Devices for information about how to resolve any errors.
Table 3-3
Reachability Color
Description
Green
Yellow
The device is reachable using Ping, but not via SNMP. Verify that you specified the correct SNMP
parameters for read access when the device was added to Prime Infrastructure.
Red
Prime Infrastructure is unable to reach the device using Ping. Verify that the device is operational
and connected to the network.
Table 3-4
Admin Status
Description
Managed
The device has been added successfully to Prime Infrastructure using SNMP.
Unmanaged
The device credentials are incorrect or you have exceeded the number of devices allowed by your
license. Choose Administration > Licenses to view the status of your license. See the Cisco Prime
Infrastructure 2.2 Administrator Guide for information about managing licenses, troubleshooting
licensing issues, and verifying license details.
3-9
Chapter 3
Step 2
Step 3
Step 4
Click Update to update the parameters of all of the selected devices or Update & Sync to update and
synchronize the devices with the updated parameters.
Synchronizing Devices
To synchronize the Prime Infrastructure database with the configuration running on a device, you can
force an inventory collection.
To synchronize devices, follow these steps:
Step 1
Step 2
Select the device whose configuration you want synchronized with the configuration stored in the Prime
Infrastructure database.
Step 3
Click Sync.
Choose Inventory > Device Management > Network Devices > Device Type > Cisco Interfaces and
Modules > Network Analysis Modules.
Step 2
Step 3
ProtocolSelect the HTTP protocol, HTTP or HTTPS. The TCP Port will change automatically to
the default port for the protocol that you have selected.
TCP PortEnter a different TCP Port if you want to override the default.
3-10
OL-32122-01
Chapter 3
Step 4
UsernameEnter the name of a user who can access the NAM via HTTP or HTTPS.
Choose Update.
Related Topics
Exporting Devices
In Prime Infrastructure, you can export device information as a CSV file. Prime Infrastructure does not
export credential profiles.
To export devices, follow these steps:
Step 1
Step 2
Select the devices that you want to export, then click Export Device.
Step 3
Enter an encryption password that will be used to open the exported CSV file.
Step 4
Confirm the encryption Password and click Export to export the device information.
Step 5
Double-click the ExportDevice.zip file and enter the encryption password to open the ExportDevice.csv
file.
Caution
The device export CSV file includes all device credentials and should be handled with appropriate care.
Similarly, the privilege to allow device export should be assigned to appropriate users only.
Next Steps
Now that you have added devices to Prime Infrastructure, you can create device groups and port groups
to simplify management, monitoring, and configuration of similar devices and ports. See Grouping
Devices.
You might also want to:
Plan for devices that will be added to your network in the futureSee Preconfiguring Devices to be
Added Later.
Configure wired and wireless features on your devices using guided, step-by-step instructionsSee
Getting Help Setting Up Access Switches.
3-11
Chapter 3
Next Steps
3-12
OL-32122-01
CH A P T E R
Grouping Devices
After you add devices to Cisco Prime Infrastructure, you can organize the devices into logical groupings
to simplify management, monitoring, and configuration. When you group devices, you can perform
operations on the entire group instead of selecting individual devices.
StaticCreate and name a new device group to which you can add devices using the Add to Group
button from Inventory > Device Management > Network Devices > Groups & Sites or Inventory
> Grouping > Location & Device.
DynamicCreate and name a new device group and specify the rules to which devices must comply
before they are added to this device group. You do not add devices to dynamic groups. Prime
Infrastructure adds devices that match the specified rules to the dynamic group from Inventory >
Grouping > Location & Device.
MixedCreate and name a new device group to which you can add devices manually and specify
the rules to which devices must comply before they are added to this device group from Inventory
> Grouping > Location & Device.
Choose Inventory > Grouping > Location & Device or Inventory > Device Management > Network
Devices.
Step 2
In the Device Group pane on the left, click the Add icon, then choose Create User Defined Group.
Step 3
Step 4
Step 5
Add Device ManuallyYou add devices to the group based on your needs.
Add Device DynamicallyYou specify the rules to which devices must comply before they are
added to this device group. You do not add devices to dynamic groups. Prime Infrastructure adds
devices that match the specified rules to the dynamic group.
Click Preview to view the devices that are automatically added to the group based on the specified rule
and the manually added devices.
4-1
Chapter 4
Grouping Devices
Step 6
Click Save.
The device group that you created appears under the User Defined folder.
See, Grouping Devices and Ports for information about device groups, location groups, and port groups.
4-2
OL-32122-01
CH A P T E R
You can also configure Prime Infrastructure to monitor more advanced information:
Step 2
Step 3
Complete the basic template fields, select the attributes that you want to monitor (for example, Interface
Availability, ifInErrors, ifOutErrors, inputUtilization, and outputUtilization), then click Save and
Activate.
Step 4
Select the new template, then click Port Groups > User Defined, select the port group you previously
created (see Creating Customized Port Groups for more information about creating port groups), then
click Submit.
Step 5
To display the results, choose Dashboards > Network Interface, and view the Top N Interface
Utilization dashlet.
5-1
Chapter 5
Step 6
Edit the Top N Interface Utilization dashlet and add the port group that you previously created.
Related Topic
Step 1
Step 2
1.
2.
Verify the utilization and availability of the WAN interfaces from the Site dashboard.
b.
From the menu on the left, choose System Defined > WAN Interfaces.
c.
b.
5-2
OL-32122-01
Chapter 5
Use the User 360 View, you can identify possible problems with the end users authentication and
authorization for network access.
Prime Infrastructure displays ISE Profiling attributes only for authenticated endpoints.
Step 2
From the Select a command drop-down list, choose Add ISE Server, then click Go.
Step 3
Step 2
From the Select a command drop-down list, choose Add ACS View Server, then click Go.
5-3
Chapter 5
Step 3
Enter the port number of the ACS View Server you are adding. (Some ACS View Servers do not allow
you to change the port on which HTTPS runs.)
Step 4
Enter the password that was established on the ACS View Server. Confirm the password.
Step 5
Specify the time, in seconds, after which the authentication request times out and a retransmission is
attempted by the Cisco WLC controller.
Step 6
Step 7
Click Save.
You must specify the HTTP/HTTPS credentials for each NAM (see Adding NAM HTTP/HTTPS
Credentials).
Step 1
Step 2
In the NAM Data Collector section, select all of the NAMs for which you want to enable data collection.
Step 3
Click Enable.
Related Topic
5-4
OL-32122-01
Chapter 5
Step 2
Click Add, then select NAM Health under the Policy Types list.
Step 3
Select the NAM devices from which you want to collect data, then complete the required fields.
Step 4
Under Parameters and Thresholds, specify the parameters you want to poll from the NAM devices and
threshold conditions.
Step 5
IOS Versions
Supported NetFlow
Device Type Supporting NetFlow Export Types
Cisco ASR
IOS XE 3.11 to
15.4(1) S, and later
Easy PerfMon
based config
(EzPM)
Application Response
Time (ART)
Netflow-Traffic-ConvNetflow-App-TrafficNetflow-Traffic-Voice-Video
-
Netflow-URL-
Netflow-Aggregated-TrafficStats-
Application Traffic
Stats
IOS XE 3.9, 3.10
Netflow-Traffic-HostNetflow-App-TrafficNetflow-Voice-VideoNetflow-URLNetflow-AVC-Troubleshooti
ng-
AVC Troubleshooting
5-5
Chapter 5
Table 5-1
IOS Versions
Supported NetFlow
Device Type Supporting NetFlow Export Types
Cisco ISR
15.1(3) T
Easy PerfMon
based config
(EzPM)
Application Response
Time (ART)
Netflow-App-TrafficNetflow-Traffic-Voice-Video
-
Netflow-URL-
Netflow-Aggregated-TrafficStats-
Application Traffic
Stats
IOS XE 3.9, 3.10
Netflow-Traffic-Conv-
Netflow-Traffic-HostNetflow-App-TrafficNetflow-Voice-VideoNetflow-URLNetflow-AVC-Troubleshooti
ng-
AVC Troubleshooting
5-6
OL-32122-01
Chapter 5
Table 5-1
IOS Versions
Supported NetFlow
Device Type Supporting NetFlow Export Types
Cisco ISR
G2
15.1(4) M and
15.2(1) T
15.2(4) M and
15.3(1)T
Netflow-Traffic-ConvNetflow-App-TrafficNetflow-Voice-Video-
Netflow-Traffic-ConvNetflow-App-TrafficNetflow-Traffic-Voice-Video
Netflow-App-Traffic-URL-
Netflow-Traffic-Conv-
Format: V5, V9
Cisco
Catalyst
3750-X,
3560-X
15.0(1)SE
IP base or IP
services feature set
and equipped with
the network
services module.
Netflow-Traffic-Conv-
Format: V9
5-7
Chapter 5
Table 5-1
IOS Versions
Supported NetFlow
Device Type Supporting NetFlow Export Types
Cisco
Catalyst
3850
(wired)
15.0(1)EX and later TCP/UDP conversation TCP/UDP: Create a custom CLI Netflow-Traffic-Convtemplate. See Configuring
traffic
Netflow-Voice-VideoNetFlow on Catalyst 3000,
Voice & Video
4000, and 6000 Family of
Switches
Voice & Video: Use Medianet
Perfmon CLI template. Choose
Configuration > Templates >
Features & Technologies >
CLI Templates > System
Templates - CLI >Medianet
PerfMon
Format: V9
Cisco
Catalyst
3850
(wireless)
Cisco IOS XE
Release 3SE
(Edison)
Cisco
CT5760
Controller
Katana
5760
Format: V9
Netflow-Traffic-Conv-
Format: V9
(Wireless)
Cisco
Catalyst
4500
15.0(1)XO and
TCP/UDP conversation TCP/UDP: Create a custom CLI Netflow-Traffic-Convtemplate. See Configuring
15.0(2)SG onwards traffic
Netflow-Voice-VideoNetFlow on Catalyst 3000,
Voice & Video
4000, and 6000 Family of
Switches.
Voice & Video: Use Medianet
Perfmon CLI template. Choose
Configuration > Templates >
Features & Technologies >
CLI Templates > System
Templates - CLI >Medianet
PerfMon
Format: V9
5-8
OL-32122-01
Chapter 5
Table 5-1
IOS Versions
Supported NetFlow
Device Type Supporting NetFlow Export Types
Cisco
Catalyst
6500
15.1(1)SY and later TCP /UDP conversation TCP/UDP: Create a custom CLI Netflow-Traffic-Convtemplate. See Configuring
traffic
Netflow-Voice-VideoNetFlow on Catalyst 3000,
Voice & Video
4000, and 6000 Family of
Switches.
Voice & Video: Use Medianet
Perfmon CLI template. Choose
Configuration > Templates >
Features & Technologies >
CLI Templates > System
Templates - CLI >Medianet
PerfMon
Format: V9
Choose Configuration > Templates > Features & Technologies > CLI Templates > CLI.
Step 2
Hover your mouse cursor over the information icon and click New to create a new CLI template.
Step 3
Enter a name for the new CLI template (for example, Prime_NF_CFG_CAT2K).
Step 4
Step 5
In the Template Detail > CLI Content text box, enter the following commands, modifying them as
needed for your network (note that these commands are only an example):
flow record PrimeNFRec
match ipv4 protocol
match ipv4 source address
match ipv4 destination address
match transport source-port
match transport destination-port
collect counter bytes long
collect counter packets long
!
!
flow exporter PrimeNFExp
destination 172.18.54.93
transport udp 9991
option exporter-stats timeout 20
!
!
flow monitor PrimeNFMon
record PrimeNFRec
exporter PrimeNFExp
interface GigabitEthernet3/0/1
ip flow monitor PrimeNFMon input
5-9
Chapter 5
Step 6
Click Save as New Template. After you save the template, deploy it to your devices (see Creating and
Deploying Feature-Level Configuration Templates).
Choose Configuration > Templates > Features & Technologies > CLI Templates > CLI.
Step 2
Hover your mouse cursor over the information icon and click New to create a new CLI template.
Step 3
Enter a name for the new CLI template (for example, Prime_NF_CFG_CAT3K_4K).
Step 4
Step 5
In the Template Detail > CLI Content text box, enter the following commands, modifying them as
needed for your network (note that these commands are only an example):
flow record PrimeNFRec
match ipv4 protocol
match ipv4 source address
match ipv4 destination address
match transport source-port
match transport destination-port
collect counter bytes long
collect counter packets long
!
!
flow exporter PrimeNFExp
destination 172.18.54.93
transport udp 9991
option exporter-stats timeout 20
!
!
flow monitor PrimeNFMon
record PrimeNFRec
exporter PrimeNFExp
interface GigabitEthernet3/0/1
ip flow monitor PrimeNFMon input
Step 6
Click Save as New Template. After you save the template, deploy it to your devices (see Creating and
Deploying Feature-Level Configuration Templates).
5-10
OL-32122-01
Chapter 5
Choose Configuration > Templates > Features & Technologies > CLI Templates > CLI.
Step 2
Hover your mouse cursor over the information icon and click New to create a new CLI template.
Step 3
Enter a name for the new CLI template (for example, Prime_NF_CFG_MACE).
Step 4
Step 5
In the Template Detail > CLI Content text box, enter the following commands, modifying them as
needed for your network (note that these commands are only an example)
flow record type mace mace-record
collect application name
collect art all
!
flow exporter mace-export
destination <PI_SERVER_IP_ADDRESS>
source GigabitEthernet0/1
transport udp 9991
!
flow monitor type mace mace-monitor
record mace-record
exporter mace-export
cache timeout update 600
class-map match-all PrimeNFClass
match protocol ip
exit
policy-map type mace mace_global
class PrimeNFClass
flow monitor mace-monitor
exit
exit
interface GigabitEthernet 0/1
mace enable
Step 6
Click Save as New Template. After you save the template, deploy it to your devices (see Creating and
Deploying Feature-Level Configuration Templates).
5-11
Chapter 5
5-12
OL-32122-01
CH A P T E R
Global Toolbars
User Idle TimeoutYou can disable or configure this setting, which ends your user session
automatically when you exceed the timeout. It is enabled by default and is set to 15 minutes.
Global Idle TimeoutThe Global Idle Timeout setting overrides the User Idle Timeout setting. The
Global Idle Timeout is enabled by default and set to 15 minutes. Only users with administrative
privileges can disable the Global Idle Timeout timeout or change its time limit.
6-1
Chapter 6
Step 1
Step 2
Step 3
Click Save.
Related Topics
Step 2
Change the setting in the Items Per List Page drop down.
Step 3
Click Save.
Related Topic
6-2
OL-32122-01
CH A P T E R
Viewing Dashboards
Dashboards display at-a-glance views of the most important data in your network. Dashboards contain
dashlets that consist of visual displays such as tables and charts.
Note
Adobe Flash Player must be installed before you can view the dashlets on a Cisco Prime Infrastructure
dashboard.
Dashboards provide status and alerts, monitoring, and reporting information. A quick scan of a
dashboard should let you know if anything needs attention. Use the filters at the top of the dashboards
to specify the information that is displayed.
Dashboards contain dashlets that consist of visual displays such as tables and charts. You can drag and
drop dashlets to any location in the dashboards. Hover your mouse cursor over any dashlet, and the
following icons appear in the top-right corner of the dashboard.
Figure 7-1
Dashlet Icons
Dashlet options include editing the dashlet title, refreshing the dashlet, or changing the
dashlet refresh interval. (To disable refresh, unselect Refresh Dashlet.)
Dashlet help includes a picture of the dashlet, a description, the data sources used to populate
the dashlet, and any filters you can apply to the dashlets data.
Maximize the dashlet. A restore icon appears, allowing you to restore the dashlet to its
default size.
Collapse the dashlet so that only its title appears. An expand icon appears.
7-1
Chapter 7
Viewing Dashboards
Dashlet badges indicate which filters were applied when generating the contents of each dashlet.
Figure 7-2
Dashlet Badges
Network aware filter. Use this filter to collect data for all devices, wired devices, wireless
devices, or a specific wireless SSID.
Site filter. Use this filter to collect data associated with an AP or a controller located at a
predefined location.
Application filter. Use this filter to collect data based on a service, an application within a
service, up to ten separate applications, or all applications.
Time frame filter. Use this filter to collect data for a preset time period, or you can specify
a beginning and ending date.
You can customize the predefined set of dashlets depending on your network management needs. You
can organize the information in user-defined dashboards. The default view comes with default
dashboards and pre-selected dashlets for each.
Note
The label Edited next to the dashlet heading indicates that the dashlet has been customized. If you
reset to the default settings, the Edited label is cleared.
When an upgrade occurs, the arrangement of dashlets in a previous version is maintained. Because
of this, dashlets or features added in a new release are not displayed. Click the Manage Dashboards
link to discover new dashlets.
The horizontal and vertical scrollbars are visible if you zoom the dashlets. Reset the zoom level back
to zero, or no zoom for viewing the dashlets without the scrollbars.
7-2
OL-32122-01
Chapter 7
Viewing Dashboards
Adding Dashboards
Adding Dashboards
To add a create a custom dashboard:
Step 1
Click the Settings icon (see Figure 7-3) and choose Add New Dashboard.
Figure 7-3
Step 2
Step 3
Choose the new dashboard and add dashlets to it (see Adding Dashlets).
Configuring Dashboards
After an upgrade, the arrangement of dashlets in the previous version is maintained. Therefore, dashlets
or features added in a new release are not displayed. To display new dashlets, click the Settings icon
(shown in Figure 7-3) and choose Manage Dashboards.
To restore a dashboard to the default settings:
Step 1
Click the Settings icon (shown in Figure 7-3) and choose Manage Dashboards.
Step 2
Adding Dashlets
A subset of the available dashlets is automatically displayed in the dashboards. To add a dashlet that is
not automatically displayed to a dashboard:
Step 1
Choose Dashboards, then select the dashboard to which you want to add the dashlet.
Step 2
Click the Settings icon (see Figure 7-3), then choose Add Dashlets.
Step 3
Find the dashboard heading in the drop-down list; you can add any of the dashlets under that heading to
that dashboard.
7-3
Chapter 7
Viewing Dashboards
Adding Dashlets
Table 7-1 lists the default dashlet options that you can add in your Prime Infrastructure home page.
Table 7-1
Default Dashlets
Dashlet
Description
Displays the access point name and the amount of time (in days, minutes, and seconds)
that it took for the access point to join.
AP Threats/Attacks
Displays various types of access point threats and attacks and indicates how many of
each type have occurred.
AP Uptime
Displays each access point name and amount of time it has been associated.
Ad hoc Rogues
Displays ad hoc rogues for the previous hour, previous 24 hours, and total active.
Displays wired IPS events for the previous hour, previous 24 hours, and total active.
Client
Displays the five most recent client alarms with client association failures, client
authentication failures, client WEP key decryption errors, client WPA MIC errors, and
client exclusions.
Client Count
Displays the trend of associated and authenticated client counts in a given period of
time.
Client Distribution
Displays how clients are distributed by protocol, EAP type, and authentication type.
Displays client security events within the previous 24 hours including excluded client
events, WEP decrypt errors, WPA MIC errors, shunned clients, and IPsec failures.
Client Traffic
Displays the client traffic for wired and wireless clients. For displaying wired client
traffic on Traffic Dashlet, Identity Service Engine (ISE) should be integrated with
Prime Infrastructure, and wired devices should be configured with the ISE server, using
802.1x Port or MAC Authentication.
Client Troubleshooting
Allows you to enter a MAC address of a client and retrieve information for diagnosing
the client in the network.
Displays the client count detected by the context aware service within the previous 15
minutes.
Displays the average, maximum, and minimum memory usage as a percentage for the
controllers.
Coverage Areas
Displays the list coverage areas and details about each coverage area.
Displays friendly rogue access points for the previous hour, previous 24 hours, and total
active.
7-4
OL-32122-01
Chapter 7
Viewing Dashboards
Adding Dashlets
Table 7-1
Dashlet
Description
Displays the Chart summarizing the status for the following device types:
Controllers
Switches
Autonomous APs
Radios
MSEs
Inventory Status
Displays the total number of client controllers and the number of unreachable
controllers.
LWAPP Uptime
Displays the access point name and the amount of its uptime in days, minutes, and
seconds.
Displays the Worst AP node hop counts from the root AP.
Displays the worst Mesh AP links based on the packet error rates of the links.
Displays the worst Mesh AP links based on the SNR values of the links.
Displays the five most recent access point alarms. Click the number in parentheses to
open the Alarms page which shows all alarms.
Displays the five most recent security alarms. Click the number in parentheses to open
the Alarms page.
7-5
Chapter 7
Viewing Dashboards
Adding Dashlets
Table 7-1
Dashlet
Description
Displays the total managed device count, number of available access points (APs) and
total count of managed unreachable devices in the network.
The Unified AP Reachability can be any of the following:
If the admin status of the Unified AP is down, it will not be shown anywhere on the
network device summary dashlet.
The AP reachability information is defined as follows:
Network Topology
Recent Alarms
Displays the five most recent alarms by default. Click the number in parentheses to
open the Alarms page.
Recent Malicious Rogue AP Alarms Displays the recent malicious rogue AP alarms.
Recent Rogue Alarms
Displays the five most recent rogue alarms. Click the number in parentheses to open the
Alarms page which shows the alarms.
Security Index
Displays the security index score for the wireless network. The security index is
calculated as part of the 'Configuration Sync' background task.
Displays unclassified rogue access points for the previous hour, previous 24 hours, and
total active.
Client Count By
Association/Authentication
Note
Note
The wired clients connected to open ports are counted as authenticated although
authentication did not really happen due to open policy. This is also applicable
for the wireless clients connected to an OPEN WLAN. When two areas overlap,
the color is blended in the dashlet.
7-6
OL-32122-01
Chapter 7
Viewing Dashboards
Adding Dashlets
Step 2
Select the Override Dashlet Time Filter check box, choose Past 24 Hours from the Time Frame
drop-down list, then click Save And Close.
The dashlet displays the last 24 hours of data. The label Edited next to the Time Frame dashlet badge
with a red diagonal line over the badge indicates that the filter has been customized.
You must create at least one custom monitoring policy (for example, see Creating New Monitoring
Policies).
To create a generic dashlet:
Step 1
Choose Dashboards.
Step 2
Click the Settings icon (see Figure 7-3), then choose Add Dashlets.
Step 3
Find the Generic Dashlet and click Add. The Generic Dashlet appears on the dashboard.
Step 4
To edit the dashlet, hover your cursor over the Generic Dashlet and click Dashlet Options.
Step 5
Step 6
From the Template Name drop-down list, choose the custom template that you created, then click Save.
7-7
Chapter 7
Viewing Dashboards
Adding Dashlets
7-8
OL-32122-01
PART
Monitoring Alarms
Troubleshooting
CH A P T E R
Device health metrics on supported routers, switches and hubs. Storage devices and UCS series
devices are not monitored by the default health policy. See Modifying Default Monitoring Policies.
You can also enable other Prime Infrastructure monitoring policies or create a custom MIB polling
policy (see Monitoring Third-Party Devices By Polling MIBs).
Device ParameterTable 8-1 describes the device health parameters that are polled.
Interface ParameterTable 8-2 describes the interface parameters that are polled.
For the following monitoring policies that provide assurance information, data is collected through
NetFlow or NAMs:
Table 8-1
NAM Health
Traffic Analysis
Metric
Devices Polled
MIB
Device Availability
SNMPv2-MIB
sysUpTime
CPU Utilization
CISCO-PROCESS-MIB
cpmCPUTotalPhysicalIndex
cpmCPUTotal1minRev
8-1
Chapter 8
Table 8-1
Metric
Devices Polled
MIB
Memory Pool
Utilization
CISCO-MEMORY-POOL-MIB ciscoMemoryPoolName
ciscoMemoryPoolType
ciscoMemoryPoolUsed /
ciscoMemoryPoolUsed
(ciscoMemoryPoolUsed +
ciscoMemoryPoolFree
ciscoMemoryPoolFree)) * 100
CISCO-MEMORY-POOL-MIB
CISCO-ENVMON-MIB
entSensorValue
CISCO-ENVMON-MIB
ciscoEnvMonTemperatureStatusValue
Environment Temp
Table 8-2
(cempMemPoolUsed /
(cempMemPoolUsed +
cempMemPoolFree)) * 100
Metric
Devices Polled
MIB
Interface
Availability
Input Utilization
IF-MIB,
Old-CISCO-Interface-MIB
ifHCInBroadcastPkts,
ifHCInMulticastPkts, ifInErrors,
ifInDiscards, ifInUnknownProtos
ifHCInBroadcastPkts,
ifHCInMulticastPkts
Output Utilization
IF-MIB,
Old-CISCO-Interface-MIB
ifHCInBroadcastPkts,
ifHCInMulticastPkts, ifHCInUcastPkts,
ifInDiscards, ifInUnknownProtos,
locIfInputQueueDrops
IF-MIB,
Old-CISCO-Interface-MIB
ifHCOutBroadcastPkts,
ifHCOutMulticastPkts,
ifHCOutUcastPkts, ifOutDiscards,
ifOutUnknownProtos,
locIfOutputQueueDrops
8-2
OL-32122-01
Chapter 8
Table 8-3
Metric
Devices Polled
MIB
QOS calculation
CISCO-CLASS-BASED-QOSMIB
cbQosCMDropByte64
cbQosCMPostPolicyByte64
cbQosCMPrePolicyByte64
Interface Inbound
Errors
IF-MIB
ifInErrors
Interface Outbound
Errors
IF-MIB
ifOutErrors
Interface Inbound
Discards
IF-MIB
ifInDiscards
Interface Outbound
Discards
IF-MIB
ifOutDiscards
Step 2
Click Automonitoring.
Step 3
Save and Activate to save and activate the policy immediately on the selected devices.
Save and Close to save the policy and activate it at a later time.
Step 2
Click Add.
Step 3
Step 4
Step 5
Under Parameters and Thresholds, specify the threshold values for which you want Prime Infrastructure
to issue an alarm when they are reached.
8-3
Chapter 8
Step 6
Click:
Save and Activate to save and activate the policy immediately on the selected devices.
Save and Close to save the policy and activate it at a later time.
Upload the SNMP MIB for the device type, then choose devices and attributes to poll and the polling
frequency.
Upload a single MIB definition file or a group of MIBs with their dependencies as a ZIP file.
Note
Ensure that you upload all the dependencies, before uploading the MIB. You can also upload the
MIB along with its dependencies in a ZIP file.
Display the results as a line chart or a table.
This feature allows you to easily repeat polling for the same devices and attributes and customize the
way Cisco devices are polled using SNMP.
You can create a maximum of 25 custom MIB polling policies.
To create a custom MIB polling policies, follow these steps:
Step 1
Step 2
Step 3
Step 4
Under the MIB Selection tab, specify the polling frequency and enter the MIB information.
If Prime Infrastructure doesnt have the specific MIB you want to monitor, download the MIBs you
want to monitor from the following URL:
http://tools.cisco.com/Support/SNMP/do/BrowseMIB.do?local=en&step=2
To upload a MIB, specify a filename extension only if you are uploading a ZIP file.
Note
Step 5
Regardless of the device, the extensions .ZIP,.MIB and .MY are allowed.
If you are uploading a ZIP file, ensure that all dependent MIB files are either included in the ZIP or
already present in the system.
Ensure your upload file and the MIB definition have the same name (for example: Do not rename
the ARUBA-MGMT-MIB definition file to ARUBA_MGMT). If you are uploading a ZIP file, you
may name it as you please, but the MIB files packaged inside it must also follow this convention (for
example: MyMibs.zip is acceptable, as long as all MIB files in the ZIP match their MIB names).
To test the policy you created on a device before activating it, click the Test tab and select a device on
which to test the new policy.
8-4
OL-32122-01
Chapter 8
Step 6
Click Save and Activate to immediately activate the policy on the devices specified.
Step 7
To view the MIB polling data, create a generic dashlet (see Creating Generic Dashlets) using the name
of the policy that you created.
To view the SNMP polling date for ASR devices, you should use the show platform hardware qfp
active datapath utilization | inc Processing command for CPU utilization and show platform
hardware qfp active infrastructure exmem statistics | sec DRAM command for memory utilization.
Note
Step 2
Step 3
Step 4
Step 5
Under the MIB Selection tab, click Upload MIB and navigate to the MIB that you uploaded in Step 1.
Step 6
From the Tables pulldown menu, select a table, then select the specific metrics to monitor.
Step 7
To test the policy you created on a device before activating it, click the Test tab and select a device on
which to test the new policy.
Step 8
Select the devices for which you want to monitor IP SLA metrics.
Step 9
Click Save and Activate to immediately activate the policy on the devices specified.
Step 10
To monitor this information from a dashboard, you need to create a generic dashlet. See Creating Generic
Dashlets for more information.
Step 2
Step 3
Select a template.
Step 4
Step 5
Click:
8-5
Chapter 8
Save and Close to save the policy and activate it at a later time.
8-6
OL-32122-01
CH A P T E R
Monitoring Jobs
Choose Administration > Settings > Background Tasks to view scheduled tasks. The Background
Tasks page appears.
Step 2
Execute NowRuns all of the data sets with a selected check box.
Disable TasksPrevents the data set from running on its scheduled interval.
9-1
Chapter 9
Task
Description
Manage devices
After you set up a site group profile, you can Add to Group button located at the top of the
add devices to it.
Device Work Center page under Groups &
Sites.
To add devices to site groups in Device Work
Center, add them to Group and then select
site group.
To add devices to site maps, go to the Maps >
Site Maps page.
Note
Note
9-2
OL-32122-01
Chapter 9
Table 9-1
Task
Description
From the Cisco.com home page, navigate to Products & Services > Cloud and Systems Management.
Click View All Products, then click Routing and Switching Management > Cisco Prime
Infrastructure, select the latest version and then click Compliance Policy Updates.
9-3
Chapter 9
Monitoring Jobs
Step 2
Download the CompliancePolicyUpdates.vX-y.jar patch file, where X is the major version and y is the
minor version.
Step 3
Step 4
Step 5
From the Prime Infrastructure GUI, select the downloaded CompliancePolicyUpdates.vX-y.jar file from
your local system, choose Administration > Import Policy Updates, then click Browse.
The Import Policy Updates menu appears only if you have enabled the Compliance Service
(Administration > System Settings) as described in Configuring Server Settings.
Step 6
To import the CompliancePolicyUpdates.vX-y.jar patch file into the Compliance Engine, click Upload.
Step 7
After you see the message indicating the file was successfully imported, restart the Prime Infrastructure
server. See Restarting the Prime Infrastructure Server.
Step 8
Step 2
Run the following commands (in the order specified) from the admin prompt:
admin# ncs stop
admin# ncs start
Monitoring Jobs
Use the Jobs dashboard to:
View all running and completed jobs and corresponding job details
Filter jobs to view the specific jobs in which you are interested
Modify jobs, including deleting, editing, running, canceling, pausing, and resuming jobs
Prime Infrastructure can have a maximum of 25 jobs running concurrently. If a new job is created while
25 jobs are already running, the new job state is scheduled until a job completes and the new job can
start. If a new jobs scheduled time has already passed before it could be started, the new job will not run
and youll need to reschedule or start it when less than 25 jobs are running.
To monitor jobs, follow these steps:
Step 1
9-4
OL-32122-01
Chapter 9
Step 2
Click Run to start the currently scheduled job immediately. If a job has the status failed, click Run
to resubmit the same job, which creates a new scheduled job with the same parameters as the
previous job. Only the failed and partially successful devices within the job will be selected for retry.
Click Abort to stop a discovery job currently in progress and return it to its scheduled state. You
cannot abort all jobs. For example, you receive an error message if you try to abort a running
configuration job.
Click Cancel to delete any future scheduled jobs for the job you specified. If a job is currently
running, it will complete.
Click the History tab to view the history of a job. Hover your mouse cursor over the results in the
Status column to display troubleshooting information that can help you determine why a job failed.
Click the Details tab to view job information such as when the job was created, started, or scheduled.
When a minute job is scheduled to run recursively, the first trigger of the job falls on nth minute of the
hour, as divided by the quartz scheduler, and successive runs will be placed as per the schedule. For
example, if you have given the start time as 12:02:00 and you want the job to run every 3 minutes, then
the job will be executed at 12:03 (in a minute), with the next recurrence at 12:06, 12:09, and so on.
Another example, if you have given the start time as 12:00:00 and you want the job to run every 3
minutes, then the job will be executed at 12:00 (without any delay), with the next recurrence at 12:03,
12:06, and so on.
Note
To use this feature, your Prime Infrastructure implementation must include Assurance licenses.
Note
This feature is supported for NAMs and ASRs. For more information on minimum Cisco IOS XE version
supported on ASRs, see the Cisco ASR 1000 Series Aggregation Services Routers Release Notes.
In the following workflow, a network operator needs to troubleshoot a set of similar authentication
violations taking place at multiple branches. Because the operator suspects that the authentication
problems are due to a network attack in progress, the operator runs the Packet Capture feature against
the NAMs or ASRs for each branch, then runs the Packet Decoder to inspect the suspicious traffic.
Step 1
Choose Monitor > Tools > Packet Capture, then click Capture Session to create a new capture
session definition.
b.
Complete the General section as needed. Give the session definition a unique name and specify how
you want to file the captured data. To capture the full packet, enter 0 in the Packet Slice Size.
9-5
Chapter 9
c.
If you want to restrict the captured traffic to particular source or destination IPs, VLANs,
applications, or ports, click Add in the Software Filters section and create filters as needed. If you
do not create a software filter, it captures everything.
d.
Prime Infrastructure (with licensed Assurance features) saves the new session definition, then runs
separate capture sessions on each of the devices you specified. It stores the sessions as files on the device
and displays the list of packet capture files in the Capture Files area.
Step 2
Step 3
b.
c.
Select Copy To to copy the PCAP file to the PI server (the decode operation only runs on files in
the PI server).
d.
Click View Jobs to confirm that the copy job completed successfully.
e.
Open the localhost folder, select the check box for the new capture file, then click Decode. The
decoded data appears in the bottom pane.
f.
A TCP Stream displays the data as the application layer sees it. To view the TCP Stream for a
decoded file, select a TCP packet from the Packet List, then click TCP Stream. You can view the
data as ASCII text or in a HEX dump.
To run a packet capture session again, select the session definition in the Capture Sessions area and
click Start.
Note
To use this feature, your Prime Infrastructure implementation must include Assurance licenses.
In Prime Infrastructure, the TrustSec network service design enables you to choose preferred options for
provisioning configurations to TrustSec-capable devices to enable 802.1X and other TrustSec
functionality. You can configure wired 802_1x devices by creating TrustSec model-based configuration
templates and choosing any one of the following navigation paths:
Configuration > Templates > Features & Technologies > Security > TrustSec > Wired 802_1x
9-6
OL-32122-01
Chapter 9
Security violation as protect is not available for Catalyst 6000 supervisor devices.
Security violation as replace is available in Cisco IOS Release 15.1(01)SY and later.
The command macsec is not available for Catalyst 6500 supervisor 2T devices.
The MACsec support is available only for 3560-X series and 3750-X series devices with minimum
supported image version 12.2.55SE3/15.0(1)SE2.
Note
For the TrustSec 2.0 platform support list, see the Cisco TrustSec 2.0 Product Bulletin.
For more details about configuring TrustSec model-based configuration templates, see Creating
Feature-Level Configuration Templates.
Generating a TrustSec Readiness Assessment Report
TrustSec Readiness Assessment displays TrustSec-based device details such as TrustSec version,
readiness category, readiness device count, and device percentage displayed in the pie chart.
To generate a TrustSec Readiness Assessment report, follow these steps:
Step 1
Step 2
Step 3
Click Section view and click any of the pie chart slices to view the details of the selected TrustSec-based
device type.
Step 4
Step 5
Select the TrustSec version and click Export to export the readiness assessment details to a CSV file.
9-7
Chapter 9
9-8
OL-32122-01
CH A P T E R
10
Monitoring Alarms
An alarm is a Cisco Prime Infrastructure response to one or more related events. If an event is considered
of high enough severity (critical, major, minor, or warning), Prime Infrastructure raises an alarm until
the condition no longer occurs.
What Is an Event?
What Is an Alarm?
What Is an Event?
An event is an occurrence or detection of some condition in or around the network. An event is a distinct
incident that occurs at a specific point in time. Examples of events include:
Device reset
A fault that is an error, failure, or exceptional condition in the network. For example, when a device
becomes unreachable, an unreachable event is triggered.
A fault clearing. For example, when a device state changes from unreachable to reachable, a
reachable event is triggered.
One or more events may generate an abnormal state or alarm. The alarm can be cleared, but the event
remains. You can view the list of events using the Event Browser.
Choose Monitor > Alarms & Events, then click Events to access the Events Browser page.
10-1
Chapter 10
Monitoring Alarms
What Is an Alarm?
Event Creation
Prime Infrastructure maintains an event catalog and decides how and when an event is created and
whether to associate an alarm with the event. Multiple events can be associated with the same alarm.
Prime Infrastructure discovers events in the following ways:
By receiving notification events and analyzing them; for example, syslog and traps.
By automatically polling devices and discovering changes; for example, device unreachable.
By receiving events when a significant change occurs on the Prime Infrastructure server; for
example, rebooting the server.
Incoming event notifications (traps and syslogs) are identified by matching the event data to predefined
patterns. A trap or syslog is considered supported by Prime Infrastructure if it has matching patterns and
can be properly identified. If the event data does not match predefined patterns, the event is considered
unsupported, and it is dropped.
Faults are discovered by Prime Infrastructure through polling, traps, or syslog messages. Prime
Infrastructure maintains the context of all faults and ensures that duplicate events or alarms are not
maintained in the Prime Infrastructure database.
The following table provides examples of when Prime Infrastructure creates an event.
Time
Event
What Is an Alarm?
An alarm is a Prime Infrastructure response to one or more related events. If an event is considered of
high enough severity (critical, major, minor, or warning), Prime Infrastructure raises an alarm until the
resulting condition no longer occurs.
One or more events can result in a single alarm being raised. An alarm is created in the following
sequence:
1.
2.
10-2
OL-32122-01
Chapter 10
Monitoring Alarms
What Is an Alarm?
3.
An alarm is created after verifying that there is no active alarm corresponding to this event.
Active Events: Events that have not been cleared. An alarm remains in this state until the fault is
resolved in a network.
Historical Events: Events that have been cleared. An event state changes to a historical event when
the fault is resolved in a network.
A cleared alarm represents the end of an alarms lifecycle. A cleared alarm can be revived if the same
fault recurs within a preset period of time. The default is 5 minutes.
Event and Alarm Association
Prime Infrastructure maintains a catalog of events and alarms. This catalog contains a list of events and
alarms managed by Prime Infrastructure, and the relationship among the events and alarms. Events of
different types can be attached to the same alarm type.
When a notification is received:
1.
Prime Infrastructure compares an incoming notification against the event and alarm catalog.
2.
3.
If an event is raised, Prime Infrastructure decides if the event triggers a new alarm or if it is
associated with an existing alarm.
A new event is associated with an existing alarm if the new event is of the same type and occurs on the
same source.
Alarm Status
Alarm Status
Description
Not
acknowledged
When an event triggers a new alarm or a new event is associated with an existing alarm.
Acknowledged
When you acknowledge an alarm, the status changes from Not acknowledged to Acknowledged.
Cleared
Auto-clear from the deviceThe fault is resolved on the device and an event is triggered for the device.
For example, a device-reachable event clears a device-unreachable event. This, in turn, clears the
device-unreachable alarm.
Manual-clear from Prime Infrastructure usersYou can manually clear an active alarm without
resolving the fault in the network. A clearing event is triggered and the alarm is cleared.
If a fault continues to exist in the network, a new event and alarm are created subsequently, based on
event notification (traps/syslogs).
Event and Alarm Severity
Each event has an assigned severity. Events fall broadly into the following severity categories, each with
an associated color in Prime Infrastructure:
Flagging (indicates a fault)Critical (red), Major (orange), Minor (yellow), or Warning (sky blue).
10-3
Chapter 10
Monitoring Alarms
For example, a Link Down event might be assigned Critical severity, while its corresponding Link Up
event will be Cleared severity.
In a sequence of events, the event with the highest severity determines the severity of the alarm.
Location in GUI
Description
Displays a new page listing all alarms with details such as severity, status, failure source, time
stamp, owner, category, and condition. You can change the status of alarms and assign,
annotate, delete, specify email notifications from this page and use the troubleshoot
functionality to devices from PI.
Displays a table listing the critical, major, and minor alarms currently detected by Prime
Infrastructure. See Customizing the Alarm Summary.
Alarm Browser
Opens a window that displays the same information as in the Monitor > Alarms & Events but
does not take you to a new page.
On the Alarms tab, when you hover the mouse over the Failure Source field, the crosshair icon
appears. Click the icon to see the 360 view of the device. Or, on the Alarm browser, when you
hover the mouse over the Failure Source field, the crosshair icon appears. Click the icon to see
the 360 view of the device.
Displays dashlets that contain alarm summary information, top n sites with the most alarms, top
n alarm types, device reachability status, syslog watch, and syslog summary.
Step 1
Maps and Alarms pages refresh whenever Prime Infrastructure raises a new alarm.
Prime Infrastructure displays prompts and warning messages when you acknowledge an alarm or
clear all alarms of a condition.
Cleared alarm conditions are always set to the Information severity level.
10-4
OL-32122-01
Chapter 10
Monitoring Alarms
Customizing the Alarm Summary
Step 2
If you want maps and alarms pages to automatically refresh every time Prime Infrastructure raises a new
alarm, select the Refresh Map/Alarms page on new alarm check box in the Alarms portion of the page.
Step 3
If you do not want the warning message to appear whenever you acknowledge an alarm, select the
Disable Alarm Acknowledge Warning Message check box. Note that the warning message displays as
a reminder that a recurrence of the problem does not generate another alarm unless this functionality is
disabled.
Step 4
If you do not want to be prompted to confirm each time you clear an alarm condition, select the Disable
confirmation prompt for Clear all of this condition check box. Note that the warning displays as a
reminder that you are clearing all occurrences of the specified condition.
Step 5
If you do not want to be prompted to confirm the severity change each time you clear an alarm condition,
select the Disable Set severity to Information? prompt for Clear all of this condition check box.
Step 6
Click Save.
Related Topics
Step 1
How often the alarm count is refreshed in the Alarm Summary toolbar and page.
Which category of alarm to track as the default alarm category shown in the Alarm Summary
toolbar.
Which categories of alarms to include in the Alarm Summary page, and in the total displayed in the
Alarm Summary toolbar.
Step 2
To change the Alarm Summary refresh frequency: In the Refresh Alarm count in the Alarm Summary
every drop down list, choose a refresh frequency (every 5 seconds, 15 seconds, 30 seconds, 1 minute, 2
minutes, or 5 minutes).
Step 3
To elect the alarm categories to display in the Alarm Summary toolbar and pop-up page:
a.
Click Edit Alarm Categories. The Select Alarm Categories pop-up displays.
b.
In the Default Category to display drop-down, choose the default category whose total alarm count
you want to display in the Alarm Summary toolbar. For example: Choose AP Rogue to have the
Alarm Summary toolbar display the count for AP Rogue alarms only. Choose Alarm Summary to
have the toolbar display a count of all alarms in all selected categories and subcategories; choose
c.
In the pick list under the Show drop-down, choose the checkbox next to each category or
sub-category of alarm that you want to include in the Alarm Summary popup page.
10-5
Chapter 10
Monitoring Alarms
If Default Category to display is set to Alarm Summary, the alarm totals shown in the toolbar
will be the total of all alarms for all the categories and sub-categories you select in the pick list. If
any other category or sub-category is selected as the Default Category, the toolbar shows totals only
for that category.
d.
Step 4
When you are finished, click OK. Your selected alarm category and subcategories are listed on the
User Preferences page.
Related Topics
Global Toolbars
Step 2
Select an alarm, then choose one of the following options under Change Status:
AcknowledgeRemoves the alarm from the Alarms list and prevents the alarm from being counted
as an active alarm on the Alarm Summary page or any alarms list.
UnacknowledgeReturns the alarm to its active alarm state on the Alarm Summary page and all
alarms lists.
ClearSets the alarm state to Cleared. Cleared alarms remain in the Prime Infrastructure database,
but in the Clear state. You clear an alarm when the condition that caused it no longer exists.
Clear all of this ConditionSets the alarm state to Cleared for all alarms with the same Condition
as the alarm you selected.
After you click Yes to confirm that you want to clear all alarms of the specified condition, a dialog
appears asking if you want to change the severity for the selected alarm condition to Informational.
This prevents Prime Infrastructure from issuing alarms for the specified condition. To later reset the
conditions severity, choose Administration > System Settings > Severity Configuration and
modify the severity. See Configuring Alarm Severity Levels for more information.
10-6
OL-32122-01
Chapter 10
Monitoring Alarms
Changing Alarm and Event Options
If the device generates a new violation on the same interface, Prime Infrastructure does not create a new
alarm, and the Alarm Summary page shows no new alarms. However, if the interference violation is
created on another interface, a new alarm is created.
By default, acknowledged alarms are not displayed on either the Alarm Summary page or in any alarm
list. Also, no emails are generated for acknowledged alarms. By default, acknowledged alarms are not
included for any search criteria. To change this default, go to the Administration > System Settings >
Alarms and Events page and disable the Hide Acknowledged Alarms preference.
When you acknowledge an alarm, a warning message appears as a reminder that a recurrence of the
problem does not generate another alarm unless this functionality is disabled. Use the Administration
> User Preferences page to disable this warning message.
You can also search for all previously acknowledged alarms to reveal the alarms that were acknowledged
during the last seven days. Prime Infrastructure automatically deletes cleared alerts that are more than
seven days old, so your results can show activity for only the last seven days. Until an existing alarm is
deleted, a new alarm cannot be generated for any managed entity for which Prime Infrastructure has
already generated an alarm.
Step 2
Step 3
Step 2
Step 3
Select the check box of the alarm condition whose severity level that you want to change.
10-7
Chapter 10
Monitoring Alarms
Step 4
From the Configure Security Level drop-down list, choose a severity level, then click Go.
Step 5
10-8
OL-32122-01
CH A P T E R
11
Cisco Intelligent WAN (IWAN) is a system that enhances collaboration and cloud application
performance while reducing the operating cost of the WAN. This system leverages low-cost,
high-bandwidth Internet services to increase bandwidth capacity without compromising the
performance, availability, or security of cloud-based applications. Organizations can use IWAN to
leverage the Internet as WAN transport, as well as for direct access to Public Cloud applications. For
more information on Cisco IWAN, see the Cisco Intelligent WAN (IWAN) Design Guide.
Prime Infrastructure positions the IWAN wizard workflow mostly for green field customers where the
IWAN services need to be enabled for the first time. The enabled IWAN service cannot be modified for
brown field customers. But customers can always overwrite the last-configured service by rewriting any
of these services on required sites.
You can use Prime Infrastructure to design, configure, and monitor the IWAN services for an enterprise.
Cisco IWAN requires the configuration of DMVPN, PFR, AVC and QOS as part of enabling IWAN
services on different devices.
DMVPN: IWAN-DMVPN
PFR: IWAN-PFR
QOS: IWAN-QOS
AVC: IWAN-AVC
11-1
Chapter 11
The tags that are used for the IWAN Hub and IWAN Branch Categories based on the Device roles are as
follows:
Hub Category:
Master Controller: IWAN-HUB-Master-Controller
MPLS Hub: IWAN-HUB-MPLS
Internet Hub: IWAN-HUB-Internet
Branch Category
Single Router Branch: IWAN-Branch-Single-Router
Dual Router Branch-MPLS: IWAN-Branch-Dual-MPLS
Dual Router Branch-Internet: IWAN-Branch-Dual-Internet
Users can create their own templates from the bundle templates or modify the out of the box design
templates, which can be recreated from the CVD templates and displayed in the IWAN workflow.
Therefore, enabling the complete IWAN services through Prime Infrastructure is done based on two
categories, SITE and ROLE. SITE can be HUB or SPOKE, and ROLE can be X, Y, Z, and so on.
Depending on this selection, the templates will be organized and displayed in sequence for users to fill
in the values. At the end of the workflow, the summary of the configurations to be deployed on the
network is displayed. When the Deploy button is clicked, the configurations are pushed to the network.
Important Notes
Ensure that the interface loopback 0 IP address is configured on all Master Controllers before
deployment.
Example:
ip prefix-list DC-LOCAL-ROUTES seq 40 permit <MC loopback0 ip>/32
Example:
Subnet A172.29.10.0/30
Subnet B172.29.10.4/30
Subnet C172.29.10.8/30
DC_Prefix1(x.x.x.x/x)172.29.10.0/24 le 32
If this error message is seen on the HUB-Border-MPLS router, you may be able to resolve this by
increasing the window size.
Example:
crypto ipsec security-association replay window-size 1024
11-2
OL-32122-01
Chapter 11
Step 2
Step 3
Branch
Hub
Step 4
Step 5
Select the devices on which you want to configure the specified features. To configure IWAN on multiple
branches at the same time, select multiple devices and enter the values for the variables for each.
Step 6
Depending on the features you selected to configure in Step 4, the wizard guides you through entering
the necessary values.
The templates are configured as part of the IWAN wizard, and you can access them by navigating to
Configuration > Templates Features & Technologies > Feature Templates.
Note
Post deployment, ensure that you enable routing between Master Controllers and Hub Border Routers
and include the subnet of the loopback 0 interface as part of the routing domain.
11-3
Chapter 11
11-4
OL-32122-01
CH A P T E R
12
Monitoring Interferers
Monitoring Chokepoints
12-1
Chapter 12
Note
RF Grouping Notifications
When RRM is run on the controller, dynamic grouping is done and a new group leader is chosen.
Dynamic grouping has three modes: Automatic, Off, and Leader. When grouping is Off, no dynamic
grouping occurs, and each switch optimizes only its own lightweight access point parameters. When
grouping is Automatic, switches form groups and elect leaders to perform better dynamic parameter
optimization. With automatic grouping, configured intervals (in seconds) represent the period with
which the grouping algorithm is run. (Grouping algorithms also run when the group contents change and
automatic grouping is enabled.)
RRM Dashboard
The RRM dashboard is available at Monitor > Wireless Technologies > Radio Resource
Management.
The dashboard is made up of the following parts:
The RRM RF Group Summary shows the number of different RF groups. To get the latest number
of RF Groups, run the configuration synchronization background task.
The Channel Change Reason portion shows why channels changed for all 802.11a/b/g/n radios.
SignalThe channel changed because it improved the channel quality for some other neighbor
radio(s). Improving the channel quality for some other neighbor radio(s) improved the channel
plan of the system as evaluated by the algorithm.
12-2
OL-32122-01
Chapter 12
WiFi Interference
Load
Radar
Noise
Persistent Non-WiFi Interference
Major Air Quality Event
Other
The Channel Change shows all events complete with causes and reasons.
The Configuration Mismatch portion shows comparisons between leaders and members.
The Coverage Hole portion rates how severe the coverage holes are and gives their location.
The Percent Time at Maximum Power shows what percent of time the access points were at
maximum power and gives the location of those access points.
Total Channel ChangesThe sum total of channel changes across 802.11a/b/g/n radios, irrespective
of whether the channel was updated or revised. The count is split over a 24-hour and 7-day period.
If you click the percentages link or the link under the 24-hour column, a page with details for that
access point only appears.
Total Coverage Hole EventsThe total number of coverage hole events over a 24-hour and 7-day
period.
Number of RF GroupsThe total number of RF groups (derived from all of the controllers which
are currently managed by Cisco Prime Infrastructure).
APs at MAX PowerThe percentage of access points with 802.11a/n radios as a total percentage
across all access points which are at maximum power. The maximum power levels are preset and are
derived with reference to the preset value.
Maximum power is shown in three areas of the RRM dashboard. This maximum power portion
shows the current value and is poll driven.
Channel Change CausesA graphical bar chart for 802.11a/n radios. The chart is factored based on
the reason for channel change. The chart is divided into two parts, each depicting the percentage of
weighted reasons causing the event to occur over a 24-hour and 7-day period. Each event for channel
change can be caused by multiple reasons, and the weight is equally divided across these reasons.
The net reason code is factored and equated to one irrespective of the number of reasons for the event
to occur.
Channel Change - APs with channel changesEach event for channel change includes the MAC
address of the lightweight access point. For each reason code, you are given the most channel
changes that occurred for the 802.11a/n access point based on the weighted reason for channel
events. This count is split over a 24-hour and 7-day period.
Coverage Hole - APs reporting coverage holesThe top five access points filtered by IF Type 11
a/n which triggered a coverage hole event (threshold based) are displayed.
12-3
Chapter 12
Monitoring Interferers
Aggregated Percent Max Power APsA graphical progressive chart of the total percentage of
802.11a/n lightweight access points which are operating at maximum power to accommodate
coverage holes events. The count is split over a 24-hour and 7-day period.
This maximum power portion shows the values from the last 24 hours and is poll driven. This occurs
every 15 minutes or as configured for radio performance.
Percent Time at Maximum PowerA list of the top five 802.11a/n lightweight access points which
have been operating at maximum power.
This maximum power portion shows the value from the last 24 hours and is event driven.
Monitoring Interferers
In the Monitor > Wireless Technologies > Interferers page, you can monitor interference devices
detected by CleanAir-enabled access points. By default, the Monitoring AP Detected Interferers page is
displayed.
Table 12-1 lists the menu paths to follow to monitor interferers.
Table 12-1
To See...
Go To...
AP-detected interferers
Note
This page is only available in the Location version of Cisco Prime Infrastructure.
This section provides information on the tags detected by the location appliance.
The Tag Summary page is available at Monitor > Wireless Technologies > RFID Tags.
Step 2
12-4
OL-32122-01
Chapter 12
Step 3
Enter the required information. Note that search fields sometimes change, depending on the category
chosen.
Step 4
Click Go.
The Tag Vendor option does not appear when Asset Name, Asset Category, Asset Group, or MAC
Address is the search criterion.
The Telemetry data option appears only when MSE (select for location servers), Floor Area, or
Outdoor Area is selected as the Search for tags by option.
Telemetry data displayed is vendor-specific; however, some commonly reported details are GPS
location, battery extended information, pressure, temperature, humidity, motion, status, and
emergency code.
Asset Information, Statistics, Location, and Location Notification details are displayed.
Choose Monitor > Wireless Technologies > Media Streams. The Media Streams page appears showing
the list of media streams configured across controllers.
The Media Streams page contains a table with the following columns:
Start IPStarting IP address of the media stream for which the multicast direct feature is enabled.
End IPEnding IP address of the media stream for which the multicast direct feature is enabled.
Max BandwidthIndicates the maximum bandwidth that is assigned to the media stream.
PriorityIndicates the priority bit set in the media stream. The priority can be any number from 1
to 8. A lower value indicates a higher priority. For example, a priority of 1 is highest and a value of
8 is the lowest.
12-5
Chapter 12
ViolationIndicates the action to performed in case of a violation. The possible values are as
follows:
DropIndicates that a stream is dropped on periodic revaluation.
Best EffortIndicates that a stream is demoted to best-effort class on periodic reevaluations.
Step 2
PolicyIndicates the media stream policy. The possible values are Admit or Deny.
ControllersIndicates the number of controllers that use the specified media stream.
ClientsIndicates the number of clients that use the specified media stream.
To view the media stream details, click a media stream name in the Stream column. The Media Streams
page appears.
The Media Streams page displays the following group boxes:
Media Stream DetailsDisplays the media stream configuration information. This includes the
Name, Start Address, End Address, Maximum Bandwidth, Operational Status, Average Packet Size,
RRC Updates, Priority, and Violation.
StatisticsDisplays the number of controllers and number of clients that use the selected media
stream. Click the controller count to access the list of controllers that use the selected media stream.
ErrorDisplays the error, Worst AP, and corresponding floor map for that AP.
Failed Client CountsDisplays the number of clients that failed for each period.
The client information is presented in a time-based graph. For graphs that are time-based, there is a
link bar at the top of the graph page that displays 6h, 1d, 1w, 2w, 4w, 3m, 6m, 1y, and Custom. When
selected, the data for that time frame is retrieved and the corresponding graph is displayed.
Choose Monitor > Wireless Technologies > Unjoined APs. The Unjoined APs page appears containing
a list of access points that have not been able to join a wireless controller.
12-6
OL-32122-01
Chapter 12
Step 2
Select the access point that you wish to diagnose, then click Troubleshoot. An analysis is run on the
access point to determine the reason why the access point was not able to join a wireless controller. After
performing the analysis, the Unjoined APs page displays the results.
Step 3
If the access point has tried to join multiple wireless controllers and has been unsuccessful, the
controllers are listed in the left pane. Select a controller.
Step 4
In the middle pane, you can view what the problem is. It will also list error messages and controller log
information.
Step 5
In the right pane, recommendations for solving the problems are listed. Perform the recommended
action.
Step 6
If you need to further diagnose a problem, you can run RTTS through the Unjoined AP page. This allows
you to see the debug messages from all the wireless controllers that the access point tried to join at one
time.
To run RTTS, click the RTTS icon (
) located to the right of the table. The debug messages appear in
the table. You can then examine the messages to see if you can determine a cause for the access point
not being able to join the controllers.
Monitoring Chokepoints
Chokepoints are low-frequency transmitting devices. When a tag passes within range of a placed
chokepoint, the low-frequency field awakens the tag, which, in turn, sends a message over the Cisco
Unified Wireless Network that includes the chokepoint device ID. The transmitted message includes
sensor information (such as temperature and pressure). A chokepoint location system provides
room-level accuracy (ranging from few inches to 2 feet, depending on the vendor).
Chokepoints are installed and configured as recommended by the chokepoint vendor. After the
chokepoint is installed and operational, it can be entered into the location database and plotted on a Cisco
Prime Infrastructure map.
Step 2
Step 3
Click Go.
Step 4
Step 5
Step 6
Step 7
Click Save.
12-7
Chapter 12
Monitoring Chokepoints
After the chokepoint is added to the database, it can be placed on the appropriate Cisco Prime
Infrastructure floor map.
Step 2
In the Maps page, click the link that corresponds to the floor location of the chokepoint.
Step 3
Step 4
Click Go.
The Add Chokepoints summary page lists all recently added chokepoints that are in the database but not
yet mapped.
Step 5
Select the check box next to the chokepoint that you want to place on the map.
Step 6
Click OK.
A map appears with a chokepoint icon located in the top-left corner. You are now ready to place the
chokepoint on the map.
Step 7
Step 8
Click Save.
The newly created chokepoint icon might or might not appear on the map, depending on the display
settings for that floor. The rings around the chokepoint icon indicate the coverage area. When a CCX tag
and its asset passes within the coverage area, location details are broadcast, and the tag is automatically
mapped on the chokepoint coverage circle. When the tag moves out of the chokepoint range, its location
is calculated as before and is no longer mapped on the chokepoint rings.
MAC address, name, entry/exit chokepoint, static IP address, and range of the chokepoint display when
you hover your mouse cursor over its map icon.
Step 9
If the chokepoint does not appear on the map, select the Chokepoints check box located in the Floor
Settings menu.
Do not select the Save Settings check box unless you want to save this display criteria for all maps.
Step 10
Synchronize network design to the mobility services engine or location server to push chokepoint
information.
12-8
OL-32122-01
Chapter 12
Step 2
Select the check box of the chokepoint that you want to delete.
Step 3
Step 4
Click Go.
Step 5
Step 2
In the Maps page, click the link that corresponds to the floor location of the chokepoint.
Step 3
Step 4
Click Go.
Step 5
Editing a Chokepoint
To edit a chokepoint in the Cisco Prime Infrastructure database and the appropriate map:
Step 1
Step 2
In the MAC Address column, click the chokepoint that you want to edit.
Step 3
Step 4
Click Save.
12-9
Chapter 12
Note
If a TDOA receiver is not in use and the partner engine software is resident on the mobility service
engine, then the location calculations for tags are generated using RSSI readings from access points.
The Cisco Tag engine can calculate the tag location using the RSSI readings from access points.
Before using a TDOA receiver within the Cisco Unified Wireless Network, you must perform the
following steps:
1.
Have a mobility services engine active in the network. See the Adding a Mobility Services Engine
section in the Cisco Prime Infrastructure 2.2 Configuration Guide.
2.
Add the TDOA receiver to Cisco Prime Infrastructure database and map. See Adding Wi-Fi TDOA
Receivers to Cisco Prime Infrastructure and Maps.
3.
Activate or start the partner engine service on the MSE using Cisco Prime Infrastructure.
4.
Synchronize Cisco Prime Infrastructure and mobility services engines. See the Synchronizing
Services section in the Cisco Prime Infrastructure 2.2 Configuration Guide.
5.
Set up the TDOA receiver using the AeroScout System Manager. See the AeroScout Context-Aware
Engine for Tags, for Cisco Mobility Services Engine Users Guide for configuration details at the
following URL:
http://support.aeroscout.com.
Choose Monitor > Wireless Technologies > WiFi TDOA Receivers to open the All WiFi TDOA
Receivers summary page.
To view or edit current WiFi TDOA receiver details, click the MAC Address link to open the details page.
Step 2
From the Select a command drop-down list, choose Add WiFi TDOA Receivers.
Step 3
Click Go.
Step 4
Enter the MAC address, name, and static IP address of the TDOA receiver.
Step 5
Note
Step 6
A WiFi TDOA Receiver must be configured separately using the receiver vendor software.
12-10
OL-32122-01
Chapter 12
Step 7
In the Maps page, select the link that corresponds to the floor location of the TDOA receiver.
Step 8
From the Select a command drop-down list, choose Add WiFi TDOA receivers.
Step 9
Click Go.
The All WiFi TDOA Receivers summary page lists all recently-added TDOA receivers that are in the
database but not yet mapped.
Step 10
Select the check box next to each TDOA receiver to add it to the map.
Step 11
Click OK.
A map appears with a TDOA receiver icon located in the top-left corner. You are now ready to place the
TDOA receiver on the map.
Step 12
Click the TDOA receiver icon and drag it to the proper location on the floor map.
Step 13
Click Save.
The icon for the newly added TDOA receiver might or might not appear on the map depending on the
display settings for that floor. If the icon did not appear, proceed with Step 14.
Step 14
If the TDOA receiver does not appear on the map, click Layers to collapse a selection menu of possible
elements to display on the map.
Step 15
Step 16
Step 17
Choose Monitor > Wireless Technologies > Access Point Radios. The Access Point Radios page
appears showing the list of access points configured across controllers.
The Access Point Radios page contains a table with the following columns:
IP Address
Radio
Map Location
Controller
Controller Name
Admin StatusIndicates whether or not the administration state of the access point is enabled.
12-11
Chapter 12
Step 2
AP Mode
Oper Status
Alarm Status
Click the name of the access point whose details you want to monitor.
12-12
OL-32122-01
CH A P T E R
13
Step 2
Click the Controllers tab, and complete the fields as described in the Voice Audit Field Descriptions
section in the Cisco Prime Infrastructure 2.2 Reference Guide.
Step 3
Step 4
In the VoWLAN SSID text box, type the applicable VoWLAN SSID.
Note
Step 5
Step 6
The red circle indicates an invalid rule (due to insufficient data). The green circle indicates a
valid rule.
To save the configuration and run a report, click Save and Run.
13-1
Chapter 13
Note
To support roaming, the tool figures out controllers in the same building as of client's associated AP
building and adds to all controller's watchlist. The tool looks for controllers in +/-5 floors from client's
current association As location to configure on controllers. Configuration on controller's watchlist is
done for 10 minutes. After 10 minutes controller will remove the entry from the watchlist.
To run a Voice Diagnostic test:
Step 1
Step 2
From the Select a command drop-down list, choose the New test and click Go.
Note
You can configure a maximum of two clients for voice call diagnosis. Both clients can be on the
same call or can be on a different call.
Step 3
Enter a test name and the length of time to monitor the voice call.
Step 4
Enter the MAC address of the device for which you want to run the voice diagnostic test.
Step 5
Select a device type; if you select a custom phone, enter an RSSI range.
Step 6
Click StartTest.
Total Enforced Config GroupsTemplates that are configured for Background Audit and are
enforcement enabled.
13-2
OL-32122-01
Chapter 13
Total Config Audit AlarmsAlarms generated when audit discrepancies are enforced on
configuration groups. If enforcement fails, a critical alarm is generated on the configuration group.
If enforcement succeeds, a minor alarm is generated on the configuration group. Alarms contain
links to the audit report, where you can view a list of discrepancies for each controller.
Most recent 5 config audit alarmsIncludes object name, event type, date, and time of the audit
alarm.
Click View All to view the applicable Alarm page that includes all configuration audit alarms.
Privilege 15 CriteriaThe Telnet credential provided as part of the autonomous access point
discovery must be privilege 15.
Software VersionConversion is supported only from Cisco IOS 12.3(7)JA releases excluding
Cisco IOS 12.3(11)JA, Cisco IOS 12.3(11)JA1, Cisco IOS 12.3(11)JA2, and Cisco IOS
12.3(11)JA3.
Role CriteriaA wired connection between the access point and controller is required to send the
association request; therefore, the following autonomous access point roles are required:
root
root access point
root fallback repeater
root fallback shutdown
root access point only
Radio CriteriaIn dual-radio access points, the conversion can happen even if only one radio is of
the supported type.
13-3
Chapter 13
Scheduled Accuracy TestingEmployed when clients, tags, and interferers are already deployed
and associated to the wireless LAN infrastructure. Scheduled tests can be configured and saved
when clients, tags, and interferers are already prepositioned so that the test can be run on a regularly
scheduled basis.
On-Demand Accuracy TestingEmployed when elements are associated but not pre-positioned.
On-demand testing allows you to test the location accuracy of clients, tags, and interferers at a
number of different locations. It is generally used to test the location accuracy for a small number
of clients, tags, and interferers.
You must enable the Advanced Debug option in Prime Infrastructure to use the Scheduled and
On-demand location accuracy tool testing features. The Location Accuracy tool does not appear as an
option on the Monitor > Tools menu when the Advanced Debug option is not enabled.
To enable the advanced debug option in Prime Infrastructure:
Step 1
Step 2
Choose Properties from the Select a command drop-down list, and click Go.
Step 3
Select the Enabled check box to enable the Advanced Debug Mode. Click OK.
Note
If Advanced Debug is already enabled, you do not need to do anything further. Click Cancel.
Use the Select a command drop-down list to create a new scheduled or on-demand accuracy test, to
download logs for last run, to download all logs, or to delete a current accuracy test.
Note
You can download logs for accuracy tests from the Accuracy Tests summary page. To do so, select
an accuracy test and from the Select a command drop-down list, choose either Download Logs or
Download Logs for Last Run. Click Go.
The Download Logs option downloads the logs for all accuracy tests for the selected test(s).
The Download Logs for Last Run option downloads logs for only the most recent test run for the
selected test(s).
13-4
OL-32122-01
Chapter 13
A summary location accuracy report that details the percentage of elements that fell within various
error ranges.
A summary by each MAC address whose location accuracy was tested noting its actual location,
error distance and a map showing its spatial accuracy (actual vs. calculated location), and error
distance over time for each MAC.
Step 2
Choose New Scheduled Accuracy Test from the Select a command drop-down list.
Step 3
Step 4
Choose an area type, a building, and a floor from the corresponding drop-down lists.
Note
Step 5
Campus is configured as Root Area, by default. There is no need to change this setting.
Choose a beginning and ending time for the test by entering the days, hours, and minutes. Hours are
entered using a 24-hour clock.
Note
When entering the test start time, be sure to allow enough time prior to the test start to position
testpoints on the map.
Step 6
Choose a destination point for the test results. (If you choose the e-mail option, you must first define an
SMTP Mail Server for the target email address. Choose Administrator > System Settings > Mail
Server Configuration to enter the appropriate information.)
Step 7
Step 8
On the floor map, select the check box next to each client, tag, and interferer for which you want to check
location accuracy.
When you select a MAC address check box, two icons appear on the map. One represents the actual
location and the other represents the reported location. If the actual location for an element is not the
same as the reported location, drag the actual location icon for that element to the correct position on the
map. (You cannot drag the reported location.)
Step 9
(Optional) To enter a MAC address for a client, tag, or interferer that is not listed, select the Add New
MAC check box, enter the MAC address, and click Go.
An icon for the newly added element appears on the map. If the element is on the location server but on
a different floor, the icon appears in the left-most corner (in the 0,0 position).
Step 10
Step 11
13-5
Chapter 13
Step 12
To check the test results, click the test name, click the Results tab in the page that appears, and click
Download under Saved Report.
A summary location accuracy report that details the percentage of elements that fell within various
error ranges.
Step 2
From the Select a command drop-down list, choose New On demand Accuracy Test.
Step 3
Step 4
Choose an area type, a building, and a floor from the corresponding drop-down lists.
Note
Campus is configured as Root Area, by default. There is no need to change this setting.
Step 5
Choose a destination point for the test results. (If you choose the e-mail option, you must first define an
SMTP Mail Server for the target email address. Choose Administrator > System Settings > Mail
Server Configuration to enter the appropriate information.)
Step 6
Step 7
To test the location accuracy and RSSI of a particular location, select client, tag, or interferer from the
drop-down list on the left. A list of all MAC addresses for the selected option (client, tag, or interferer)
is displayed in a drop-down list to the right.
Step 8
Choose a MAC address from the drop-down list, move the red cross hair to a map location, and click the
mouse to place it.
Step 9
From the Zoom percentage drop-down list, choose the zoom percentage for the map.
The X and Y text boxes are populated with the coordinates based on the position of the red cross hair in
the map.
Step 10
Click Start to begin collection of accuracy data, and click Stop to finish collection. You must allow the
test to run for at least two minutes before stopping the test.
Step 11
Repeat Step 11 to Step 14 for each testpoint that you want to plot on the map.
Step 12
Click Analyze Results when you are finished mapping the testpoints, and then click the Results tab in
the page that appears to view the report.
13-6
OL-32122-01
Chapter 13
13-7
Chapter 13
13-8
OL-32122-01
CH A P T E R
14
Troubleshooting
Cisco Prime Infrastructure provides the following for sophisticated monitoring and troubleshooting of
end-user network access.
The following sections describe some typical troubleshooting tasks:
Connect with the Cisco Support Community to view and participate in discussion forums. See
Launching the Cisco Support Community.
Open a support case with Cisco Technical Support. See Opening a Support Case.
14-1
Chapter 14
Troubleshooting
Choose Monitor > Alarms & Events, click an alarm, then choose Troubleshoot > Support Forum.
Step 2
In the Cisco Support Community Forum page, enter additional search parameters to refine the
discussions that are displayed.
Chose Monitor > Alarms & Events, then hover your mouse cursor over the IP address of the device on
which the alarm occurred.
Step 2
From the device 360 view, click the Support Request icon.
Step 3
Step 4
Click Create.
Prime Infrastructure gathers information about the device and populates the fields for which it can
retrieve information. You can enter a Tracking Number that corresponds to your own organizations
trouble ticket system.
Step 5
Step 6
14-2
OL-32122-01
Chapter 14
Troubleshooting
Checking an End Users Network Session Status
Integration with LDAP (to display information about the end user).
In the system search field (see Search Methods), enter the name of the user (or client) who is
experiencing the issue. If there are multiple matches, select the correct username from the list of
matches.
Step 2
Start the User 360 View (see Getting User Details from the User 360 View).
The information that is available from this view typically includes current information about the end user
and all of that users current or recently ended network sessions.
Open the User 360 View for that user and check the value in Authorization Profile. This is a
mnemonic string that is customer-defined, so it might not contain clear information (for example,
standard_employee or standard_BYOD or Guest).
Step 2
If this field is a link, click it to display information about the users authorization profile. Based on this
information:
If the end user is associated with the appropriate policy category, this procedure is complete.
If the end user is not associated with the appropriate policy category, you can hand off the problem
(for example, to an ISE admin or help tech) or perform actions outside Prime Infrastructure to
investigate why the user was placed in the current policy category (Authorization Profile).
14-3
Chapter 14
Troubleshooting
Step 3
Check to see whether there are any indications of authentication errors (authentication failure could be
due to various things, including an expired password). The visual indication of authentication errors
allows you to see more data related to the authentication errors. At that point, you might need to hand
off the problem (for example, to an ISE admin or help tech).
Open the User 360 View for that user and click the Go to Client Details icon (see Getting User Details
from the User 360 View).
Step 2
If a problem has been detected, it might not be appropriate to continue troubleshooting the problem; it
is probably sufficient to note the problem and hand it off to second tier support. If you want to continue
detailed client troubleshooting, exit the User 360 View and launch the full client and user
troubleshooting page (choose Monitor > Clients and Users).
To view any existing active alarms or error conditions associated with the network attachment device
and port for the end user (available for the controller, switch, access point, and site), open the User 360
View for that user and click the Alarms tab.
Step 2
To see if a problem has been detected, click the Go to Client Details icon (see Getting User Details from
the User 360 View).
Step 3
If a problem has been detected, it might not be appropriate to continue troubleshooting the problem; it
is probably sufficient to note that fact and hand off the task to second tier support. If you want to continue
detailed client troubleshooting, exit the User 360 View and launch the full client and user
troubleshooting page (choose Monitor > Clients and Users).
14-4
OL-32122-01
Chapter 14
Troubleshooting
Troubleshooting the User Application and Site Bandwidth Utilization
Step 1
To view any existing active alarms or error conditions associated with network devices that are part of
the site for the end user, open the User 360 View for that user and click the Alarms tab.
Step 2
Step 3
If a problem with a site has been detected, an alarm icon will appear next to the site location. Click the
icon to view all of the alarms associated with that site.
Step 4
If a problem has been detected, it might not be appropriate to continue troubleshooting the problem; it
is probably sufficient to note that fact and hand off the task to second tier support. If you want to continue
detailed client troubleshooting, exit the User 360 View and launch the full client and user
troubleshooting page (choose Monitor > Clients and Users).
For wired sessions, that AAA accounting information is being sent to ISE.
Step 1
To view the applications accessed by the end user and the response time for the applications for the users
devices, open the User 360 View for that user and click the Applications tab.
Step 2
The Applications tab displays information about the applications accessed by the end user (see
Troubleshooting). To get more information about an application, including the bandwidth utilization of
the application consumed by the end user (the bandwidth consumed for the conversation), choose
Dashboard > Performance > Application.
14-5
Chapter 14
Troubleshooting
Table 14-1
Step 1
In the Search field on any page, enter the end users name.
Step 2
In the Search Results window, hover your mouse cursor over the end users name in the User Name
column, then click the User 360 view icon that appears as shown in Figure A-10.
Step 3
With the User 360 view displayed, identify where the problem is occurring using the information
described in Table 14-1.
Additional Information
Click available links to display additional
information. For example, you can click the
Authorization Profile link to launch ISE. See
Troubleshooting Authentication and
Authorization
Alarms associated with the device to Click a device icon at the top of the
Click the Troubleshoot Client icon
to
which the user is attached
User 360 View, then click the Alarms go to client troubleshooting. See Client
tab.
Troubleshooting in the Cisco Prime
Infrastructure Classic View Configuration
Guide for Wireless Devices, Release 2.2.
Applications running on the device to Click a device icon at the top of the
which the user is attached
User 360 View, then click the
Applications tab.
This feature requires that session information (netflow/NAM data, Assurance licenses) is available.
Step 1
To view the applications accessed by the end user and the response time for the applications for the users
devices, open the User 360 View for that user and click the Applications tab.
Step 2
The Applications tab displays information about the applications accessed by the end user (see
Troubleshooting the Users Experience). To get more information about an application, choose
Dashboard > Performance > Application.
14-6
OL-32122-01
Chapter 14
Troubleshooting
Troubleshooting Voice/Video Delivery to a Branch Office
Note
To use this feature, your Prime Infrastructure implementation must include Assurance licenses.
Prime Infrastructure with the licensed Assurance features makes this kind of troubleshooting easy. The
following workflow is based on a typical scenario: The user complains to the network operations desk
about poor voice quality or choppy video replay at the users branch office. The operator first confirms
that the user is indeed having a problem with jitter and packet loss that will affect the users RTP
application performance. The user further confirms that other users at the same branch are also having
the same problem. The operator next confirms that there is congestion on the WAN interface on the edge
router that connects the local branch to the central voice/video server in the main office. Further
investigation reveals that an unknown HTTP application is using a high percentage of the WAN interface
bandwidth and causing the dropouts. The operator can then change the unknown applications DSCP
classification to prevent it from stealing bandwidth.
Step 1
Step 2
The IP address of the Client machine of the user complaining about poor service.
View RTP Conversations Details to see the Jitter and Packet Loss statistics for the client experiencing
the problem.
Step 4
View the User Site Summary to confirm that other users at the same site are experiencing the same issue
with the same application.
Step 5
In the User Site Summary, under Device Reachability, hover your mouse cursor over the branchs edge
router. Prime Assurance displays a 360 View icon for the device under the Device IP column. Click the
icon to display the 360 View.
Step 6
In the 360 View, click the Alarms tab, to see alarms on the WAN interfaces, or on the Interfaces tab, to
see congested WAN interfaces and the top applications running on them.
14-7
Chapter 14
Troubleshooting
successfully joins a wireless controller, it cannot be managed by Prime Infrastructure, and it does not
contain the proper configuration settings to allow client access. Prime Infrastructure provides you with
a tool that diagnoses why an access point cannot join a controller, and lists corrective actions.
Note
To use this feature, your Prime Infrastructure implementation must include Assurance licenses.
The Unjoined AP page displays a list of access points that have not joined any wireless controllers. All
gathered information about the unjoined access point is included on the page. This information includes
name, MAC address, IP address, controller name and IP address, switch and port that the access point is
attached to, and any join failure reason, if known.
To troubleshoot unjoined access points:
Step 1
Step 2
In the Unjoined APs page, select an access point to diagnose, then click Troubleshoot.
Step 3
After the troubleshooting analysis runs, check the results in the Unjoined APs page.
If the access point has tried to join multiple wireless controllers but has been unsuccessful, the
controllers are listed in the left pane.
Step 4
Step 5
Check the right pane for recommendations for solving any problems, and perform any recommended
actions.
Step 6
(Optional) To further diagnose the problem, run RTTS through the Unjoined AP page by clicking the
RTTS icon
located to the right of the table. Examine the debug messages that appear in the table to
determine a cause for the access point being unable to join the controllers.
14-8
OL-32122-01
Chapter 14
Troubleshooting
Troubleshooting Wireless Performance Problems
Table 14-2 contains the list of RTTS debug commands for Legacy controllers and NGWC controllers.
Table 14-2
Controller
Legacy
NGWC
Commands
This feature requires that session information (netflow/NAM data, Assurance licenses) is available.
Step 1
Choose Dashboard > Performance > Site and view the site to which the client experiencing trouble
belongs.
Step 2
To see the AP that is experiencing trouble at this site, click the Settings icon (see Figure 7-3), then click
Add next to Busiest Access Points.
Step 3
Hover your mouse over a device to view device information. See Getting Device Details from the
Device 360 View.
Click on an AP name to go to the AP dashboard from where you can use the AP filter option to view
AP details such as Client Count, Channel Utilization, and, if you have an Assurance license, Top N
Clients and Top N Applications.
Volume information based on Assurance NetFlow data, if you have an Assurance license. For
example, you can see the traffic volume per AP.
14-9
Chapter 14
Troubleshooting
Step 2
Step 3
Click the expand icon corresponding to the faulty UCS device in the Cisco UCS Servers pane to open
the Schematic that shows the inter-connections of the UCS chassis and blades and the up/down status
of chassis, and blade servers.
Step 4
Click the Chassis tab and hover your mouse cursor over the faulty chassis name, then click the chassis
360 view icon to view the up/down status of power supply unit and fan modules.
Step 5
Click the Servers tab and hover your mouse cursor over the faulty blade server name, then click the
server 360 view icon.
The server 360 view provides detailed blade server information including the number of processors,
memory capacity, up/down status of adapters, network interface cards (NICs), and hot bus adapters
(HBAs).
Step 6
Click the Network tab to view the entire network interface details of fabric interconnect such as port
channel,Ethernet interface, vEthernet, and vFabric Channel.
Step 2
Click the faulty UCS device from the All Devices pane.
Step 3
Step 4
Click Fixed Modules to view the operational status of fabric interconnect ports.
Step 5
Click Interfaces to view the operational status for fabric interconnect port and interfaces. This is same
as the operational status of fabric interconnect port and interfaces viewed from Network tab in Compute
Devices page.
14-10
OL-32122-01
Chapter 14
Troubleshooting
Viewing Bandwidth on Fabric Interconnect Ports
Step 1
Choose Dashboard > Performance > Interface then choose the UCS device interface from the
Interface drop-down list.
or
Choose Dashboard > Overivew > Network Interface.
Step 2
Click the Settings icon as shown in Figure 14-1 and choose Add Dashlets.
Figure 14-1
Step 3
Step 4
Do the following if you have already created a fabric interconnect port group
a.
Click the Dashlet Options icon in the Top N Interface Utilization dashlet.
b.
Select the fabric interconnect port group in the Port Group and click Save And Close.
The Top N Interface Utilization dashlet displays the list of interfaces with maximum utilizaion
percentge. This dashlet also shows the average and maximum data transmission and reception details of
the fabric interconnect ports.
14-11
Chapter 14
Troubleshooting
14-12
OL-32122-01
CH A P T E R
15
You want to categorize the devices in your network into logical groups, with a different Prime
Infrastructure instance managing each of those groups. For example, you could have one instance
managing all of your networks wired devices and another managing all of its wireless devices.
The one Prime Infrastructure instance you have running is sufficient to manage your network, but
the addition of one or more instances would greatly improve Prime Infrastructures overall
performance by spreading the CPU and memory load among multiple instances.
Your network has sites located throughout the world, and you want a different Prime Infrastructure
instance to manage each of those sites in order to keep their data separate.
If multiple Prime Infrastructure instances are running in your network, you can monitor those instances
from the Operations Center. In this chapter, we will cover a typical workflow you might employ when
using the Operations Center. This workflow consists of the following tasks:
Running reports
See Setting Up the Operations Center in the Cisco Prime Infrastructure 2.2 Administrator Guide, for a
description of the tasks you must complete before using the Operations Center for the first time.
15-1
Chapter 15
Overview dashboards, which summarize the current status of key areas in your network.
Wireless dashboards, which provide performance and security metrics for the wireless portion of
your network.
The Performance dashboard, which provides performance information for your networks devices.
To access a particular dashboard, as well as the dashlets that comprise that dashboard, either click the
appropriate tabs on the main Operations Center page or select the dashboard from the Dashboard menu.
For more information about dashboards and dashlets, see Appendix A, Prime Infrastructure User
Interface Reference.
The alarms and events that have taken place in your network.
From the Device Group pane, select the desired device type, location, or user-defined group.
Apply a custom filter or select one of the predefined filters from the Show drop-down list. See
Performing a Quick Filter for more information. Operations Center provides a custom filter that
allows you to view duplicate devices across your managed instances.
Search for a particular device. See Search Methods for more information.
15-2
OL-32122-01
Chapter 15
Note
View the servers network latency, CPU utilization, memory utilization, license count, and alarms
generated for the Prime Infrastructure instances.
See if any backup servers are running. You can configure a backup Prime Infrastructure server to
automatically come online and take over operations for the associated primary server when it goes
down. For more information on the high availability framework provided by Prime Infrastructure,
see Configuring High Availability in the Cisco Prime Infrastructure 2.2 Administrator Guide.
Install backup servers (primary as well as secondary) with fully resolved host names.
Install Operations Center-enabled patches on both primary and secondary servers that are running
older Prime Infrastructure versions.
Aside from a servers reachability status, there are three metrics you should focus on: a servers network
latency, its CPU utilization, and its memory utilization. If a server has a network latency figure that
exceeds one second, or it has a CPU or memory utilization percentage greater than 80%, the chances are
good that an issue exists with that server.
15-3
Chapter 15
the bottom of the Operations Centers main page. From here, you can quickly determine if any of your
servers are currently down. You can also launch a separate Prime Infrastructure instance for the selected
server.
From the Device Group pane, select the desired device type, location, or user-defined group.
Apply a custom filter or select one of the predefined filters from the Show drop-down list. See
Performing a Quick Filter for more information.
Search for a particular alarm or event. See Search Methods for more information.
Hover your cursor on the Alarm Browser screen to display the aggregated count of alarms for the
managed Prime Infrastructure instances. You can also acknowledge, annotate, and delete alarms,
and the same action is duplicated on the respective Prime Infrastructure instance.
Apply a custom filter or select one of the predefined filters from the Show drop-down list. See
Performing a Quick Filter for more information.
Search for a particular client. See Search Methods for more information.
15-4
OL-32122-01
Chapter 15
15-5
Chapter 15
15-6
OL-32122-01
PART
Configuring Devices
CH A P T E R
16
16-1
Chapter 16
How diverse are the devices and services that you support?
If you have a small network with only one or two designers and not much variation among device
configurations, you could start by copying all CLI configurations you know are good into a set of
configuration and monitoring templates, then create a composite template that contains these templates.
If you have a large network with many different devices, try to identify the configurations you can
standardize. Creating feature and technology templates as exceptions to these standards allows you to
turn features on and off as needed.
CLI templatesUser-defined templates that are created based on your own parameters. CLI
templates allow you to choose the elements in the configurations. Prime Infrastructure provides
variables that you replace with actual values and logic statements. You can also import templates
from the Cisco Prime LAN Management System. See Example: Updating Passwords Using a CLI
Template.
Composite templatesTwo or more feature or CLI templates grouped together into one template.
You specify the order in which the templates contained in the composite template are deployed to
devices. See Creating Composite Templates.
Choose Configuration > Templates > Features and Technologies, choose the type of template, and
complete the required fields. For information about the field descriptions, see the Cisco Prime
Infrastructure 2.2 Reference Guide.
Step 2
Step 3
After you save a configuration task template, you can specify devices, values, and scheduling
information to tailor your deployment (see Applying and Scheduling Templates).
16-2
OL-32122-01
Chapter 16
Step 4
To verify the status of the template deployment, choose Administration > Jobs.
Choose Configuration > Templates > Features and Technologies > Security > ACL.
Step 2
Step 3
Step 4
Step 5
Click the arrow to expand the ACL, then click Add Row to provide additional details about the ACL
such as the action, source IP address, and wildcard mask.
Step 6
Click Save.
Step 7
After you save the template, you can specify devices, values, and scheduling information to tailor your
deployment (see Applying and Scheduling Templates).
Step 2
In the Features and Technologies menu on the left, choose a template type to create.
Step 3
16-3
Chapter 16
Step 4
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Step 5
Have expert knowledge and understanding of the CLI and be able to write the CLI in Apache VTL.
For more information about Apache Velocity Template Language, see
http://velocity.apache.org/engine/devel/vtl-reference-guide.html.
To know how to use variables and data types, see the Variables and Data Types.
Make sure that you have satisfied the prerequisites (see Prerequisites for Creating CLI Templates).
Step 1
Step 2
Step 3
In the OS Version field, you can specify an OS image version so that you can filter out devices older
than the one that you specified.
a.
In the Template Detail section, click the Manage Variables icon (above the CLI Content field).
This allows you to specify a variable for which you will define a value when you apply the template.
16-4
OL-32122-01
Chapter 16
b.
Click Add Row and enter the parameters for the new variable (see the Variables and Data Types),
then click Save.
c.
Enter the CLI information. In the CLI field, you must enter code using Apache VTL (see
http://velocity.apache.org/engine/devel/vtl-reference-guide.html). For more information about
different CLI command formats, see:
Adding Multi-line Commands
Adding Enable Mode Commands
Adding Interactive Commands
d.
Step 4
(Optional) To change the variables, click the Manage Variables icon, and then make your changes
(see the Variables and Data Types). Click Form View (a read-only view) to view the variables.
Click Save As New Template, specify the folder in which you want to save the template, then click Save.
To duplicate a CLI template, expand the System Templates - CLI, hover your mouse cursor over the
quick view picker icon next to CLI, and then click Duplicate.
Data Types
Data Type
Description
String
Enables you to create a text box for CLI templates. To specify a validation expression and a default value,
expand the row and configure the Default Value and Validation Expression fields.
Integer
Enables you to create a text box that accepts only numeric value. If you want to specify a range for the integer,
expand the row and configure the Range From and To fields. To specify a validation expression and a default
value, expand the row and configure the Default Value and Validation Expression fields.
DB
Enables you to specify a database type. See the Managing Database Variables in CLI Templates.
IPv4 Address Enables you to create a text box that accepts only IPv4 addresses for CLI templates. To specify a validation
expression and a default value, expand the row and configure the Default Value and Validation Expression
fields.
Drop-down
Enables you to create a list for CLI templates. To specify a validation expression and a default value, expand
the row and configure the Default Value field (with a comma-separated value for multiple lists which appears
in the UI).
Check box
Enables you to create a check box for CLI templates. To specify a validation expression and a default value,
expand the row and configure the Default Value field.
Radio Button
Enables you to create a radio button for CLI templates. To specify a validation expression and a default value,
expand the row and configure the Default Value field.
Text Area
Enables you to create a text area which allows multiline values for CLI templates. To specify a validation
expression and a default value, expand the row and configure the Default Value and Validation Expression
fields.
16-5
Chapter 16
DB variables are one of the data types in CLI templates. You can use the DB variables to generate
device-specific commands.
DB variables are predefined variables. To view the list of predefined DB variables, see the
CLITemplateDbVariablesQuery.properties file in the following folder
/opt/CSCOlumos/conf/ifm/template/inventoryTagsInTemplate.
Using the data collected by the DB variables, accurate commands can be generated to the device.
You can select the DB variable in the Type field (using the Managed Variables page). Expand the
name field and fill in the default value field with any of the DB variables which you want to use.
When a device is discovered and added to Prime Infrastructure, you can use the database values that
were gathered during the inventory collection to create CLI templates.
For example, if you want to create a CLI template to shut down all interfaces in a branch, create a CLI
template that contains the following commands:
#foreach ($interfaceName in $interfaceNameList)
interface $interfaceName
shutdown
#end
where $interfaceNameList is the database variable type whose value will be retrieved from the database.
$interfaceNameList has a default value of IntfName. You need to create the interfaceNameList variable
as DB data type (using the managed variable dialog box) and add set the default to IntfName. If you have
not specified a default value, you can specify it when you apply the CLI template.
To populate interfaceNameList with the value from the database, you must create a properties file to
capture the query string and save it in the /opt/CSCOlumos/conf/ifm/template/inventoryTagsInTemplate
folder.
To view the predefined DB variables go to the following path:
cd /opt/CSCOlumos/conf/ifm/template/inventoryTagsInTemplate
After you create and apply the CLI template and the property file, the following CLI is configured on
the devices. This output assumes that the device has two interfaces (Gigabitethernet0/1 and
Gigabitethernet0/0):
interface GigabitEthernet0/0
shutdown
interface GigabitEthernet0/1
shutdown
Note
While it is possible to create a customized query using Enterprise JavaBeans Query Language (EJB QL),
only advanced developers should attempt this. We recommend you use the variables defined in the
CLITemplateDbVariablesQuery.properties file only.
16-6
OL-32122-01
Chapter 16
Note
The validation expression value works only for the string data type field.
Example:
Choose Configuration > Features and Technologies > CLI Templates > CLI > Manage Variables > Add
Row. Choose string data type and then expand the row and configure the regular expression, which will
not allow a space in that text box.
Enter the following expression in the validating expression field.
^[\S]+$
where:
<MLTCMD> and </MLTCMD> tags are case-sensitive and must be entered as uppercase.
The multi-line commands must be inserted between the <MLTCMD> and </MLTCMD> tags.
Example 1:
<MLTCMD>banner_motd ~ Welcome to
Cisco. You are using
Multi-line commands.
~</MLTCMD>
Example 2:
<MLTCMD>banner motd ~ ${message}
~</MLTCMD>
16-7
Chapter 16
where <IQ> and <R> tag are case-sensitive and must be entered as uppercase.
For example:
#INTERACTIVE
crypto key generate rsa general-keys <IQ>yes/no<R> no
#ENDS_INTERACTIVE
For example:
#MODE_ENABLE
#INTERACTIVE
mkdir <IQ>Create directory<R>XXX
#ENDS_INTERACTIVE
#MODE_END_ENABLE
16-8
OL-32122-01
Chapter 16
wrr-queue random-detect
wrr-queue random-detect
wrr-queue random-detect
wrr-queue random-detect
wrr-queue random-detect
wrr-queue random-detect
wrr-queue random-detect
@</MLTCMD>
#ENDS_INTERACTIVE
max-threshold
min-threshold
max-threshold
min-threshold
max-threshold
min-threshold
max-threshold
4
5
5
6
6
7
7
80
70
80
70
80
60
70
90
80
90
80
90
70
80
100 100
90 100
100 100
90 100
100 100
80 90
90 100
Step 2
Step 3
In the CLI template, paste the copied code into the CLI Content field.
Step 4
Select the text that is to be the variable name and click Manage Variables (the icon above the CLI
Content field).
You can use this same procedure to edit an existing variable created from copied code.
Step 5
Fill out the required information, then click Save > Add.
Step 6
Step 2
Expand the CLI Template folder, then click System Templates - CLI.
Step 3
Step 4
Click the Export icon at the top right of the CLI template page.
Step 2
Expand the CLI Template folder, then hover your mouse cursor over the quick view picker icon next to
CLI.
Step 3
16-9
Chapter 16
Step 4
Click the Import icon at the top right of the CLI template page.
Step 5
Choose Configuration > Templates > Features and Technologies > CLI Templates.
Step 2
Step 3
Step 4
Click the Export icon at the top right of the CLI template page.
Step 5
Click OK.
Choose Configuration > Templates > Features and Technologies > CLI Templates.
Step 2
Step 3
Step 4
Click the Import icon at the top right of the CLI template page.
Step 5
Click OK.
If the four groups, North Region, South Region, East Region, and West Region, have not been created:
a.
Choose Inventory > Device Management > Network Devices, then hover your mouse cursor over
User Defined and click Add SubGroup.
16-10
OL-32122-01
Chapter 16
b.
To determine the location of a device, choose Inventory > Device Management > Network
Devices > (gear icon) > Columns > Location.
The devices for the new group appear under Device Work Center > User Defined > North.
c.
Step 2
Step 3
Choose Configuration > Templates > Features and Technologies > CLI Templates > System
Templates-CLI.
b.
c.
In the Device Selection area, open the User Defined groups and select the North Region and South
Region groups.
d.
In the Value Selection area, enter and confirm the new enable password, then click Apply.
e.
In the Schedule area, enter a name for the job, the date and time to apply the new template (or click
Now), then click OK.
After the job has run, choose Administration > Jobs to view the status of the job (see Monitoring Jobs).
Tagging Templates
You can label a set of templates by providing an intuitive name to tag the templates. After you create a
tagged template, the template is listed under the My Tags folder. Tagging a configuration template helps
you:
Step 2
Expand the Features and Technologies folder, choose an appropriate subfolder, and then choose a
template type.
Step 3
Complete the required fields, enter a tag name in the Tags field, then click Save as New Template.
16-11
Chapter 16
Step 2
In the Features and Technologies menu on the left, expand the My Templates folder and choose the
template that you want to update.
Step 3
Enter a tag name in the Tag as text box, then click Save.
Step 2
Click the Tag icon drop-down arrow on the navigation toolbar of the Templates column.
Step 3
Step 4
In the My Templates folder, click the templates that are to be associated with the tag.
To associate all of the templates in the folder with the tag, select the check box next to the My Templates
folder.
Then click Apply.
All of the templates that you create can be added to a single composite template, which aggregates all of
the individual feature templates that you need for the branch router. You can then use this composite
template to perform branch deployment operations and to replicate the configurations at other branches.
If you have multiple similar devices replicated across a branch, you can create and apply a master
(golden) composite template for all of the devices in the branch. You can use this master composite
template to:
16-12
OL-32122-01
Chapter 16
Step 1
Choose Configuration > Templates > Features & Technologies > Composite Templates > Composite
Templates.
Step 2
From the Device Type drop-down list, choose the devices to which all of the templates contained in
the composite template apply. For example, if your composite template contains one template that
applies to Cisco 7200 Series routers and another that applies to all routers, choose the Cisco 7200
Series routers in the Device Type list.
If a device type is dimmed, the template cannot be applied on that device type.
In the Template Detail area, choose the templates to include in the composite template.
Using the arrows, put the templates in the composite in the order in which they should be deployed
to the devices. For example, to create an ACL and associate it with an interface, put the ACL
template first, followed by the interface template.
Step 3
Click Save as New Template. After you save the template, and apply it to your devices (see Creating
and Deploying Feature-Level Configuration Templates).
Related Topic
Create configuration templates for the devices in your configuration group. See Creating and
Deploying Feature-Level Configuration Templates.
Step 1
Step 2
Complete the required fields. The device types displayed depend on what you select from the Device
Type field.
Step 3
Where needed, change a templates order in the group by selecting it and clicking the up or down arrow.
Step 4
16-13
Chapter 16
Table 16-2
Status
Description
Success
Pending
One or more devices in the configuration group have changes that have not yet been deployed. For example,
if you add a new device to the configuration group, the status of the new device is Pending. If you modify a
configuration template to which the configuration group is associated, all devices in the configuration group
have the status Pending.
Scheduled
Indicates that a configuration group deployment is scheduled. When a configuration group is Scheduled, any
devices in the group that are Pending or Failed are changed to Scheduled. If a device is Deployed, it remains
Deployed and its status does not change to Scheduled.
Failure
Deployment has failed for one or more devices in the configuration group.
Interface Roles
Interface Roles
Interface roles allow you to define policies to specific interfaces on multiple devices without having to
manually define the names of each interface. Interface roles can refer to any of the actual interfaces on
the device, including physical interfaces, subinterfaces, and virtual interfaces such as loopback
interfaces.
If you create an all-Ethernets interface role, you can define identical advanced settings for every Ethernet
interface on the device with a single definition. You add this interface role to a configuration template,
then deploy the template to the selected devices to configure the Ethernet interfaces.
Interface roles are especially useful when applying policies to new devices. As long as the devices that
you are adding share the same interface naming scheme as existing devices, you can quickly deploy the
necessary configuration template containing the interface role to the new devices.
16-14
OL-32122-01
Chapter 16
Step 2
In the Shared Policy Objects pane, choose Shared > Interface Role.
Step 3
Step 4
From the Add Interface Role page, create matching rules for the interface role.
When you define the zone-based template, for example, all of the interfaces on the device that match the
specified rules will become members of the security zone represented by this interface role. You can
match interfaces according to their name, description, type, and speed.
Step 5
Step 1
Choose Configuration > Templates > Shared Policy Objects > Shared > IPv4 Network Object.
Step 2
From the Network Object page, click Add Object and add a group of IP addresses or subnets.
Step 3
16-15
Chapter 16
Step 2
In the Shared Policy Objects pane, choose Shared > Security Rule Parameter Map.
Step 3
From the Security Rule Parameter Map page, click Add Object.
Step 4
Specify a name and description for the parameter map that is being created.
Step 5
From the parameters list, select the parameters you want to apply and provide a value for each of them.
Step 6
To specify Device Level Override, choose Device Level Override > Add Device.
Step 7
Step 8
Step 2
In the Shared Policy Objects pane, choose Shared > Security Service.
Step 3
Step 4
Specify a name and description for the service that is being created.
Step 5
Select the service data from the available list. If you select TCP or UDP, provide a list of port numbers
or port ranges (separated by comma).
Step 6
To specify Device Level Override, choose Device Level Override > Add Device.
Step 7
Step 8
Step 2
In the Shared Policy Objects pane, choose Shared > Security Zone.
Step 3
Step 4
Specify a name and description for the security zone that is being created.
Step 5
Specify a set of rules that defines the interfaces that must be attached to the zone.
Step 6
To specify Device Level Override, choose Device Level Override > Add Device.
Step 7
Step 8
16-16
OL-32122-01
Chapter 16
Switches
Step 2
From the Select a command drop-down list, choose Add Template, then click Go.
Step 3
Enter a name and description for the template and click Save. If you are updating an already existing
template, click the applicable template in the Template Name column.
Step 4
Click each of the tabs and complete the required fields. For information about the field descriptions, see
the Cisco Prime Infrastructure 2.2 Reference Guide.
Step 2
From the Select a command drop-down list, choose Add Template, then click Go. If you are updating
an already existing template, click the applicable template in the Template Name column.
Step 3
Enter a name for the template and the applicable CLI commands.
Note
Do not include any show commands in the CLI commands text box. The show commands are
not supported.
Note
After an access point has been converted to lightweight, the previous status or configuration of the access
point is not retained.
To create an autonomous AP migration template, follow these steps:
16-17
Chapter 16
Step 1
Step 2
From the Select a command drop-down list, choose Add Template, then click Go. If you are updating
an already existing template, click the applicable template in the Template Name column.
Step 3
Complete the required fields. For information about the field descriptions, see the Cisco Prime
Infrastructure 2.2 Reference Guide.
Step 4
To view the migration analysis summary, choose Monitor > Tools > Autonomous AP Migration
Analysis.
Step 2
From the Select a command drop-down list, choose Add Template, then click Go.
Step 3
Enter the required fields. For information about the field descriptions, see the Cisco Prime Infrastructure
2.2 Reference Guide.
Note
A controller cannot be a member of more than one mobility group. Adding a controller to one mobility
group removes that controller from any other mobility group to which it is already a member.
By choosing Configuration > Templates > Controller Configuration Groups, you can view a
summary of all configuration groups in the Prime Infrastructure database. Choose Add Configuration
Groups from the Select a command drop-down list to display a table with the following columns:
16-18
OL-32122-01
Chapter 16
Step 2
From the Select a command drop-down list, choose Add Config Group, then click Go.
Step 3
Enter the new configuration group name. It must be unique across all groups.
If Enable Background Audit is selected, the network and controller audits occur for this
configuration group.
Note
Step 4
If Enable Enforcement is selected, the templates are automatically applied during the audit if any
discrepancies are found.
Other templates created in Prime Infrastructure can be assigned to a configuration group. The same
WLAN template can be assigned to more than one configuration group. Choose from the following:
Copy templates from a controllerClick to copy templates from another controller. Choose a
controller from a list of current controllers to copy its applied template to the new configuration
group. Only the templates are copied.
Note
Step 5
If the Enable Background Audit option is chosen, the network and controller audit is
performed on this configuration group.
The order of the templates is important when dealing with radio templates. For example, if
the template list includes radio templates that require the radio network to be disabled prior
to applying the radio parameters, the template to disable the radio network must be added to
the template first.
TemplatesAllows you to select the configuration templates that you have already created.
ReportAllows you to view the most recent report for this group.
16-19
Chapter 16
Step 2
Click a group name in the Group Name column, then click the Audit tab.
The columns in the table display the IP address of the controller, the configuration group name the
controller belongs to, and the mobility group name of the controller.
Step 3
Click to highlight the row of the controller that you want to add to the group, then click Add.
Note
Step 4
Note
If you want to remove a controller from the group, highlight the controller in the Group
Controllers area and click Remove.
Click the Apply/Schedule tab, click Apply to add or remove the controllers to the configuration groups,
then click Save Selection.
You cannot add or configure Catalyst 3850 Series Switches or Cisco 5700 Series Wireless LAN
Controllers using the Classic view. To add or configure these devices, use the Lifecycle view.
Note
802.11a/n and 802.11b/n networks for controllers and access points must be disabled before configuring
a country on a controller. To disable 802.11a/n or 802.11b/n networks, choose Configure > Controllers,
select the desired controller that you want to disable, choose 802.11a/n or 802.11b/g/n from the left
sidebar menu, and then choose Parameters. The Network Status is the first check box.
To add multiple controllers that are defined in a configuration group and then set the DCA channels,
follow these steps:
Step 1
Step 2
From the Select a command drop-down list, choose Add Config Groups, then click Go.
Step 3
Create a configuration group by entering the group name and mobility group name.
Step 4
Step 5
Highlight the controllers that you want to add, and click Add. The controller is added to the Group
Controllers page.
Step 6
Click the Country/DCA tab. The Country/DCA page appears. Dynamic Channel Allocation (DCA)
automatically selects a reasonably good channel allocation amongst a set of managed devices connected
to the controller.
Step 7
Select the Update Country/DCA check box to display a list of countries from which to choose.
16-20
OL-32122-01
Chapter 16
Step 8
Those DCA channels that are currently configured on the controller for the same mobility group are
displayed in the Select Country Codes page. The corresponding 802.11a/n and 802.11b/n allowable
channels for the chosen country is displayed as well. You can add or delete any channels in the list by
selecting or deselecting the channel and clicking Save Selection.
Note
Step 2
Click a group name in the Group Name column, then choose the Apply/Schedule tab.
Step 3
Click Apply to start the provisioning of mobility groups, mobility members, and templates to all of the
controllers in the configuration group. After you apply, you can leave this page or log out of Prime
Infrastructure. The process continues, and you can return later to this page to view a report.
Note
Do not perform any other configuration group functions during the apply provisioning.
A report is generated and appears in the Recent Apply Report page. It shows which mobility groups,
mobility members, or templates were successfully applied to each of the controllers.
Step 4
Enter a starting date in the text box or use the calendar icon to choose a start date.
Step 5
Choose the starting time using the hours and minutes drop-down lists.
Step 6
Step 2
Click a group name in the Group Name column, then click the Audit tab.
Step 3
Click to highlight a controller on the Controllers tab, choose >> (Add), and Save Selection.
Step 4
Click to highlight a template on the Templates tab, choose >> (Add), and Save Selection.
16-21
Chapter 16
Step 5
Note
This audit does not enforce Prime Infrastructure configuration to the device. It only identifies
the discrepancies.
Step 6
Step 7
Double-click a line item to open the Attribute Differences page. This page displays the attribute, its value
in Prime Infrastructure, and its value in the controller.
Note
Step 8
Click Retain Prime Infrastructure Value to push all attributes in the Attribute Differences
page to the device.
Step 2
Click a group name in the Group Name column, then click the Reboot tab.
Step 3
Select the Cascade Reboot check box if you want to reboot one controller at a time, waiting for that
controller to come up before rebooting the next controller.
Step 4
Click Reboot to reboot all controllers in the configuration group at the same time. During the reboot,
you can leave this page or log out of Prime Infrastructure. The process continues, and you can return
later to this page and view a report.
The Recent Reboot Report page shows when each controller was rebooted and what the controller status
is after the reboot. If Prime Infrastructure is unable to reboot the controller, a failure is shown.
Step 2
Click a group name in the Group Name column, then click the Report tab. The Recent Apply Report
page displays all recently applied reports including the apply status, the date and time the apply was
initiated, and the number of templates. The following information is provided for each individual IP
address:
16-22
OL-32122-01
Chapter 16
Step 3
Successful TemplatesIndicates the number of successful templates associated with the applicable
IP address.
FailuresIndicates the number of failures with the provisioning of mobility group, mobility
members, and templates to the applicable controller.
DetailsClick Details to view the individual failures and associated error messages.
If you want to view the scheduled task reports, click the click here link at the bottom of the page.
Education
EnterpriseBest
EnterpriseRogue
Financial
HealthCare
HotSpotOpen
Hotspot8021x
Military
Retail
Tradeshow
Warehouse
16-23
Chapter 16
The wIPS Profiles > Profile List page allows you to view, edit, apply, or delete current wIPS profiles
and to add new profiles. The Profile List provides the following information for each profile:
Profile NameIndicates the user-defined name for the current profile. Click the profile name to
view or edit profile details.
Hover your mouse cursor over the profile name to view the Profile ID and version.
MSE(s) Applied ToIndicates the number of mobility services engines (MSEs) to which this
profile is applied. Click the MSE number to view profile assignment details.
Controller(s) Applied ToIndicates the number of controllers to which this profile is applied.
Click the controller number to view profile assignment details.
Step 2
From the Select a command drop-down list, choose Add Profile, then click Go.
Step 3
Enter a profile name in the Profile Name text box of the Profile Parameters page.
Step 4
Select the applicable predefined profile, or choose Default from the drop-down list.
Step 5
Step 6
Step 7
From the Select a command drop-down list on the SSID Group List page, choose Add Group or
Add Groups from Global List, then click Go.
b.
Enter the group name and one or more SSID groups, then click Save.
To determine which policies are included in the current profile, choose Profile Configuration. The
check boxes in the policy tree (located in the left Select Policy pane) indicate which policies are enabled
or disabled in the current profile. Using this page, you can:
Enable or disable an entire branch or an individual policy by selecting or unselecting the check box
for the applicable branch or policy.
By default, all policies are selected.
Click an individual policy to display the policy description. Use the Policy Rules page add, edit,
delete, and reorder the current policy rule settings.
Note
There must be at least one policy rule in place. You cannot delete a policy rule if it is the
only one in the list.
Note
the selected policy. Because every policy must contain at least one threshold, default thresholds
are defined for each based on standard wireless network issues. Threshold options vary based
on the selected policy.
16-24
OL-32122-01
Chapter 16
When the threshold is reached for a policy, an alarm is triggered. Alarms from Cisco Adaptive
wIPS DoS and security penetration attacks are classified as security alarms. A summary of these
attacks is located in the Security Summary page; choose Monitor > Security to access this
page. The wIPS attacks are located in the Threats and Attacks section.
SeverityIndicates the level of severity of the selected policy. Parameters include critical,
major, info, and warning. The value of this field might vary depending on the wireless network.
NotificationIndicates the type of notification associated with the threshold.
ACL/SSID GroupIndicates the ACL or SSID Group(s) to which this threshold is be applied.
Note
Step 8
When the profile configuration is complete, select Next to proceed to the MSE/Controller(s) page.
Step 9
In the Apply Profile page, select the mobility services engine and controller(s) to which you want to
apply the current profile, then click Apply to apply the current profile to the selected mobility services
engine/controller(s).
You can also apply a profile directly from the profile list. From the Profile List page, select the profile
that you want to apply and click Apply Profile from the Select a command drop-down list. Then click
Go to access the Apply Profile page.
16-25
Chapter 16
16-26
OL-32122-01
CH A P T E R
17
Table 17-1
Step 1
Step 2
From the left sidebar menu, open the folder that contains the type of template that you want to apply.
Step 3
Select the check box of the template that you want to apply, then click Deploy.
Step 4
Provide the information described in the Table 17-1, then click OK.
Step 5
Option
Description
Device Selection
Displays the list of devices to which you want to apply the template.
Value Assignment
Allows you to specify a variable other than what was previously defined in the configuration template.
Click a name, and the previously defined variables are displayed. To change any of the values, click the
variable that you want to change, enter a new value, and click Apply.
You can also update the variables for all selected devices. Click All Selected Devices and update
variables to apply the changes on all selected devices at the same time. If you want to update variables
for a particular device in the list that need not be applicable to other devices, then choose the device
and update its variables. All of the other devices will continue to use the variables that were previously
defined except for the device for which variables are updated.
Note
The changes that you make apply only to the specific configuration that you are deploying. To
change the configuration template for all future deployments, choose Configuration >
Templates > Features & Technologies and change the template.
17-1
Chapter 17
Table 17-1
Option
Description
Schedule
Allows you to create a meaningful deployment job name, then specify whether to run the job now or in
the future.
You can also schedule the job to run periodically on hourly, daily, weekly, monthly or yearly basis.
Job Option
Failure Policy
Ignore failure and continueThis is the default option. The devices are randomly picked up
for template deployment. If the job fails on a device, the job skips the device and continues
with the remaining devices. The Job results show success/failure information for all the
selected devices.
Stop on failureIf the job fails to execute on a device, the job is stopped. The job results are
updated only for the devices on which the job was executed successfully and for other devices
which didnt undergo template deployment, Not Attempted message is shown. The order of
devices chosen for deployment will be same as the device order in Value assignment pane.
Summary
Copy Running Config to StartupIf the template deployment job succeeds, the running
configuration of the device is copied to startup configuration.
Archive Config after deployCreates a new config archive job and archives the configuration of
devices after successfully deploying the template.
Note
The undeploy option is applicable only for the controller templates listed under Templates > Features
and Technologies > Controller and will be active only if the controller template has been deployed to
a device.
17-2
OL-32122-01
Chapter 17
Create a Plug and Play profile (see Creating Plug and Play Profiles).
Step 2
Based on the Plug and Play method, add a new device with CNS capabilities to the network, and apply
a bootstrap configuration to activate the CNS agent on the device. Use any of the bootstrap delivery
methods that Prime Infrastructure supports, or use your own mechanism (see Delivering and Applying
the Bootstrap).
The device uses the call-home agent capability to connect to the Prime Infrastructure server.
2.
3.
The Prime Infrastructure server receives the ID of the new device and verifies that the device ID
matches the device ID in any of the Plug and Play preprovisioning definitions. If there is no match
for the device ID, Prime Infrastructure matches the device type with any of the existing type-based
Plug and Play preprovisioning definitions.
4.
If there is a match, Prime Infrastructure applies the software image and the configuration specified
in the matched Plug and Play profile on the device and adds the device to its inventory.
After the bootstrap configuration is applied to the device, the installer connects the device t1o a WAN at
the remote site. The device connects to the Plug and Play gateway using its serial number, and downloads
the full configuration and (optional) Cisco IOS image (see Figure 17-1).
Figure 17-1
17-3
Chapter 17
Note
It is not mandatory to set up Cisco Prime Plug and Play gateway. In Cisco Prime
Infrastructure Release 2.0, Plug and Play gateway is integrated with Prime Infrastructure. If
the user explicitly wants the gateway setup, then Cisco Prime Plug and Play gateway can be
set up. Do not execute the cns config retrieve or cns image retrieve command on a device
that has been added using the Plug and Play feature.
2.
Use a CLI template to create a bootstrap configuration template (see Creating a Bootstrap
Configuration Template).
3.
Download the software image (see Downloading Software Images). This step is optional.
4.
Note
You can also use the Configuration > Templates > Features & Technologies > CLI Templates >
System Templates-CLI > Plug And Play Bootstrap to create the bootstrap template.
To create a bootstrap configuration template for CNS devices:
Step 1
Choose Configuration > Templates > Features & Technologies> CLI Templates > CLI.
Step 2
When you create the bootstrap template, enter Bootstrap in the tag field associated with the CLI
template. Then the new bootstrap template will be listed in the Bootstrap Template column when a Plug
and Play profile is being created.
The CLI template should have these configurations for the device CNS agent to connect to the Prime
Infrastructure Plug and Play gateway server:
IP reachability to the Prime Infrastructure Plug and Play gateway server (if required)
CNS configurations
17-4
OL-32122-01
Chapter 17
Step 2
Click Import, then specify the source from which the software image is to be imported.
Step 3
Specify the collection options and when to import the image file. You can run the job immediately or
schedule it to run at a later time.
The image import job will run only once.
Step 4
Click Submit.
Step 5
To view the details of image management job, choose Administration > Jobs.
A CLI template (for more information, see Creating CLI Configuration Templates)
Step 2
Provide the required information. See the Cisco Prime Infrastructure 2.2 Reference Guide for field
descriptions.
Step 3
Click Save as New Plug and Play Profile, then Save to confirm the new profile.
17-5
Chapter 17
Step 2
In the Plug and Play Profiles page, select a profile and click Publish.
Step 3
Step 4
Provide the required information. See the Cisco Prime Infrastructure 2.2 Reference Guide for field
descriptions.
Step 5
The device type is matched hierarchically; Prime Infrastructure searches for a profile with the same
device type as that of the incoming device. If the profile does not match the device type, Prime
Infrastructure searches for a profile that is defined for a higher level of the device type in the
hierarchy.
For example:
If the switch_profile in Prime Infrastructure is defined for Switches and Hubs and the incoming
device is of type Switches and Hubs > Catalyst 2928 Series Switches > Catalyst 2928-24TC-C
switch, and
If there is no profile defined specifically for this switch (Catalyst 2928-24TC-C or Catalyst 2928
Series Switches), then the switch_profile is considered for deployment.
2.
If Prime Infrastructure has multiple matching deployment profiles for a given device type, then
Prime Infrastructure chooses the deployment profile that is created or has been recently updated.
17-6
OL-32122-01
Chapter 17
Step 2
From the Plug and Play Profiles page, select a profile from the list.
Step 3
From the Device Provisioning Profiles page, select the device profile from the list, click Bootstrap
Configuration > Export Bootstrap, then click OK.
Step 4
After the bootstrap configuration is applied, the Plug and Play deployment is initiated. To check the Plug
and Play status, do one of following:
To check information about all incoming devices, choose Configuration > Plug and Play> Status.
To check the history of deployment, point to the Quick View icon in the right corner of the Current
Status field for the device.
Step 2
From the Plug and Play Profiles page, select a profile from the list.
Step 3
In the Device Provisioning Profiles page, select the Device Profile from the list, click Bootstrap
Configuration > TFTP, then click OK.
Step 4
After the bootstrap configuration is applied, the Plug and Play deployment is initiated. To check the Plug
and Play status, choose one of these options:
To check information about all incoming devices, choose Configuration > Plug and Play> Status.
To check the history of deployment, hover your mouse cursor over the Quick View icon in the right
corner of the Current Status field for the device.
Note
Before you can email the bootstrap configuration, you must set the email settings under Administration
> System Settings > Mail Server Configuration.
17-7
Chapter 17
Step 2
Select a profile from the list and click Bootstrap Configuration > Email Bootstrap.
Step 3
Enter the email address to which the bootstrap configuration is be sent, then click OK.
Step 4
After the bootstrap configuration is applied, the Plug and Play deployment is initiated. To check the Plug
and Play status, choose one of these options:
To check information about all incoming devices, choose Configuration > Plug and Play> Status.
To check the history of deployment, hover your mouse cursor over the Quick View icon in the right
corner of the Current Status field for the device.
Step 2
Select the device profile from the list and click Email PIN.
Step 3
Enter the email address to which the PIN should be sent and click OK.
Step 4
If you are applying the bootstrap configuration using the deployment application, the Prime
Infrastructure Plug and Play deployment application communicates to the Prime Infrastructure and
applies the bootstrap configuration on the device.
If you are manually applying the bootstrap configuration using the PIN:
Use the PIN to download the bootstrap configuration from the Prime Infrastructure Plug and
For detailed information about Plug and Play deployment, see the Cisco Plug and Play Application
2.0 User Guide.
Step 5
After the bootstrap configuration is applied, the Plug and Play deployment is initiated. To check the Plug
and Play status, choose one of these options:
To check information about all incoming devices, choose Configuration > Plug and Play> Status.
To check the history of deployment, hover your mouse cursor over the Quick View icon in the right
corner of the Current Status field for the device.
17-8
OL-32122-01
Chapter 17
Note
The controller radio and b/g networks are initially disabled by the Prime Infrastructure startup
configuration file. You can turn on those radio networks by using a template, which should be included
as one of the automated templates.
Description
Filter Name
Filter Enable
Monitor Only
If selected, the Cisco WLC defined in this filter is managed by Prime Infrastructure but not
configured by Prime Infrastructure if the Cisco WLC contacts Prime Infrastructure during the
auto provisioning process.
Filter Mode
Indicates the search mode for this filter (Host Name, MAC Address, or Serial Number).
17-9
Chapter 17
Step 1
Choose Configuration > Plug and Play > Controller Auto Provisioning.
Step 2
Choose Add Filter from the Select a command drop-down list, then click Go.
Step 3
Step 4
Click Save.
Choose Configuration > Plug and Play > Controller Auto Provisioning, then from the left sidebar
menu, choose Setting.
Step 2
Click to highlight the applicable search key, then use the Move Up or Move Down buttons to move the
search key to a higher or lower priority.
Step 3
17-10
OL-32122-01
CH A P T E R
18
AP Template
Config Group
WLAN Configuration
Download Software
At least one lightweight access point task must exist (see Creating Lightweight AP Configuration
Templates).
To modify a current access point template task:
Step 1
18-1
Chapter 18
Step 2
Step 3
Step 4
Make any necessary changes to the current schedule or access point template, and click Schedule.
Step 2
Step 3
Choose Enable Schedule from the Select a command drop-down list, then click Go.
Related Topics
To view and manage all scheduled WLAN tasks in Cisco Prime Infrastructure:
Step 1
Step 2
From the left sidebar menu, choose WLAN Configuration to open the WLAN Configuration Task List
page.
Step 3
Select the Task Name link to open the WLAN Schedule Detail page. In this page, you can modify the
date and time of the scheduled task.
Step 4
Select the check box of the scheduled task and use the Select a command drop-down list to enable,
disable, or delete selected tasks.
Related Topics
18-2
OL-32122-01
Chapter 18
Choose Configuration > Scheduled Configuration Task, then from the left sidebar menu, choose
Download Software.
Step 2
Choose Add Download Software Task from the Select a command drop-down list, then click Go.
Step 3
General
Task NameEnter a Scheduled Task Name to identify this scheduled software download task.
Schedule Details
Download TypeSelect the download type. Select the Download software to controller check
box to schedule download software to controller or select the Pre-download software APs
check box to schedule the pre-download software APs. If you select Download software to
controller, specify the image details.
Note
The pre-download option is displayed only when all selected controllers are using the
Release 7.0.x.x or later.
To see Image Predownload status per AP, enable the task in the Administration > Background
Task > AP Image Predownload Task page, and run an AP Image Predownload report from the
Report Launch Pad.
Note
Reboot Type Automatic can be set only when the Download software to controller
option is selected.
Download date/timeEnter a date in the provided text box or click the calendar icon to open a
calendar from which you can choose a date. Select the time from the hours and minutes
drop-down lists.
Reboot date/timeThis option appears only if select the reboot type Scheduled. Enter a date
in the provided text box or click the calendar icon to open a calendar from which you can choose
a date to reboot the controller. Choose the time from the hours and minutes drop-down lists.
Schedule enough time (at least 30 minutes) between Download and Reboot so that all APs can
complete the software pre-download.
If any one of the AP is in pre-download progress state at the time of scheduled reboot, the
controller does not reboot. In such a case, wait for the pre-download to finish for all of the APs
and reboot the controller manually.
Notification (Optional)Enter the email address of recipient to send notifications via email.
18-3
Chapter 18
If you choose TFTP server, choose Default Server or add a New server from the Server Name
drop-down list.
Specify the IP address of the TFTP server. This is automatically populated if the default server
is selected.
Specify the local filename or click Browse to navigate to the appropriate file.
If you selected TFTP server previously, specify the filename.
If you choose FTP server, choose Default Server or add a New server from the Server Name
drop-down list.
Specify the IP address of the FTP server. This is automatically populated if the default server is
selected.
Specify the local filename, or click Browse to navigate to the appropriate file.
If you selected FTP server previously, specify the filename.
Step 4
Click Save.
At least one download software task must exist (see Adding a Download Software Task).
To modify a download software task:
Step 1
Step 2
Step 3
Click the Task Name link to open the Download Software Task page, make any changes, then click Save.
Any changes in Download Type (Download/Pre-download) or Server Type (FTP/TFTP) for the task in
'Enabled' state sets the task to 'Disabled' state and all of the existing controllers are disassociated from
the task.
18-4
OL-32122-01
Chapter 18
Step 2
Step 3
Click the Controller to open the Download Software Task details page, then click Select Controller to
view the controller list.
Note
If the pre-download option is chosen for the task, then only the controllers with software
Release 7.0.x.x or later are listed.
The Select Controllers page can also be accessed from Configuration > Scheduled Configuration Task
> Download Software, then click the hyperlink in the Select Controller column for any download task
that is in the Enabled, Disabled or Expired state.
Controllers with Reachability Status 'Unreachable' cannot be selected for Download Software Task.
Step 4
One or more devices are unreachableVerify that the device credentials are correct; ping the device
to verify that it is reachable. For more information, see Getting Device Details from the Device 360
View.
A device CLI returned an error because the CLI was incorrectVerify that the CLI commands
contained in the template are correct by running the commands on a test device. There are several
reasons a device CLI returned an error:
The device configuration was modified directly via CLI (out-of-band changes) and the Prime
Infrastructure database is not synchronized with those changes. When you apply a configuration
template, it is assumed that the Prime Infrastructure database is up-to-date with the latest device
configuration. We recommend that you run an inventory collection for the failing device from
the Device Work Center and make sure all out-of-band changes are up-to-date, and then
redeploy the template.
One or more devices are not in Managed collection state. When you apply a configuration
template, it is assumed that the Prime Infrastructure database is up-to-date with the current
device configuration. If a device has a collection status other than Managed, for example
Managed with Errors or Managed With Warnings, the template deployment might fail. See
Troubleshooting Unmanaged Devices for more information about device collection status.
The device does not have the appropriate Cisco IOS software version or the appropriate license
to configure the requested feature. Log in directly to the device on which the template
deployment failed and verify that the device supports the CLI that is specified in the template.
18-5
Chapter 18
After you create a new template, you should apply it to one device only to verify that it works as
designed. After you test that your configuration template is working on a single device, you can apply it
to multiple devices as necessary.
18-6
OL-32122-01
CH A P T E R
19
Configuring Interfaces
Configuring DMVPN
Configuring GETVPN
19-1
Chapter 19
Step 1
Step 2
Step 3
Add or edit the device in Cisco Prime Infrastructure to use SSHv2 (rather than Telnet) as the
management transport protocol.
a.
When you add the device with automatic discovery, enter the SSH credentials.(Adding Devices
Using Discovery.)
b.
When you add the devices manually (Adding Devices Manually), in Step 2, select SSH2 as the
protocol.
Edit the device credentials, if the device is also managed by Cisco Prime Infrastructure which is not
configured to use SSH2:
a.
b.
c.
d.
Click Update.
Activate WSMA profile on the device by deploying the WSMA Config Service-SSH Out Of the Box CLI
template:
a.
Choose Configuration > Template > Features and Technologies > CLI Templates >System
Templates - CLI > WSMA Config Service-SSH > Deploy.
b.
For more information about WSMA, see the WSMA Configuration Guide.
Step 4
Configure a configuration archive, which will be used by WSMA for handling transactional
configurations and rollbacks by using the following CLI commands on the device:
#configure terminal
archive
log config
hidekeys
path flash:roll
maximum 5
#end
For more information about configuration archives, see the Cisco IOS Configuration Fundamentals
Command Reference Guide.
19-2
OL-32122-01
Chapter 19
The Services > Application Visibility & Control menu is visible only if you have an Assurance license.
To view all features under the Application Visibility & Control menu, you must have the correct
permissions, such as device view configuration access; if you have only view permissions, some features
are not visible.
The Application Visibility feature is supported on the following platforms:
ISR 4300 and 4400 series platform from Cisco IOS-XE Release 15.3(2)S or later
Application Visibility is configured differently on different platforms and IOS releases. Newer IOS
releases provide new mechanisms with better performance for setting up the Application Visibility and
Control (AVC). Thus, when upgrading an ASR 1000, CSR, or ISR 4400 platforms running IOS-XE
release prior to 15.4(1)S to an IOS-XE release 15.4(1)S or later, or when upgrading an ISR-G2 platform
running IOS release prior to 15.4(1)T to IOS release 15.4(1)T or later, we recommend that you
reconfigure the AVC on these devices.
To simplify configuration, the Application Visibility feature is split into four types of metric and
NetFlow reports:
Report
Description
Traffic Statistics
Voice/Video Metrics
Activating the Application Visibility feature can impact device performance. To minimize the potential
impact, the template allows you to select the traffic interfaces to monitor and the reports to generate.
To configure application visibility in your network:
1.
(Optional) Set up WSMA on the devices to assure that the devices are configured via the WSMA
protocol, rather than CLI (for more information, see Configuring the Device using WSMA). WSMA
provides a more robust configuration mechanism.
19-3
Chapter 19
2.
Make sure that your devices are running up-to-date NBAR protocol packs (see Managing NBAR
Protocol Packs) and run the required IOS release with the appropriate IOS-license for Application
Visibility. (See Assessing AVC Readiness of Your Routers)
3.
(Optional. Supported only for the ASR 1000 Series) Estimate the potential resources impact on the
device (CPU and memory) before activating Application Visibility on the device (for more
information, see Estimating CPU, Memory and NetFlow Resources on ASR Devices).
4.
Activate Application Visibility on the device, either by creating a template and pushing it across the
network (for more information, see Creating an Application Visibility Template), or by enabling a
predefined AVC template on an interface or multiple interfaces, either across the network, from the
AVC-Interface-Configuration Screen (see Enabling Application Visibility on Interfaces) or on a
selected device from the Device Work Center (see Enabling Default Application Visibility on a
Selected Device).
After activating Application Visibility on an interface, if you wish to extract the highly granular netflow
reports to troubleshoot specific issues you can setup an AVC troubleshooting Session (see Application
Visibility Troubleshooting Sessions)
Already running AVC (devices that are configured to send netflow reports).
Incapable of running AVC (for example:, missing licenses or the device is running an older version
of Cisco IOS/IOS-XE release that does not support the required features).
Unknown - these are the devices for which the system cannot deduce information. This status is due
to failure in the inventory collection or due to communication problems in the device.
19-4
OL-32122-01
Chapter 19
When you upgrade an NBAR protocol pack on the device, a corresponding Prime Infrastructure update
should be performed to update Prime Infrastructure with the supported protocols/applications on the
devices.To achieve this a periodic Cisco Prime Infrastructure software update (UBF file) is issued when
new protocol packs are released.
Your network may contain various platforms (ISR-G2/ASR) running different Cisco IOS software
releases and different protocol pack releases. While we do not recommend that you have different
protocol pack releases installed on different devices reporting application visibility reports
simultaneously, Cisco Prime Infrastructure will be able to support this, by configuring only the
supported subset of protocols/applications, defined as filtering conditions in your template, on each of
the devices, when deploying an application visibility template across multiple devices running different
versions of NBAR protocol packs.
Cisco Prime Infrastructure 2.2 allows to distribute and install NBAR protocol pack on any of the routers
supporting the AVC in your network. To install the NBAR protocol pack on the routers, you first need
to import the protocol pack to the Cisco Prime Infrastructure, and then install and activate the protocol
packs on a selected device.
Choose Services > Application Visibility & Control > NBAR2 Protocol Pack Management.
Step 2
Step 3
File If you select File, from the Collection Options, click Browse to select a protocol pack
from you local file system that you want to import.
URL If you select URL, specify the URL from which the protocol pack must be imported.
Step 4
Click Submit.
Step 5
From Schedule, select whether you want to schedule the import job immediately or for a later date and
time.
Step 6
Click OK to import the protocol pack image into Cisco Prime Infrastructure.
Choose Services > Application Visibility & Control > NBAR2 Protocol Pack Management.
Step 2
Select the protocol pack that you want to install or upgrade for a particular device, and click Distribute
or Distribute for ISSU.
Distribute for ISSU is used to install a standby NBAR2 protocol pack on a device prior to IOS image
update on that device, so that the installed standby protocol pack is activated immediately after the IOS
image update.
19-5
Chapter 19
Step 3
From the Device Selection, select the devices on which you want to install or upgrade the protocol pack.
Note
The view will show only the devices applicable for the selected protocol pack. These are the devices that
have the required IOS image and license to support the AVC and the IOS image that supports the NBAR
engine version on which the selected protocol pack is built.
Step 4
Uncheck Activate Protocol Packs only after a successful copying to all selected device(s) check
box from the Advanced Distribute Option, if you want to activate the protocol pack on the devices
to which the protocol pack was successfully copied, even if the protocol pack was not copied to some
of the selected devices.
(Optional) Check Remove unsupported protocols and attributes from the running config to
force immediate activation of protocol pack check box, if your device has references to NBAR
applications (or attributes) which are not supported by the distributed protocol pack. This is required
when downgrading protocol pack releases.
Note
Checking this option will change your devices running-configuration and may require revisiting
all policies which have references to NBAR applications post activation.
Step 5
From Schedule, select whether you want to schedule the import job immediately or for a later date and
time.
Step 6
(Optional) Check Copy running config to startup check box from the Job options panel, if you want
to automatically copy the running config to the startup config file after activating the protocol packs.
Check Archive Config After Deploy check box, if you want to automatically collect a configuration
archive after activating the protocol pack.
Step 7
Click Submit to install/activate the protocol pack for the selected devices.
Step 2
From the list of protocol packs that are imported, select the protocol packs that you want to delete.
Step 3
Click Delete.
19-6
OL-32122-01
Chapter 19
DRE is supported on all ASRs running Cisco IOS-XE Release 15.3(1)S1 or later with one or more of
these modules installed:
cevModuleASR1000ESP5
cevModuleASR1000ESP10
cevModuleASR1000ESP20
cevModuleASR1001ESP
cevModuleASR1002FESP
Choose Services > Application Visibility and Control > Readiness Assessment.
Step 2
Click the down arrow icon in the Interface column for the device that you want estimates on.
The list shows only those interfaces supporting Application Visibility capability.
Step 3
Select Internet Profile or Enterprise Profile. The device resource estimation is based on a typical
traffic profile. Select Internet Profile for typical service-provider traffic, or Enterprise Profile for a
typical enterprise-traffic.
Step 4
Select the interfaces for which you want to estimate the resource utilization.
Speeds shown are those currently configured for each interface. If you want to base the estimate on a
different speed, click Speed (Mbps) and enter a different value. The changes will be retained as long as
you continue working.
Step 5
Application Visibility on IPv4For generating traffic statistics and HTTP or URL visibility netflow
reports on all IPv4 traffic.
19-7
Chapter 19
Note
Application Visibility on IPv4+IPv6 For generating traffic statistics and HTTP or URL visibility
netflow reports on all IPv4 and IPv6 traffic.
Application Visibility and Performance on Ipv4For generating traffic statistics and HTTP or URL
visibility netflow reports on all IPv4 traffic and generates Application Response Time reports for all
IPv4 and TCP traffic and voice and video metrics reports on all IPv4 and RTP traffic.
Application Visibility and Performance on IPv4+Ipv6For generating traffic statistics and HTTP
or URL visibility netflow reports on all IPv4+IPv6 traffic and generates Application Response Time
reports for all IPv4+IPv6 and TCP traffic and voice and video metrics reports on all IPv4+IPv6 and
RTP traffic.
The default IPv4 and IPv4+IPv6 profiles that exist in releases prior to 2.2 are replaced with the
Application Visibility and Performance on IPv4 and the Application Visibility and Performance on
IPv4+IPv6 profiles respectively.
Choose Services > Application Visibility & Control > AVC Profiles and select the App Visibility
Profiles.
Step 2
Choose Services > Application Visibility & Control > Interfaces Configuration to launch the
Interfaces Configuration page.
Step 2
Choose the Port Group Selector and Advanced Filtering to filter the list of interfaces.
Step 3
Select the interfaces from the list on which you want to enable Application Visibility.
Step 4
Select an Application Visibility profile from the Enable App Visibility check box drop-down list.
Step 5
Review and select the Copy Running Config to Startup and Archive Config after Deploy check boxes
as appropriate from the Job Options.
Step 6
(Optional) Click on the CLI Preview tab to preview the list of CLIs. The CLI Preview tab appears only
when all selected interfaces belong to a single device.
Step 7
Click Deploy.
19-8
OL-32122-01
Chapter 19
You can configure only one Application Visibility profile on each device. A warning message is
displayed if any of the unselected interfaces of the device have a different AVC profile. The AVC profile
will be disabled from all the unselected interfaces if you ignore the warning message.
Note
If the AVC policy that is defined is a custom policy that was not created from Cisco Prime Infrastructure,
it will not be removed from the device but only detached from the interface. Also, disabling AVC on an
interface will optionally allow deactivating the AVC troubleshooting session on that interface, if such a
session is activated on the interface.
To disable Application Visibility on interfaces, do the following:
Step 1
Choose Services > Application Visibility & Control > Interfaces Configuration to launch the
Interfaces Configuration page.
Step 2
Select the interfaces from the list on which you want to disable Application Visibility.
Step 3
Click Disable App Visibility to disable the ongoing monitoring AVC policy on the interface.
Step 4
Select the Deactivate App Visibility Troubleshooting check box to deactivate AVC troubleshooting
session on the interface.
Step 5
Review and select the Copy Running Config to Startup and Archive Config after Deploy check boxes
as appropriate from the Job Options.
Step 6
Click Deploy.
Choose Configuration > Features and Technologies > Application Visibility & Control > App
Visibility.
Step 2
Enter a unique name and a description in the appropriate fields, in the Template Basic area.The template
name should not exceed 12 characters.
Step 3
Choose a device type from the list in the Validation Criteria area, and enter the OS version.
19-9
Chapter 19
Step 4
Choose an Interface Role from the drop-down list, in the Template Detail area.
The interface role designates the group of interfaces on which you can monitor the traffic and produce
Application-Visibility reports. See the Defining Device Override section for information about creating
an interface role.
Step 5
Check the Enable check box in the Additional Exporter area, and specify the IP address of the additional
netflow collector that you wish to send the Application Visibility reports to.
Step 6
Select the Off radio button if you do not want to collect the statistics on data packets, in the Traffic
Statistics area. This helps you to determine which traffic should be monitored to produce the traffic
statistics reports.
a.
Step 7
Step 8
Step 9
Step 10
Select the IP address/subnets.You can generate the report only on IPv4 traffic. We recommend to
configure the required minimal set of filter.
Select the Off radio button if you do not want to collect URL statistics, in the HTTP URL Visibility area.
This helps you to determine which traffic should be monitored to produce the traffic statistics report.
a.
Select the IP address/subnets. You can select a specific set of IPv4 addresses or subnets to be
monitored.
b.
Select the Application from the drop-down list. You can select a specific set of applications that
should be monitored (there could be up to 32 monitored applications). By default, all of the
enterprise related HTTP-based applications are included in the list.
Select the Off radio button if you do not want to collect ART metrics, in the Application Response Time
area. This helps you to determine which traffic should be monitored to produce the application response
time reports. Also, optionally set a sampling option for the reports.
a.
Select the IP address/subnets. You can select a specific set of IPv4 addresses or subnets to be
monitored.
b.
Choose the Application from the drop-down list. You can select a specific set of applications that
should be monitored (there could be up to 32 monitored applications). By default, all of TCP traffic
is monitored.
Select the Off radio button if you do not want to collect the voice/video metrics, in the Voice/Video
metrics area. This helps in determining the traffic that should be monitored to produce the voice/video
reports.
a.
Choose the IP address/subnets. You can choose a specific set of IPv4 addresses or subnets to be
monitored.
b.
Choose the Voice/Video Application from the drop-down list. You can choose a specific set of
applications that should be monitored (there could be up to 32 monitored applications). By default,
all RTP enterprise-related applications are monitored.
19-10
OL-32122-01
Chapter 19
Note
When you deploy an application visibility template to the device, the application visibility template
configuration will overwrite the default application visibility configuration that was enabled from the
Device Work Center.
The Application Visibility feature is supported on the following platforms:
Note
Application Visibility is configured differently on different platforms and IOS releases. The recent IOS
releases provide new methods for configuring AVC. When you upgrade an ASR 1000, CSR or ISR 4400
platforms running IOS-XE release prior to 15.4(1)S to an IOS-XE release 15.4(1)S or later Or upgrade
an ISR-G2 platform running IOS release prior to 15.4(1)T to an IOS release 15.4(1)T or later, we
recommend you reconfigure AVC on these devices.
To change the default application visibility configuration profile configured on the device, first disable
the Application Visibility policy on all interfaces and then re-enable it on the selected interfaces with the
new profile.
To enable or disable the default application visibility configuration on the specific interface, follow these
steps:
Step 1
Step 2
Step 3
Step 4
Expand the App Visibility & control folder and choose App Visibility.
Step 5
To activate an out-of-the-box AVC profile on an interface, select one or more interfaces then click
Enable App Visibility and select the required profile. If at least one of the non selected interface is
attached to a different profile, a warning message will be displayed such that all non-selected
interfaces that are attached to a different profile will be detached from that profile.
Use the interfaces list to view the current App Visibility configuration on the device. The column
App Visibility Policy displays the current profile/policy attached to the interface.
Note
In Cisco Prime Infrastructure Release 2.2, the application visibility feature displays the user
defined AVC policy per interface on the application visibility interfaces.
If the application visibility control is configured on the interface using the Application Visibility
Template, the Template <template-name> will be displayed.
If the application visibility control is configured on interface using the one-click option, the name
of the AVC Profile that was configured will be displayed
19-11
Chapter 19
Note
Note
If the application visibility control is configured manually out-of-band by the user via CLI, the name
of the policy map or performance monitor context that was configured will be displayed.
In Cisco Prime Infrastructure Release 2.2, a visual indication column (App Visibility Status)
provides indication on whether AVC is currently activated on the interface. The column also
indicates cases when the interface is incapable of running AVC and cases when AVC is
mis-configured on the interface (for example, AVC is configured to send netflows to servers
other than Cisco Prime Infrastructure).
To Disable any of the activated AVC profiles on the selected interface, click Disable App Visibility.
Check Deactivate App Visibility Troubleshooting if you wish to deactivate an AVC
troubleshooting policy that is active on the interface.
When Enabling/Disabling AVC, a pop up message appears before the actual provisioning takes
place. Select the CLI preview tab on that popup message to generate the list of CLIs to be
pushed to the device.
Caution
Note
To avoid overloading the server, we recommend that you configure no more than ten active
troubleshooting sessions. Application troubleshooting is not supported on the ISR-G2 platforms.
Troubleshooting sessions are configured differently on the ASR platform running Cisco IOS-XE Release
15.3(1)S1 in comparison to Cisco IOS-XE Release15.3(2)S or later releases. After, an ASR platform
Cisco IOS Release is upgraded from Cisco IOS-XE Release 15.3(1)S1 to Cisco IOS-XE Release
15.3(2)S or later, we recommend that you deactivate and reactivate active troubleshooting sessions on
those devices.
To troubleshoot Application Visibility, follow these steps:
Step 1
Choose Services > Application Visibility & Control > Application Troubleshooting.
Step 2
19-12
OL-32122-01
Chapter 19
Step 3
Choose the device from the Device list. Only devices that are capable of performing AVC
troubleshooting will appear on the list.
Step 4
Step 5
In the Source/Destination IPs field, click Edit, and choose the source and destination IP addresses from
the drop-down list. You can select the IP traffic and collect Application Visibility troubleshooting
information for that specific IP traffic. You can also select a list of IP constraint pairs. Each such pair
designates a bidirectional symmetric condition on the source and destination IPs of the traffic. For
example, the pair: Any IPv4 <=> IPv4 subnet 192.168.0.0/16 matches all of the flows from
192.168.0.0/16 to any other IP and vice-versa (all of the flows from any IP address to 192.168.0.0/16).
You can add multiple pair conditions.
Step 6
To add more IP constraints in the format of IP source/destination pairs, click the + icon in the Select
Source Destination dialog box
The IP addresses on both sides of the pairs should be of the same IP version.
Step 7
Click OK.
Step 8
Choose the application from the object selector dialog box. When you choose the applications, you can
have a combination of Categories, Sub-categories, Encrypted Applications, and Tunneled Applications
from the available list. A maximum of 32 applications or categories or attributes can be selected.
Step 9
Step 10
Step 11
After the troubleshooting session is activated, click Launch Report to generate the Raw NetFlow report.
Choose Services > Application Visibility & Control > Application Troubleshooting.
Step 2
Choose a troubleshooting session from the list and click Activate or Deactivate.
Step 3
Click Save.
Choose Services > Application Visibility & Control > Application Troubleshooting.
Step 2
19-13
Chapter 19
Caution
To avoid overloading the server, we recommend that you configure no more than ten active
troubleshooting sessions.
b.
c.
To delete a troubleshooting session, choose a session from the list and click Delete.
Provision a QoS policy to process ingress and egress traffic on any applicable interface for a single
device and across the network.
5-class modelUsed for prioritizing voice and video traffic and business critical application over
other bandwidth consumer. The 5-class model consists of the following QoS classes:
2.
8-class modelThe main advantage of this model over the 5-class model (which is simpler) is that
it provides further granularity on voice and video traffic. This class is recommended for enterprises
that use significant amount of bandwidth for business related video, to assure their voice traffic is
running smoothly in parallel to business related video. The 8-classes model consists of the following
QoS classes:
CLASS-DEFAULT (a.k.a best effort) For all the rest of the applications
3.
12-class modelThis is the most complicated model in terms of the number of QoS classes and is
aimed at customers that have different types of business related applications in terms of how these
applications are consuming bandwidth. This model also provides higher level of granularity for
multimedia applications. The 12-classes model consists of the following QoS classes:
VOICE
19-14
OL-32122-01
Chapter 19
BROADCAST-VIDEO
INTERACTIVE-VIDEO
NETWORK-CONTROL
SIGNALING
NETWORK-MANAGEMENT
MULTIMEDIA-STREAMING
MULTIMEDIA-CONFERENCING
TRANSACTIONAL-DATA
BULK-DATA
SCAVENGER
CLASS-DEFAULT
Choose Services > Application Visibility & Control > AVC Profiles to launch the AVC Profiles page.
Step 2
Step 3
Step 4
Step 5
Step 6
Select a QoS class from the drop-down list, and click Save.
Step 7
Step 8
To modify the NBAR application mapping associated with a particular application, select the application
from the list, and click Edit.
Step 9
Click Save.
Choose Services > Application Visibility & Control > AVC Profiles to launch the AVC Profiles page.
Step 2
19-15
Chapter 19
Step 3
Step 4
Select the Shape check box to activate shaping prior to applying QoS queuing actions, and specify the
shaping rate.
The minimum shaping rate is 100,000 bps.
Step 5
Step 6
Limit maximum priority bandwidth (selected by default)Enables to assign priority queues with
a policer to assure that the traffic bandwidth does not exceed the selected bandwidth.
Click Save.
Choose Services > Application Visibility & Control > Interfaces Configuration to launch the
Interfaces Configuration page.
Step 2
Select the interfaces from the list on which you want to enable QoS, and click Enable QoS.
Step 3
Check the Enable QoS on Ingress check box if you want to enable ingress on the interface.
Step 4
From Classification and Marking, use the toggle panel to select the QoS classification class you want to
apply for the profile, and click OK.
Step 5
Check the Enable QoS on Egress check box if you want to enable egress on the interface.
Step 6
Choose whether you want to classify QoS on Egress based on DSCP or Profile.
Step 7
If you choose Classify Based on Profile in Step 6, use the toggle panel to select the QoS classification
class you want to apply for the profile, and click OK.
Step 8
Use the toggle panel to specify the QoS action based on the profile, and click OK.
Step 9
From the Job Options, review and select the Copy Running Config to Startup and Archive Config
after Deploy check boxes as appropriate.
Step 10
Click Deploy.
Choose Services > Application Visibility & Control > Interfaces Configuration to launch the
Interfaces Configuration page.
Step 2
Select the interfaces from the list on which you want to disable QoS, and click Disable QoS.
19-16
OL-32122-01
Chapter 19
Step 3
Check the Disable QoS on Ingress check box if you want to disable ingress on the interface.
Step 4
Check the Disable QoS on Egress check box if you want to disable egress on the interface.
Step 5
From the Job Options, review and select the Copy Running Config to Startup and Archive Config
after Deploy check boxes as appropriate.
Step 6
Click Deploy.
Choose Configuration > Features & Technologies > Security > VPN Components > IKE Policies.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a Device Type from the drop-down list and enter the OS version.
For more information about the required field descriptions, see the Cisco Prime Infrastructure 2.2
Reference Guide.
Step 4
Click Save as New Template. After you save the template, to your devices using the procedures in
Creating and Deploying Feature-Level Configuration Templates.
Choose Configuration > Features & Technologies > Security > VPN Components > IKE Settings.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
For more information about the required field descriptions, see the Cisco Prime Infrastructure 2.2
Reference Guide.
Step 4
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
19-17
Chapter 19
Choose Configuration > Features & Technologies > Security > VPN Components > IPSec Profile.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
Step 4
In the Template Detail area, click Add Row and enter the required information. A transform set
represents a certain combination of security protocols and algorithms. During the IPsec negotiation, the
peers agree to use a particular transform set for protecting a particular data flow. A transform set
describes a particular security protocol with its corresponding algorithms. For more information about
the required field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Choose Configuration > Features & Technologies > Security > VPN Components > Preshared Keys.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a Device Type from the drop-down list and enter the OS Version.
Step 4
In the Template Detail area, click Add Row and enter the required information.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Choose Configuration > Features & Technologies > Security > VPN Components > RSA Keys.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
Step 4
In the Template Detail area, click Add and enter the required information.
Step 5
Select the Exportable box to generate RSA as an exportable key, then click OK.
19-18
OL-32122-01
Chapter 19
Step 6
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Choose Configuration > Features & Technologies > Security > VPN Components > Transform Sets.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
Step 4
In the Template Detail area, click Add Row and enter the required information.
The ESP encryption algorithm is used to encrypt the payload, and the integrity algorithm is used to check
the integrity of the payload.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Cisco IOS router that supports the Cisco Unity Client Protocol
After the Cisco Easy VPN server is configured, a VPN connection is created with minimal configuration
on an Easy VPN remote, such as a Cisco 800 series or 2800 series router. When the Easy VPN remote
initiates the VPN tunnel connection, the Cisco Easy VPN server pushes the IPsec policies to the Easy
VPN remote and creates the corresponding VPN tunnel connection.
19-19
Chapter 19
Choose Configuration > Features & Technologies > Security > Easy VPN Server Proxy Setting.
Step 2
Step 3
Step 4
In the Template detail area enter a name, and choose the settings that you want to associate with the
group.
Step 5
Choose the No Proxy Server option or Automatically Detect Proxy Settings option if you want the clients
in this group to automatically detect a proxy server when they use the VPN tunnel.
Step 6
Choose the Manual Configuration option to manually configure a proxy server for clients in this group.
If you choose this option, you should manually configure a proxy server.
Step 7
Select the Bypass proxy server for local addresses check box to prevent the clients from using the
proxy server for local (LAN) addresses.
Step 8
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Choose Configuration > Features & Technologies > Security > Easy VPN Remote.
Step 2
Step 3
Step 4
In the Easy VPN Remote Interface Configuration area, enter the required information.For more
information about the required field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
Step 5
In the Easy VPN Remote connection characteristics area, enter the required information.For more
information about the required field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
If you enable identical addressing, you must first configure Easy VPN Remote in network extension
mode.
Step 6
Step 7
In the Remote Firewall Settings area, set the firewall settings for the Easy VPN Remote connection.
19-20
OL-32122-01
Chapter 19
Step 8
Step 9
Navigate to the My Templates folder and choose the template that you just saved.
Step 10
Click the Publish icon in the top-right corner, then click OK.
Step 11
Create a composite template (Creating Composite Templates), and add the ACL and Easy VPN Remote
templates to the composite template.
Step 12
Use the arrows buttons to arrange the templates in the order in which they should be deployed to the
devices. For example, to create an ACL and associate it with an interface, put the ACL template first,
followed by the EasyVPN Remote template.
Step 13
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Do the following:
Create AAA method list for the group and the user by using the CLI template
(Optional) Create a CLI template for RADIUS server group creation or configure the RADIUS
server while creating the AAA method list
(Optional) Create an ACL template for the split tunnel ACL in the ISAKMP Group configuration
Choose Configuration > Features & Technologies > Security > Easy VPN Server.
Step 2
Step 3
Step 4
In the Interface Configuration area, choose the configuration methods and complete the fields of the
interface that is configured on the device.
Step 5
In VPN Components Assembly area, enter the Transform Set profile name that you created in the
Transform Set template (Configuring Transform Sets) and complete the fields in this area.
Step 6
In the Group Authorization area, enter the Method List profile name that you created in the CLI template
and complete the fields in this area.
Step 7
In the User Authorization area, enter the same Method List profile name that you created in the CLI
template, and complete the fields in this area.
19-21
Chapter 19
Step 8
In the ISAKMP Group configuration area, click Add Row to add the ISAKMP Group configuration.
Step 9
In the ISAKMP Group configuration dialog box, enter the ACL profile name that you created in the ACL
template and the Browser Proxy profile name that you created in the Browser Proxy template, and
complete the fields in this area.
Step 10
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Step 11
Create a composite template (Creating Composite Templates) and add the AAA Method List and Radius
server, IPsec Profile (Creating an IPsec Profile Template), ACL Browser Proxy (Creating an Easy VPN
Server Proxy Setting Template), and Easy VPN_ Remote templates in the composite template.
Step 12
Using the arrow icons to arrange the templates in a order in which they should be deployed to the devices.
For example, to create an ACL and associate it with an interface, arrange the ACL template first,
followed by the EasyVPN_Remote template.
Step 13
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Click Configuration > Features & Technologies Interfaces > Cellular > GSM Profile.
Step 2
Step 3
Step 4
In the Template Detail area, enter an Access Point Name and choose a profile number from the
drop-down list.
Step 5
Choose the type of authentication that your service provider uses. (CHAP authentication is more secure
than PAP authentication.)
Step 6
Enter the username given to you by your ISP or your network administrator, and enter a password.
Step 7
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Step 8
Click OK.
Choose Configuration > Features & Technologies > Interfaces > Cellular > Cellular Profile.
Step 2
Step 3
19-22
OL-32122-01
Chapter 19
Step 4
In the Template Detail area, define the interface as Primary WAN Interface or Backup WAN Interface
and complete the fields.
Step 5
In the Dialer Configuration area, choose Yes to enable the persistent data connection and complete the
fields.
Step 6
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Step 7
Click OK.
You can configure the ISR so that some approved web traffic is not redirected to ScanSafe for scanning.
When you bypass ScanSafe scanning, the ISR retrieves the content directly from the originally requested
web server without contacting ScanSafe. When ISR receives the response from the web server, it sends
the data to the client. This is called whitelisting traffic.
See the Cisco ISR Web Security with Cisco ScanSafe Solution Guide for more information about
ScanSafe.
Creating a ScanSafe Template
Whitelist information
Choose Configuration > Templates > Features & Technologies > Security > ScanSafe.
Step 2
In the Template Basic area, enter a name and a description in the appropriate fields.
Step 3
In the Validation Criteria area, choose a device type from the list and enter the OS version.
Step 4
In the Template Detail area, enter the required information. For more information about the required
field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
19-23
Chapter 19
Configuring Interfaces
Configuring Interfaces
The Interfaces feature helps in setting up physical and logical interfaces. Physical interfaces on a device
depend on the device type and its interface processors or port adapters. IPv4 addressing is supported for
all interfaces including service modules such as WAN, LAN, and logical interfaces. The following
interfaces are supported in this release:
WAN Interfaces
Configuring Controllers
LAN Interfaces
Logical Interfaces
Step 2
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
In the Interface page, select the serial interface in the Interface Summary area and click Edit.
Step 5
In the Create or Edit Serial Interface page, enter the basic configuration information.
Step 6
Select the encapsulation type as High Level Data Link Control (HDLC) or Point-to-Point Protocol
(PPP) or Frame Relay. Use the Advance Configuration area to configure the encapsulations.
For controller-based serial interfaces, only interface configurations are supported.
Step 7
Step 8
For Frame Relay encapsulation, use the IETF option to connect to non-Cisco routers. (The Autosense
feature is supported only on Frame Relay.)
The Autosense feature allows the router to detect the LMI type that is being used, by communicating
with the switch and then uses the same type of LMI.
Step 9
For PPP encapsulation, specify the CHAP and PAP configurations with directions.
Step 10
Click Save. The Interface Summary page displays the modified interfaces.
19-24
OL-32122-01
Chapter 19
Step 11
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
In the Interface page, select the POS interface from the Interface Summary area and click Edit.
Step 5
In the Create or Edit POS Interface page, enter the basic configuration information.
Step 6
Select the Enable SPE Scrambling check box to enable the SPE scrambling.
Step 7
Select the Send LAIS when Shutdown check box to send the Line Alarm Indication Signal (LAIS)
when the POS interface is in administrative shut down state.
Step 8
Select the encapsulation type as HDLC or PPP or Frame Relay and use the Advance Configuration area
to configure the encapsulations.
Step 9
Step 10
In the Advanced Configuration area, select the alarm reporting and alarm reporting threshold options to
receive alarms when there is any event.
Step 11
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the service module interface from the Interface Summary area and click Edit.
Step 5
In the Fast Ethernet interface pane, complete the basic configuration information.
Step 6
Configuring Controllers
To create or edit the DSL, SHDSL, and VDSL controllers interface, follow these steps:
19-25
Chapter 19
Configuring Interfaces
Step 1
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the DSL, SHDSL or VDSL controller from the interface summary area and click Edit.
Step 5
Step 6
Click OK. After you configure the controller, you must configure the DSL, SHDSL or VDSL
subinterface.
Step 7
To configure the DSL subinterface, select an ATM interface in the Interface Summary page, and click
Add Subinterface.
Step 8
Step 9
a.
In the Create ATM Sub Interface page, choose the encapsulation from the drop-down list.
b.
c.
Select a dialer to be associated to the ATM subinterface by using the Create or Associate dialer
options.
d.
Click OK.
To configure the SHDL subinterface, select a SHDSL interface in the Interface Summary page, and click
Add Subinterface.
a.
In the Create SHDSL subinterface page, add the DSL Group and select the DSL pair.
b.
c.
Click OK.
To configure the VDSL subinterface, select a VDSL interface in the Interface Summary area, and click
Add Subinterface.
a.
In the Create VDSL subinterface page, choose the Operating Mode from the drop-down list.
b.
c.
Click OK.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interfaces folder, then click Ethernet.
Step 4
To add a subinterface,
a.
Select the Gigabit Ethernet or Fast Ethernet in the Interfaces Summary area, click Add
Subinterface.
b.
Provide the required information for the subinterface that you want to create.
c.
Click Save.
19-26
OL-32122-01
Chapter 19
Step 5
Select the Gigabit Ethernet or Fast Ethernet in the Interfaces Summary area, and click Edit.
b.
c.
d.
e.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Step 5
In the Create or Edit Loopback Interface area, enter the basic configuration information.
Step 6
Step 7
Click OK.
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Step 5
In the Create or Edit VLAN Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
19-27
Chapter 19
Configuring Interfaces
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the VLAN interface from the Interface Summary area, and click Edit.
Step 5
In the Create or Edit VLAN Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After choosing the device, choose Configuration. The Feature Configuration pane appears.
Step 4
Step 5
Step 6
In the Create or Edit Tunnel Interface page, complete the basic configuration information.
Step 7
Step 8
Step 9
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the Tunnel interface in the Interface Summary page, and click Edit.
Step 5
In the Create or Edit Tunnel Interface page, complete the basic configuration information.
Step 6
19-28
OL-32122-01
Chapter 19
Step 7
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Step 5
In the Create or Edit Virtual Template Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the Virtual Template interface in the Interface Summary page, and click Edit.
Step 5
In the Create or Edit Virtual Template Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
19-29
Chapter 19
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Cellular WAN Interfaces.
Step 4
Step 5
Step 6
a.
Select a cellular interface with CDMA Sprint modem, and click Manage Modem.
b.
In the Manage Modem dialog box, select the OMA-DM or Manual radio button. If you choose the
Manual option, complete the fields to manually configure the CDMA Sprint modem, then click OK.
Select a cellular interface with CDMA Verizon modem, and click Manage Modem.
b.
In the Manage Modem dialog box, enter the Account Activation Information, then click OK.
Select a cellular interface with CDMA Generic modem, and click Manage Modem.
b.
In the Manage Modem dialog box, complete the fields to configure the CDMA Generic Modem, then
click OK.
Step 2
Choose the device from the list or click Add to add a new device, then configure the device.
Step 3
After choosing the device, click Configuration. The Feature Configuration pane appears.
Step 4
Step 5
Step 6
Step 7
Choose the Profile Number from the drop-down list, and enter the Access Point Name, then click OK.
19-30
OL-32122-01
Chapter 19
The NAT feature allows organizations to resolve the problem of IP address depletion when they have
existing networks and need to access the Internet. NAT allows the IP network of an organization to use
different IP address space for the outside network. Thus, NAT allows an organization that does not have
globally routable addresses to connect to the Internet by translating those addresses into globally
routable address space. NAT also allows a more graceful renumbering strategy for organizations that are
changing service providers or voluntarily renumbering into Classless Inter Domain Routing (CIDR)
blocks. NAT is described in RFC 1631.
A router configured with NAT will have at least one interface to the inside network and one to the outside
network. In a typical environment, NAT is configured at the exit router between a subdomain and a
backbone. When a packet leaves the domain, the NAT translates the locally significant source address
into a globally unique address. When a packet enters the domain, NAT translates the globally unique
destination address into a local address. If more than one exit point exists, each NAT must have the same
translation table. If NAT cannot allocate an address because it has run out of addresses, it drops the
packet and sends an Internet Control Message Protocol (ICMP) host unreachable packet.
For more information on NAT, see IP Addressing: NAT Configuration Guide, Cisco IOS XE Release 3S.
NAT Types
NAT operates on a routergenerally connecting only two networks togetherand translates your
private (inside local) addresses within the internal network, into public (inside global) addresses before
any packets are forwarded to another network. This functionality gives you the option to configure the
NAT so that it will advertise only a single address for your entire network to the outside world. Doing
this effectively hides the internal network from the world, giving you additional security.
NAT types include:
Static Address Translation (SAT) Allows one-to-one mapping between local and global
addresses.
OverloadingA form of dynamic NAT that maps multiple unregistered IP addresses to a single
registered IP address (many to one) using different ports. This method is also known as Port Address
Translation (PAT). With PAT, thousands of users can be connected to the Internet using only one real
global IP address.
2.
3.
4.
5.
The NAT feature is supported on the following: ASR platform from Cisco IOS Release 3.5 or later and
ISR platform from Cisco IOS Release 12.4(24)T or later.
19-31
Chapter 19
Caution
CLI changes that begin with EMS_ are not supported and might cause unexpected behavior.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security, expand the NAT subfolder, and then click IP
Pools. The NAT Pools page appears.
Step 4
Click Add IP Pool > IP+Prefix or IP Range + Prefix, and enter the Name, IP Address/Range, Prefix
Length, and Description. You cannot change the name of the pool after creating the pool.
Note
Step 5
Click SAVE to the IP pool to the device, or CANCEL to cancel your editing.
Step 6
To edit the existing IP Pool, in the NAT IP Pools page do the following:
Step 7
a.
Click in the selected IP Pools parameters row, and edit the parameters. or
b.
Select the IP Pools, and click Edit. The selected IP Pools opens for editing. You can edit all of the
parameters except the pool name.
Static
Dynamic
Dynamic PAT
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security, expand the NAT subfolder, and then click
NAT44 Rules.
19-32
OL-32122-01
Chapter 19
Step 4
In the NAT 44 page, click the down arrow icon next to the Add NAT Rule button.
Click Static to create Static Rule. For a description of the elements, see the Cisco Prime
Infrastructure 2.2 Reference Guide.
Click Dynamic to create Dynamic NAT Rule. For a description of the elements, see the Cisco Prime
Infrastructure 2.2 Reference Guide.
Click Dynamic PAT to create Dynamic PAT Rule. For a description of the elements, see the Cisco
Prime Infrastructure 2.2 Reference Guide.
Step 5
Step 6
To edit the existing NAT44 rule in the NAT44 page, do one of the following:
Click the selected NAT44 rules parameters row, and edit the parameters.
Select the NAT44 rule, and click Edit. The selected NAT44 rule opens for editing. You can edit all
of the parameters.
Step 7
You can change the Source and Destination according to the creation rules. You can also change the
Options selection according to the creation rules.
Step 8
Configuring Interfaces
A virtual interface is a logical interface configured with generic information for a specific purpose or for
specific users, plus router-dependent information.
To configure a virtual interface, follow these steps:
Step 1
Step 2
After choosing the device from list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security, expand the NAT subfolder, and then click
Interfaces.
In the Interface page, select the interface that you want to change and choose the association from the
drop-down list. The options are: Inside, Outside, and None.
Step 4
19-33
Chapter 19
Configuring DMVPN
Step 1
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After choosing the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security, expand the NAT subfolder, and then click Advanced Settings > Max.
Translation.
Step 5
Reset the parameter values. Configure the maximum number of NAT entries that are allowed for all of
the parameters. A typical range for a NAT rate limit is from 100 to 300 entries.
Step 6
Configuring DMVPN
The DMVPN feature allows you to scale large and small IP Security (IPsec) VPNs by combining generic
routing encapsulation (GRE) tunnels, IPsec encryption, and Next Hop Resolution Protocol (NHRP).
A typical VPN connection is a point-to-point IPsec tunnel connecting two routers. DMVPN enables you
to create a network with a central hub that connects other remote routers, referred to as spokes, using a
GRE over an IPsec tunnel. IPsec traffic is routed through the hub to the spokes in the network.
See Dynamic Multipoint IPsec VPNs (Using Multipoint GRE/NHRP to Scale IPsec VPNs) for more
information about DMVPN (requires a Cisco.com login ID).
Cisco Network Control System allows you to configure your router as a DMVPN hub, DMVPN spoke
or cluster. You can configure the router in the following ways:
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then click DMVPN. Click Add to
create the DMVPN.
Step 4
In the Device Role and Topology Type area, select the topology and the device role. The options are:
Spoke, Hub, and Dynamic Connection between Spokes.
Step 5
In the Multipoint GRE Interface Information area, choose the WAN interface that connects to the
Internet from the drop-down list.
Step 6
Step 7
19-34
OL-32122-01
Chapter 19
Note
The Network ID is a unique 32-bit network identifier from a Non Broadcast Multiaccess (NBMA)
network. The tunnel key is used to enable a key ID for a particular tunnel interface. The MTU size of IP
packets that are sent on a particular interface.
Note
The default MTU value for Ethernet and the serial interface is 1500. The default value varies depending
upon the media type. The Tunnel throughput delay is used to set the delay value for a particular interface.
Step 8
In the Encryption policy field, click the anchored plus button (+) to add the Transform Set Profile (see
Security > VPN Components > Transform Sets in the Cisco Prime Infrastructure 2.1 Reference Guide).
Step 9
In the Transform Set Profile dialog box, enter the Name and choose the acceptable combination of
security protocols and algorithm from the drop-down list to configure the transform set.
Step 10
Select the IP Compression check box to enable the IP compression for the transform set.
Step 11
Choose the mode for the transform set. The options are: Tunnel mode or Transport mode.
Step 12
In the NHS Server Information area, enter the IP address for the physical interface of the hub and tunnel
and the Fallback Time. If the device supports the cluster then add the next hop server information, such
as Cluster ID, Max Connection, Hub IP address, and Priority.
The NHS server information is required only for spoke configuration. If you select the Use Cluster for
NHS check box, add the information, such as Cluster ID, Max Connection, and Next Hub Server. The
template with the NHS cluster configuration will be applied only to the device running Cisco IOS
Software Release 15.1(2)T or later.
Step 13
In the Routing Information area, choose the routing information. The options are: EIGR, RIPV2, and
Other.
The routing information is required only for hub configuration.
Step 14
Choose the existing EIGRP number from the drop-down list or enter an EIGRP number. Use the Other
option to configure the other protocols.
Step 15
Click Save to save the single NHS server entry details and the priority of the server, save the entire group
of server, and save the NHS cluster information. when you save the NHS cluster information, the NHS
server will be populated in the non-editable field.
Step 16
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then click DMVPN. Click the Add
button to create the DMVPN tunnel.
Step 4
In the Device Type and Topology area, choose Hub and Spoke as the topology, and select either Hub or
Spoke as a device role.
19-35
Chapter 19
Configuring DMVPN
Step 5
Choose the WAN interface from the drop-down list, and then configure the Multipoint GRE IP Address
and the subnet mask for the tunnel interface.
Step 6
Configure the NHRP and the Tunnel Interface parameters, such as the IP address, NHRP parameters and
map, MTU value, Source of the Tunnel, Tunnel Mode, and Tunnel Key.
Step 7
Create the transform-set for protecting the data flow between the devices. You can specify up to four
transforms: One Authentication Header (AH), one Encapsulating Security Payload (ESP) encryption,
one ESP authentication, and one compression. These transforms define the IPsec protocols and the
algorithms.
Step 8
Step 9
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then click DMVPN. Click the Add to create the DMVPN tunnel with
fully meshed topology.
Step 5
In the Create DMVPN Tunnel configuration page, select the Full Mesh radio button to configure the
network type as full mesh topology.
Step 6
Repeat Step 6 through Step 8 in the Configuring Hub and Spoke Topology section.
Step 7
For Fully Mesh spoke topology, in the NHS Server Information area, add the next hub server
information, such as the IP Address of Hub's physical interface and the IP address of Hub's tunnel
interface.
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
Feature Configuration pane, expand the Security folder, and then click DMVPN. Click Add to create
the DMVPN tunnel.
19-36
OL-32122-01
Chapter 19
Step 4
From the Create DMVPN Tunnel configuration page, select Spoke radio button to configure the device
role as a spoke.
Step 5
Repeat Step 6 through Step 8 from in the Configuring Hub and Spoke Topology section.
The device must be running IOS version of 15.1(2)T or later.
Step 6
Click Add Row to configure the cluster related information, and add the Cluster-ID and Maximum
Connection values.
Step 7
Click Expand Row (next to the radio button) and click Add Row to add the NHS server information.
Step 8
Enter the NHS server, the GRE Tunnel IP addresses, and the Priority of this NHS server. Click Save to
save the NHS server entry configuration.
Step 9
Step 10
Click Save again to save the NHS group information with the cluster configuration. This will
automatically populate the NHS server IP address in the table.
Editing a DMVPN
To edit a DMVPN tunnel, follow these steps:
Step 1
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then click DMVPN. The available tunnel is displayed.
Step 5
Select the tunnel, and click Edit. The Edit DMVPN Tunnel page opens.
Step 6
In the Edit DMVPN Tunnel page, you can edit the DMVPN parameters.
Step 7
Step 8
Click Cancel to close the Edit DMVPN Tunnel page without applying the configuration to the device.
Deleting a DMVPN
To delete a DMVPN tunnel, follow these steps:
Step 1
Step 2
Choose the device from the list to delete the DMVPN tunnel. If the device is not added, click Add to add
the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then click DMVPN. The available tunnel is displayed.
Step 5
Step 6
Step 7
Click No on the warning message if you do not want to delete the selected tunnel.
19-37
Chapter 19
Configuring GETVPN
Step 8
Click Cancel to cancel all of the changes that you have made without sending them to the router.
Configuring GETVPN
A Group Encrypted Transport VPN (GETVPN) deployment has three primary components: Group
Member, Key Server, and Group Domain of Interpretation protocol. Group Members encrypt and decrypt
the traffic, and Key Server distributes the encryption key to all group members. The Key Server decides
on a single data encryption key for a given lifetime. Because all Group Members use the same key, any
Group Member can decrypt the traffic encrypted by any other Group Member. GDOI protocol is used
between the Group Member and Key Server for group key and group Security Association (SA)
management. A minimum one Key Server is required for a GETVPN deployment.
Unlike traditional IPsec encryption solutions, GETVPN uses the concept of group SA. All members in
the GETVPN group can communicate with each other using a common encryption policy and a shared
SA. Therefore, there is no need to negotiateIPsec between Group Members on a peer-to-peer basis,
thereby reducing the resource load on the Group Member routers.
Group Member
The Group Member registers with the Key Server to get the IPsec SA that is necessary to encrypt data
traffic within the group. The Group Member provides the group identification number to the Key Server
to get the respective policy and keys for this group. These keys are refreshed periodically by the Key
Server, before the current IPsec SAs expire, so that there is no traffic loss.
Key Server
The Key Server is responsible for maintaining security policies, authenticating Group Members and
providing a session key for encrypting traffic. Key Server authenticates the individual Group Members
at the time of registration. Only after successful registration can the Group Members participate in a
group SA.
A Group Member can register at any time and receive the most current policy and keys. When a Group
Member registers with the Key Server, the Key Server verifies the group identification number of the
Group Member. If this identification number is valid, and the Group Member has provided valid Internet
Key Exchange (IKE) credentials, the Key Server sends the SA policy and the keys to the group member.
The keys sends two types to Group Member: the Key Encryption Key (KEK) and the Traffic Encryption
Key (TEK). The TEK becomes part of the IPsec SA with which the group members within the same
group encrypt the data. The KEK is used to secure rekey messages between the Key Server and the Group
Members.
The Key Server sends out rekey messages either because of an impending IPsec SA expiration or because
the security policy has changed on the Key Server. Keys can be distributed during rekey using either
multicast or unicast transport. the multicast method is more scalable because keys need not be
transmitted to each group member individually. Unlike in unicast, The Key Server will not receive
acknowledgment from the Group Member about the success of the rekey reception using the multicast
rekey method. Usign the unicast rekey method, the Key Server will delete a Group Member from its
database if the Group Member does not acknowledge three consecutive rekeys.
19-38
OL-32122-01
Chapter 19
Group Domain of Interpretation protocol is used for Group key and group SA management. Group
Domain of Interpretation uses Internet Security Association Key Management Protocol (ISAKMP) for
authenticating the Group Members and Key Servers. All of the standard ISAKMP authentication
schemes like RSA Signature (certificates) and preshared key can be used for GETVPN.
For more information on GETVPN, See
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps7180/deployment_guid
e_c07_554713.html.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then click
GETVPN-GroupMember. Click Add to create the GET VPN group member.
Step 4
In the Add GroupMember dialog box, choose the General tab, and enter the Group Name and Group
Identity. Choose the Registration Interface from the drop-down list.
Step 5
Enter the Primary Key Server and Secondary Key Server IP addresses. Click Add Row or Delete to add
or delete the secondary key server IP addresses.
Note
The primary key server is responsible for creating and distributing group policies to all group
members and periodically synchronizes with the secondary key servers. The server with the
highest priority is elected as a primary key server.
Step 6
Click the row or field to edit the secondary key server IP address.
Step 7
Step 8
In the Add Group Member dialog box, choose the Advanced tab, and choose the Local Exception ACL
and Fail Close ACL from the drop-down list.
If the Fail Close feature is configured, all of the traffic passing through the group member will be
dropped until the group member is registered successfully. Once the group member registers
successfully and SAs are downloaded, this feature turns off by itself.
Step 9
Choose the Migration tab, and select the Enable Passive SA check box to enable passive SA. Use this
option to turn on the Passive SA mode for this group member.
Step 10
Click OK to add the Group member in the table. To display the commands, click CLI preview. After the
scheduled is completed, the configuration is applied on the device.
19-39
Chapter 19
Configuring GETVPN
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then click GETVPN-KeyServer.
Click Add to create the GETVPN key server.
Step 4
In the Add Key Server dialog box, choose the General tab, and enter the Group Name, Group Identity,
WAN IP address, and Priority of this key server.
Step 5
Enter the Co-operative Key Servers IP address. Click Add Row or Delete to add or delete the
Co-operative key server IP address. Click the row or field, and edit the IP address.
Step 6
In the Add KeyServer dialog box, choose the Rekey tab, and choose the Distribution method from the
drop-down list.
The distribution method is used to send the rekey information from key server to group members. When
you choose the distribution method as multicast, specify the multicast address to which the rekey needs
to be transmitted.
Step 7
In the Add KeyServer dialog box, choose the GETVPN Traffic tab, and enter the Traffic to be encrypted,
Encryption Policy, and Anti Replay.
The access list defines the traffic to be encrypted. Only the traffic which matches the permit lines will
be encrypted. Be sure not to encrypt certain traffic that should always be permitted even if the crypto
sessions are not active.
Step 8
Click OK to add the Group member in the table. To display the commands, click CLI preview. After the
scheduled deployment is completed, the configuration is applied on the device.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In Feature Configuration pane, expand the Security folder, and then click GETVPN-Group Member
or GETVPN-KeyServer. The GETVPN-GroupMember or GETVPN-KeyServer summary page opens.
Step 4
In the GETVPN summary page, select the group name and click Edit. The Edit GETVPN-GroupMember
or GETVPN-Keyserver page appears.
Step 5
In the Edit GETVPN-GroupMember or GETVPN-KeyServer page, you can edit the GETVPN
parameters.
Step 6
19-40
OL-32122-01
Chapter 19
Step 1
Step 2
Choose the device from the list or click Add to add a new device, then configure the device. The device
details appear on the lower part of the page.
Step 3
After choosing the device, click Configuration. The Feature Configuration pane appears.
Step 4
In the Feature Configuration pane, expand the Security folder, and then click GETVPN-Group
Member or GETVPN-KeyServer. The GETVPN-GroupMember or GETVPN-KeyServer summary
page opens.
Step 5
In the GETVPN summary page, select the group name and click Delete.
Step 6
19-41
Chapter 19
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, Expand the Security folder, and then choose VPN Components >
IKE Policies.
Step 4
Step 5
In the IKE Policies page, enter the Priority, Authentication, D-H Group, Encryption, Hash, and Lifetime.
For a description of the elements on the IKE Policies page, see Security > VPN Components > IKE
Policies in the Cisco Prime Infrastructure 2.1 Reference Guide.
Step 6
Click Save to save the configuration, then click Save again to generate the CLI commands.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
IKE Settings.
Step 4
Select the Enable IKE and Enable Aggressive Mode check box to enable the IKE policies and the
aggressive mode.
Step 5
Step 6
Enter the Dead Peer Detection Keepalive and Dead Peer Detection Retry time in seconds.
For a description of the elements on the IKE Settings page, see Security > VPN Components > IKE
Settings in the Cisco Prime Infrastructure 2.1 Reference Guide.
Step 7
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
IPsec Profile.
19-42
OL-32122-01
Chapter 19
Step 4
Step 5
In the IPsec Profile page, enter the information such as Name, Description, and Transform Set, and the
IPsec SA Lifetime.
Note
When you edit a profile, you cannot edit the name of the IPsec profile. A transform set represents
a certain combination of security protocols and algorithms. During the IPsec security association
negotiation, the peers agree to use a particular transform set for protecting a particular data flow.
A transform describes a particular security protocol with its corresponding algorithms
Step 6
Enter the IPsec SA Lifetime in seconds to establish a new SA after the set period of time elapses.
Step 7
To edit the IPsec profile parameters, click Field and edit the parameter of that IPsec profile.
Step 8
To delete the IPsec profile, select the IPsec Profile from the list, and click Delete.
Step 9
Click Save to save the configuration, then click Save again to generate the CLI commands.
Step 2
Select a device or click Add to add a new device, and then configure the device. The device details
appear in the lower part of the page.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then choose VPN Components > Preshared Keys.
Step 5
Step 6
In the Preshared Keys page, enter the IP Address, Host Name, Subnet Mask, and Preshared Keys.
Step 7
To edit the preshared key parameters, click the Field and edit the parameter of that preshared key.
Step 8
To delete the preshared key, choose the preshared key from the list, and click Delete.
Step 9
Click Save to save the configuration, then click Save again to generate the CLI commands.
19-43
Chapter 19
RSA key pairs contain a key modulus value. The modulus determines the size of the RSA key. The larger
the modulus, the more secure the RSA key. However, it takes longer to generate, encrypt, and decrypt
keys with large modulus values.
To create an RSA keys, follow these steps:
Step 1
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
RSAKeys.
Step 4
Step 5
Step 6
In the Add RSA Keys dialog box, enter the Label, Modulus, and Type.
Note
For a modulus value between 512 and 1024, enter an integer value that is a multiple of 64. If you
want a value higher than 1024, you can enter 1536 or 2048. If you enter a value greater than 512,
key generation may take a minute or longer. The modulus determines the size of the key. The
larger the modulus, the more secure the key, but keys with a large modulus take longer to
generate, and encryption/decryption operations take longer with larger keys.
Step 7
Select the Make the Key exportable check box to generate the RSA as a exportable key.
Step 8
Step 9
To import the RSA key, click Import. The Import RSA Key dialog box appears.
Step 10
In the Import RSA Key dialog box, enter the label of the RSA key, Key type, and password to decrypt
the key. If the key type is general-keys, signature or encryption, copy and paste the public and private
key data that was saved.
Step 11
To import usage-key, enter the public and private key data of both the signature and encryption keys.
Step 12
Step 13
To export the RSA key, choose the RSA key from the list and click Export. The Export RSA Key Pair
dialog box appears.
Step 14
In the Export RSA Key Pair dialog box, enter the password to encrypt the RSA key and choose the
encryption algorithm from the drop-down list.
Step 15
Step 16
To delete the RSA key, choose the RSA key from the list, and click Delete.
19-44
OL-32122-01
Chapter 19
Step 1
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
Transform Sets.
Step 4
Step 5
In the Transform Sets page, enter the Name and select the acceptable combination of security protocols
and algorithm to configure the transform set.
Note
Step 6
Step 7
The ESP encryption algorithm is used to encrypt the payload and the integrity algorithm is used
to check the integrity of the payload.
TransportEncrypt data only. Transport mode is used when both endpoints support IPsec.
Transport mode places the authentication header or encapsulated security payload after the original
IP header; thus, only the IP payload is encrypted. This method allows users to apply network
services such as quality-of-service (QoS) controls to encrypted packets.
TunnelEncrypt data and IP header. Tunnel mode provides stronger protection than transport
mode. Because the entire IP packet is encapsulated within AH or ESP, a new IP header is attached,
and the entire datagram can be encrypted. Tunnel mode allows network devices such as a router to
act as an IPsec proxy for multiple VPN users; tunnel mode should be used in those configurations.
Click Save to save the configuration, then click Save again to save the configuration changes.
19-45
Chapter 19
Figure 19-1
E0
Router
Zone Z1
Zone Z2
E2
E1
146616
E3
The following describe the relationships between the interfaces and security zones shown in Figure 19-1.
Traffic flows freely between interfaces E0 and E1 because they are members of the same security
zone (Z1).
If no policies are configured, traffic will not flow between zones (for example, E0 and E2, E1 and
E2, E3 and E1, and E3 and E2).
Traffic can flow between interface E0 or E1 and E2 only when an explicit policy is configured to
permit the traffic between zone Z1 and zone Z2.
Traffic can never flow between E3 and interface E0, E1or E2 because E3 is not a part of any security
zone.
Cisco Prime Infrastructure supports the zone-based firewall feature on Cisco ASR 1000 Series, ISR,
CSR, and CGR routers. Using Cisco Prime Infrastructure, you can configure a zone-based firewall policy
template and deploy it to multiple devices. After you deploy the zone-based configuration, you can
navigate to the Device Work Center to view the deployed firewall configuration on a specific device.
To monitor the zone-based firewall, check the Zone-Based Firewall Monitor Hits capability on the
Device Work Center or the Cisco Prime Infrastructure syslog feature, which supports zone-based
firewall syslog messages.
Cisco Prime Infrastructure can configure Zone-Based Firewall either through CLI (over Telnet or SSH)
or through WSMA. Zone-Based Firewall can be configured through WSMA in a more efficient and
robust method and we recommend that you use the WSMA protocols for configuring Zone-Based
Firewall. For more information on using WSMA with Cisco Prime Infrastructure, see Configuring the
Device using WSMA.
19-46
OL-32122-01
Chapter 19
Note
The Zone-Based Firewall feature is supported on the ASR 1000 Series platform from Cisco IOS-XE
Release 15.2(2)S or later, ISR-G2 platform from Cisco IOS Release 15.0(1)M or later, ISR G3 platform
from Cisco IOS-XE 15.3(2)S Release or later, CSR platform from Cisco IOS-XE 15.3(1)S Release or
later, and CGR platform from Cisco IOS 15.0(1)M or later.
To configure a zone-based firewall template:
1.
2.
3.
4.
Define security rule parameter maps (see Creating a Security Rule Parameter Map).
5.
Design a firewall policy and apply it to multiple devices (for more information, see Creating a
Zone-Based Firewall Policy Rules Template).
6.
Validate the configuration for a specific device (see Configuring a Zone-Based Firewall on a Single
Device).
7.
Modify the global objects and template configuration (see Creating a Zone-Based Firewall Policy
Rules Template).
8.
9.
Monitor the syslog messages (for more information, see Where to Find Syslogs).
When you modify security-zones, IPv4 network objects, security services, or a security rule parameters
map, you need to redeploy the Zone Based Firewall template to the relevant devices for the changes to
take place.
Choose Configuration > Templates > Shared Policy Objects > Shared > Interface Role or IPv4
Network Object.
Step 2
In the Create/Edit Network Object or Interface Role page, select the Allow Value Override Per Device
check box and define the values per specific device. The defined values will override the regular values
defined for the Interface Role \ Network Object.
Step 3
19-47
Chapter 19
Step 1
Choose Configuration > Templates > Features & Technologies > Security > Zone Based Firewall >
Policy Rules.
Step 2
In the Template Basic area, enter a name and a description in the appropriate fields.
Step 3
In the Validation Criteria area, choose a Device Type from the list and enter the OS Version.
Step 4
Enter the required fields. For descriptions of the template parameters, see the Cisco Prime Infrastructure
2.1 Reference Guide.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating and Deploying Feature-Level Configuration Templates.
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Zones.
Step 4
Step 5
Step 6
Step 7
a.
Select a VRF before assigning interfaces to the security zone. Only the interfaces that are assigned
to the selected VRF can be assigned to the zone.
b.
If the user selects the global VRF, only interfaces which are not assigned to any VRF can be
assigned to the zone.
To assign the interfaces to the security zone, click the down arrow icon. The Interface Object Selector
dialog box appears.
a.
In the Interface selector dialog box, select the Interface check box to select the interface from the
list (can be multiple selection).
b.
Click OK to save the configuration or click Cancel to cancel all of the changes that you have made
without sending them to the router.
Step 8
In the Advanced options column, click Configure. The Advanced Parameters Configuration dialog box
appears.
Step 9
Define a set of advanced parameters which would be applicable for the inspected traffic that goes
through the interfaces that belongs to the zone. For each parameter, select the check box to the left of
the parameter name to override the default value for the parameter and then select the new value for the
parameter. (Optional) In the Advanced Parameters Configuration dialog box, do the following:
19-48
OL-32122-01
Chapter 19
Note
Step 10
a.
Select the Alert check box and select the On radio button to set the alert.
b.
Select the Maximum Destination check box to set the maximum destination.
c.
Select the TCP SYN-Flood Rate per Destination check box to set the TCP flood rate.
d.
Select the Basic Threat Detection Parameters check box and select the On radio button to
configure the FW drop threat detection rate, FW inspect threat detection rate, and FW SYN attack
threat detection rate.
Click:
Step 11
To edit the existing security zone parameters, select the zone, and click Edit in the Advance options
column. The Advanced Parameters Configuration dialog box appears.
Step 12
In the Advanced Parameters Configuration dialog box, edit the values and click Save to save the changes.
When you hover your mouse over the Advanced Options icon, the configured parameters will be
displayed in the quick view window.
Step 13
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Zones.
Step 4
b.
Select the zone, and click Edit. The selected Zone entity opens for editing.
Step 5
Click the add icon to assign the interface to the zone or to un-assign the existing interfaces from the zone
You can also change the Description of the zone and edit the advanced parameters of the zone.
Step 6
Configuring a Default-Zone
A default zone is a zone that is automatically assigned to all interfaces that are not assigned to any other
zone on device.
To configure a default zone, follow these steps:
19-49
Chapter 19
Note
Step 1
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
From the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then
click Zones.
Step 4
In the Zones page, click Enable Default to enable or disable the default security zone in the device. The
default zone will host all of the interfaces that are not related to any zone.
Step 5
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand Zone Based Firewall and then click Policy Rules. The Policy Rules
page appears.
Step 4
From the Policy Rules page, click Add Rule and complete the fields. When you add a rule, you can place
a rule at the top or bottom of the policy or after/before an existing rule. Firewall Rules are processed
according to their order. To control the order of the rules, select the location of the rule in the table and
use Add Top or Add Bottom option to add the rule to the top or the bottom of the table. Select a rule and
use Add After or Add Before option to add the rule before or after an existing rule.You can place a rule
at any given location and later use drag and drop to change its location.
Step 5
(Optional) Enter the firewall rule name. If you do not provide the name for the firewall rule, the system
generates a name for the firewall rule. You cannot use these formats rule_<number> or
EMS_rule_<number> to create the firewall rule name (For example, rule_1). These are system reserved
formats.
Step 6
Select the source and destination zones for the rule, the rule is applicable only for traffic that flows from
the source zone to the destination zone. Note that the source and destination zones must be different.
Step 7
To add the source and the destination IP address, click the Add icon. The Source/Destination IP address
dialog box appears.
a.
In the Source/Destination IP address dialog box, select the Any check box to set the value to any.
b.
c.
Click the + button to add the new IP address and the subnet.
d.
e.
Click OK to save the configurations or click Cancel to cancel all of the changes that you have made
without sending them to the router.
19-50
OL-32122-01
Chapter 19
Step 8
(Optional) Set the Service values. To add or remove the service, click the down arrow icon. The Firewall
Service dialog box appears. You can also select a predefined Service. For creating services, see Creating
a Service Group.
a.
In the Firewall Service dialog box, select the service or port-based application check box to select
the application or the service for the rule.
b.
Select specific TCP / UDP ports by selecting TCP or UDP, close the window and enter the list of
ports to be used in the text box that appears next to the TCP or UDP icon. For viewing port-based
applications, see Assigning TCP/UDP Ports on an Application.
c.
d.
Step 9
Select the appropriate action. The options are: Drop, Drop and Log, Inspect, Pass, and Pass and Log.
Step 10
If you select the action to inspect, click Configure in the Advance options column. The Advanced
Parameters Configuration dialog box appears.
Step 11
To customize the device default value, select the Parameter check box and set the new value.
b.
To apply the device default value, unselect the Parameter check box.
c.
To view the firewall rule default parameters, see Configuring a Default Parameters Map.
d.
When you hover your mouse cursor over the Advanced Options icon, the configured parameters are
displayed in the quick view window.
Click Save to apply the rule to the device. For description of the elements, see the Cisco Prime
Infrastructure 2.2 Reference Guide.7
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Policy Rules. The Firewall
Rules page appears.
Step 4
In the Firewall Rules page, click Hit Counters and use one of the following options to analyze the
sessions and packets hit counters for the firewall rules.
Step 5
Click the Show all option to view the packets and sessions counters for all firewall rules. The packets
and sessions counters are displayed in two separate columns.
Note
When you select the Show all option, the system will display a warning message stating that it
may take more time to complete this operation. Sessions hit counters are not applicable for
Drop/Pass rules. Similarly, packet hit counters are not applicable for Inspection rules.
19-51
Chapter 19
Step 6
To know the time of the last update for the rules, hover the mouse cursor over the column names or click
the Last Update Time option in the Hit Counters.
Step 7
Click the Show for selected rules option to show the hit counters for a specific rule or a couple of
selected rules. The hit counters would be displayed in a popup dialog box with a refresh button that
allows quick refresh of the data.
Step 8
Use the predefined filters options available in the top-right corner of the table to display the rules at the
top or bottom based on the packets/sessions counts.
Step 9
Click Reset All Counters to discard all of the rules counters on the device. The application will display
a warning message before resetting the rules counters.
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Policy Rules. The Firewall
Rules page appears.
Step 4
Select the check box to select the rule, and then click Edit. The selected Rule opens for edit. You
cannot edit the name of the policy rule.
Note
Step 5
In Cisco Prime Infrastructure Release 2.2, you can specify the Transmission Control Protocol
(TCP) / User Datagram Protocol (UDP) port range in the firewall rule service. When you add a
new rule or edit an existing rule under the Service column, click object selector to assign the
TCP / UDP, and click OK. You can define the port numbers in the text box that appears near the
protocol icon. Also, you can define the port range in the format of
<start-port-number>-<end-port-number>, and this range can be configured for that specific
protocol (TCP or UDP).
You can re-order firewall rules by dragging a rule and dropping it in a different location.
19-52
OL-32122-01
Chapter 19
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Service Groups. The Service Groups page appears.
Step 4
Step 5
Step 6
a.
In the Service Group page, click Add Service Group and enter the Service Group Name. You cannot
change the name after creating the Service Group or create a service group without an application.
b.
c.
In the Applications dialog box, select the Applications check box to select one or more applications
from the list, then click OK.
In the Service Groups page, click the Service Group parameters row and edit the parameters.
Select the service group and click Edit. You can add or remove port-based applications/ TCP or
UDP ports and assign or unassign ICMP messages to the service group.
To remove an application from the selected list, hover your mouse cursor over the application name
and click X.
Note
When you click Save in the following procedure, your changes are deployed on the device. You cannot
review the requested operation or remove the request from the pending changes queue.
To assign or unassign TCP/UDP ports for an application, follow these steps:
Step 1
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Port Mappings. The Port Application Mapping page appears.
Note
19-53
Chapter 19
Step 4
Step 5
To assign or unassign the TCP/UDP ports to an application, click the application and update its
TCP/UDP ports value. The TCP/UDP Port values are assigned to the specific application.
a.
Assign port(s) by defining one or more ports separated by comma (For example: 1234, 2222 and so
on).
b.
Assign port(s) by defining the port range (For example: 1111-1118). You can also assign a
combination of ports and port ranges.
c.
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Default Parameters. The
Default Parameters page appears.
Step 4
Note
Step 5
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Interfaces.
Step 4
In the Interface page, select the interface that you want to change and click the down arrow icon. The
Zone dialog box appears.
Step 5
In the Zone dialog box, select the new security zone for the interface. If the selected interface is already
assigned to a zone, you will get a warning message.
Step 6
Click Yes on the warning message if you want to change the assignment of that interface.
Step 7
To un-assign the interface from the specific zone, select the interface and delete the zone information.
19-54
OL-32122-01
Chapter 19
Step 8
The following sections describe the routing protocols supported by Prime Infrastructure.
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click Static. The Static Routing page appears with options to
configure IPv4 static routes.
Step 5
In the IPv4 Static Routes page, click Add Row, and then complete the fields.
For Permanent Route, choose either of the following:
True to specify that the route will not be removed from the routing table, even if the next-hop
Click Save.
c.
19-55
Chapter 19
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click RIP. The RIP Routing page appears with options to configure
IPv4 RIP routes.
Step 5
b.
c.
Click Save.
d.
Click Passive Interface to select the passive interface that you want to add.
e.
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click EIGRP. The EIGRP Routing page appears with options to
configure IPv4 EIGRP routes.
19-56
OL-32122-01
Chapter 19
Step 5
In the IPv4 EIGRP Routes page, click Add Row, and then complete the fields.
b.
Click Save.
c.
Click Add Interface to select the passive interface that you want to associate to the Autonomous
System (AS) number created.
d.
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click OSPF. The OSPF Processes page appears with options to
configure IPv4 OSPF processes.
Step 5
In the IPv4 OSPF Processes page, click Add Row, and then complete the fields.
b.
Click Save.
c.
Click Passive Interfaces to select the passive interface that you want to associate to the process
created.
d.
Click Advanced. The Advanced OSPF IPv4 Configuration dialog box appears.
e.
Click Networks > Add Row, and then complete the fields.
f.
Click Route Summarization > Add Row, and then complete the fields.
g.
Click OK.
h.
19-57
Chapter 19
19-58
OL-32122-01
CH A P T E R
20
Cisco Prime Infrastructure provides step-by-step guidance for the following tasks:
Preconfiguring devices that will be added to your network in the futureSee Preconfiguring
Devices to be Added Later.
Setting up access switches after they have been added to Prime InfrastructureSee Getting Help
Setting Up Access Switches.
Note
The Bootstrap and Initial Device Setup menus appear for users with the following privileges only: root,
super users, and Config Managers.
When you choose Configuration > Plug and Play > Bootstrap, Prime Infrastructure guides you
through creating a Plug and Play profile that creates a bootstrap configuration file, which creates a
bootstrap configuration file and another config file that includes Telnet and SSH credentials, to allow
new Cisco IOS devices to call home to Prime Infrastructure to get further configurations. Using the
Plug and Play Setup Workflow eliminates the need to console into each device to set it up before it can
be managed by Prime Infrastructure.
20-1
Chapter 20
The Plug and Play Setup workflow is similar in functionality to Configuration > Templates > Features
& Technologies > Plug and Play Profiles; however, the workflow, designed more for access switches
than routers, provides more guidance to set up new devices.
Note
The Plug and Play Setup workflow is most helpful in setting up and configuring Cisco IOS switches and
access devices. Cisco IOS devices that support auto DHCP install options can be booted up using the
Plug and Play Setup workflow. All other devices (for example, routers that do not have direct network
connectivity in the branch, legacy controllers, and APs) must use the Plug and Play feature explained in
Automating Device Deployment.
You need to complete the Plug and Play Setup only once. After you complete the steps, when a new
switch or access device is connected to the network, the device automatically uses the Plug and Play
profile, boots up, and then Prime Infrastructure begins managing the device.
Related Topic
Prerequisites
Supported Devices and Software Images for Plug and Play Setup Workflow
Table 20-1 lists the devices and corresponding software images supported for Configuration> Plug and
Play > Initial Device Setup. Also See List of Devices supported by Prime Infrastructure 2.2 for all the
Supported Devices and the corresponding sysObjectIDs
Table 20-1
Supported Devices and Image Versions for Configuration > Plug and Play > Initial Device Setup
Catalyst 2960C
Catalyst 2960-SF
Cisco IOS Release 15.0(2)SE and later Cisco IOS Release 15.0(2)SE and
later
Catalyst 3560C
Cisco IOS Release 151-2.SG and later Cisco IOS Release 151-2.SG and
later
20-2
OL-32122-01
Chapter 20
Prerequisites
Based on the method that you select to deliver the Plug and Play profile to new devices, you must make
sure that you have completed the necessary prerequisites.
Configure DHCP with the appropriate settings in the network as described in Sample DHCP Server
Settings for Auto Install. If DHCP is not available in the network, you can use a different method to
apply the bootstrap configuration to your new devices as explained in Sample DHCP Server Settings
for Auto Install.
You must have an existing network connection (distribution/core) available in the branch or campus
to where the new device is connecting.
The branch must have direct connectivity to the Prime Infrastructure server, or you must use the Plug
and Play external server to connect to Prime Infrastructure.
Ensure TFTP is enabled on the PI server by choosing Administration > System Settings > Server
Settings, then clicking Enable under TFTP. TFTP is enabled by default. By default, this setting is
enabled in a non FIPS-certified version of Cisco Prime Infrastructure.
If you are running a non FIPS-certified version of Cisco Prime Infrastructure, ensure that you
enabled the following:
Ensure TFTP is enabled on the Prime Infrastructure server by choosing Administration >
System Settings > Server Settings, then clicking Enable under TFTP.
Ensure that HTTP or HTTPS is properly enabled for deploying bootstrap configuration into a
device. See Prerequisites for Deploying Bootstrap Configuration into a Device in a non
FIPS-certified Prime Infrastructure Server for more information.
If you are running a FIPS-certified version of Cisco Prime Infrastructure, ensure that you enabled
the following:
Enable PnP Gateway so that the bootstrap configuration works properly.
Ensure TFTP is enabled on the Prime Infrastructure server by choosing Administration >
System Settings > Server Settings, then clicking Enable under TFTP.
Ensure that HTTP or HTTPS is properly enabled for deploying bootstrap configuration into a
The new switch contacts the DHCP server. You must configure the DHCP server to redirect the
switch to the TFTP server. See Table 20-2 for more information.
2.
The DCHP server points the switch to the new TFTP server where the Plug and Play bootstrap
profile resides.
3.
The switch loads the bootstrap configuration file, boots up, and then contacts the Plug and Play
Gateway.
20-3
Chapter 20
Table 20-2
Command to Enter
Description
network 10.106.190.0
255.255.255.224
Defines the network 10.106.190.0 and subnet mask 255.255.255.224. DHCP uses
this pool of IP addresses to assign an IP address to the new device.
default-router 10.106.190.17
Specifies that the TFTP server IP address 10.77.240.224 is the Prime Infrastructure
server IP address.
DHCP Auto InstallIf you select the DHCP-based auto install method to deliver the Plug and Play
Profile, you must have a distribution network or a network that already has an existing connection
to your corporate network. See Sample DHCP Server Settings for Auto Install.
Prime UtilitiesIf you select the Prime Utilities method to deliver the Plug and Play Profile, after
connecting the new devices to the distribution layer, you must use the laptop utility to download the
configuration from Prime Infrastructure and apply the configuration to the devices. You must have
internet connectivity to the Prime Infrastructure server.
File TransferIf you select the File Transfer method to deliver the Plug and Play Profile, you can
download the TXT file and manually apply the configuration to the devices.
SNMPv2 and SSH CredentialsThe SNMP, Telnet, and SSH credentials you specify will be
configured on all devices that use the Plug and Play profile. You can consider these temporary
credentials necessary to allow Prime Infrastructure to contact the devices. You can use the Getting
Help Setting Up Access Switches workflow later to modify the device credentials. You can enable
Telnet, SSH, or both. If you specify SSH, ensure the device has the K9 image.
For security purposes, we recommend that do not use public or private for your community
strings.
Plug and Play Gateway LocationBy default, the Prime Infrastructure server acts as the Plug and
Play gateway server. You can modify the server by providing the external Plug and Play gateway IP
address.
20-4
OL-32122-01
Chapter 20
via TFTPThe profile remains active on the TFTP server and whenever a new switch or access
device is connected to the network, the device will automatically use the Plug and Play profile, boot
up, and then call home to Prime Infrastructure for additional configuration.
Email to other operatorsYou can email the bootstrap configuration file to an appropriate
network engineer who can provision the bootstrap configuration manually to the device, or email
the PIN to an appropriate network operator who can use the Prime Infrastructure iPad or laptop
utility to provision the configurations on the devices.
Note
If you are going to use email to deliver either the bootstrap configuration or the PIN, you must
have previously configured the mail server settings under Administration > System Settings >
Mail Server Configuration.
Export the bootstrap configuration file (in TXT format) that was created and then manually apply
the bootstrap configuration to the devices.
After you save the Plug and Play Profile, the Workflow Status menu at the bottom of the Prime
Infrastructure interface refreshes to reflect newly registered devices and any devices on which the
workflow failed.
Now that your devices will be able to contact the Prime Infrastructure server, you can specify further
configurations that can be applied to the devices. See Getting Help Setting Up Access Switches.
Click Enable in the HTTP Forward section of the Administration > System Settings > Server
Settings page.
Note
Note
For HTTP, unselect the Create Profile for https check box in the Configuration > Plug and Play
> Bootstrap page.
The Plug and Play features will not work if the Prime Infrastructure server is installed in FIPS mode.
20-5
Chapter 20
In addition to the bootstrap configuration file, another config file is created in the TFTP location which
provisions the credentials you provided on the Create Profile page.
Enable Cipher in Admin mode of the server by entering the following command.
ncs run pnp-ciphers enable
Click Enable in the HTTP Forward section of the Administration > System Settings > Server
Settings page.
Note
For HTTPS, select the Create Profile for https check box in the Configuration > Plug and Play
> Bootstrap page.
20-6
OL-32122-01
Chapter 20
exit
crypto pki certificate chain pi-hateast-151
certificate ca 4CAAA6BE
30820399 30820281 A0030201 0202044C AAA6BE30 0D06092A 864886F7 0D010105
0500307D 310B3009 06035504 06130255 53310B30 09060355 04081302 43413111
300F0603 55040713 0853616E 204A6F73 65311630 14060355 040A130D 43697363
6F205379 7374656D 73311D30 1B060355 040B1314 574E4255 20286175 746F6765
6E657261 74656429 31173015 06035504 03130E70 692D6861 74656173 742D3135
31301E17 0D313430 38303530 36313432 355A170D 31363038 30343036 31343235
5A307D31 0B300906 03550406 13025553 310B3009 06035504 08130243 41311130
0F060355 04071308 53616E20 4A6F7365 31163014 06035504 0A130D43 6973636F
20537973 74656D73 311D301B 06035504 0B131457 4E425520 28617574 6F67656E
65726174 65642931 17301506 03550403 130E7069 2D686174 65617374 2D313531
30820122 300D0609 2A864886 F70D0101 01050003 82010F00 3082010A 02820101
00877EEC 985CFD97 92BAE4C4 E611B089 E4453714 844F2DEC C944F907 D53BB92A
016CA25C 007F2EF5 51CAA930 8EADF3BA 165D3A25 004FCFE3 2D0A9A92 B8165508
C4642DFA F1A0DFEE F8F1C958 7CBE7ED7 6D74195A F1E7133A 5A7EFF36 0AF8ADC1
8A829515 D91EF557 CE9F4915 B4C04FD0 F461C211 FB70A375 AA7204DC 4C025FED
72896754 53FB1F7A 9F30CC0D A0443D50 9DDB7A90 3544F345 0CAB8FDB A8009718
F8D49347 741493AD 746B3DC3 0E41D2FF 72B51816 7968D924 1F42536A 1C7B29F2
C569E111 3D126FBF 4B23F2A5 96AA446E BA9F5A94 68F1F7A3 E8C4994F BCF4B2FB
ED5589BF D222DD29 2EACFE48 DDA45116 EA2C42BA 9E37B6DA 05E7582E 1521512A
B1020301 0001A321 301F301D 0603551D 0E041604 14C05AA1 1AF06B2A D5AA67BD
226B487B 0518343B 5B300D06 092A8648 86F70D01 01050500 03820101 00741493
7B6360D5 34F7ED04 2078A847 788ACDFF A143162B 1736AB2C A8E3EA2B 1CE54E9E
AEFBE562 21D8F70E 3AD9EF0E ED782A7D 362D4D1A 9275C791 96F19584 C873DAF1
16108A59 186FD2E1 BD00F61C 2C57D6A0 0DE5E42B B76210BE EAB8C9F2 2C476091
B5F0B661 E8C8277F 5F673547 0404C863 0BE127B2 9E3FDE18 139F9BAD F5EC945A
30715BDF B72565F0 D25DBA40 216091F0 98BDB241 993662F9 248C1423 8F5417B2
69672F32 6212D37F 008A4B86 CDF280E9 2C89F1CF 9E63311D 2B349C07 43D8D02D
F9770607 9F14DF51 896BF1EF 8B2A3EC5 3B1E564E 4E079B4A CC684745 11372D92
377407E8 194EF897 5B62B38B 16B6F1EF F080A3E4 512508B8 4322C2DD 86
quit
exit
ip host pi-hateast-151 10.104.119.151
cns trusted-server all-agents pi-hateast-151
cns trusted-server all-agents 10.104.119.151
cns id hardware-serial
cns id hardware-serial event
cns id hardware-serial image
cns event pi-hateast-151 encrypt keepalive 120 2 reconnect-time 60
cns exec encrypt 443
cns image server https://pi-hateast-151/cns/HttpMsgDispatcher status
https://pi-hateast-151/cns/HttpMsgDispatcher
cns config partial pi-hateast-151 encrypt 443
cns config initial pi-hateast-151 encrypt 443
20-7
Chapter 20
end
The bootstrap configuration file is delivered based on the method you specified:
via TFTPPrime Infrastructure copies the bootstrap configuration file, cisconet.cfg, and the
config credentials file to the Prime Infrastructure TFTP server.
Email to other operatorsPrime Infrastructure emails the bootstrap configuration file to the
specified email address and copies the config credentials file to the Prime Infrastructure TFTP
server.
Note
If you are going to use email to deliver either the bootstrap configuration or the PIN, you must
have previously configured the mail server settings under Administration > System Settings >
Mail Server Configuration.
Export the bootstrap configuration filePrime Infrastructure exports the bootstrap configuration
file to the client and saves it as Day-0 Bootstrap Configuration_NEW.txt and copies the config
credentials file to the Prime Infrastructure TFTP server.
Related Topics
20-8
OL-32122-01
Chapter 20
Choose Devices
The Configuration > Plug and Play > Initial Device Setup > Choose Other Devices window displays
all new devices you assigned to the specified location, any devices previously assigned to the same
location, and any devices that were added to Prime Infrastructure using discovery. This allows you to
configure wired and wireless features on new and existing devices at the same time.
Choose whether you want to configure wired or wireless features. The devices displayed correspond to
the option that you select.
If you select Add wired features to my device(s), only applicable devices in the selected location on
which you can configure wired features are displayed. After you select the devices, check the Device
Readiness column and see Device Readiness Explanation for more information.
Choose a configuration mode:
Advanced modeUses templates in which you can modify and customize the device
configurations. You should be comfortable with CLI templates. See Configuring Wired Features
Using Advanced Mode.
If you select Add wireless features to my device(s), applicable devices in the selected location on which
you can configure wireless features are displayed. After you select the devices, you can choose to
configure guest access as part of the wireless device configuration. Enter the number of access points
and select a mobility domain.
20-9
Chapter 20
Table 20-3
The device is not running the required Cisco IOS version. Table 20-3 lists the required versions.
Prime Infrastructure was unable to collect inventory details. Choose Inventory > Device
Management > Network Devices and make sure the Admin Status for the device is Managed and
the Inventory Collection Status is Completed.
Switch Series
Catalyst 2960-SF
Catalyst 4500
Related Topics
IP Address Options
2.
Device Credentials
3.
4.
5.
Confirmation
IP Address Options
During the Configuration > Plug and Play > Initial Device Setup workflow (see Preconfiguring
Devices to be Added Later), the DHCP server assigned IP addresses to the devices. The IP Management
Options page is where you can modify the IP addresses. Select Change Device(s) IP Management
Address, enter the necessary values for the device(s) in the Device Management Option table, then click
Save.
20-10
OL-32122-01
Chapter 20
You can edit IP address, hostname, subnet, and gateway values only; you cannot modify the device type
and serial number.
If you have a large number of devices, you can simplify this task by exporting a CSV file of all devices,
editing the file, then importing the CSV file to overwrite the Device Management Option table.
Device Credentials
During the Configuration > Plug and Play > Initial Device Setup workflow (see Preconfiguring
Devices to be Added Later), the same SNMP, Telnet and SSH credentials you specified were be
configured on all devices. The Credentials page is where you can modify the credentials and specify
different credentials for various devices. Select Specify new credentials and enter the necessary values.
Click Save Credentials to save the credentials you entered. When you have new devices that you want
to set up and you use the Initial Device Setup workflow again, you can select the credentials that you
saved from the Use Credentials list. The fields are populated with the values that you previously saved.
When you complete the Initial Device Setup workflow, the device credentials are updated on the devices
and in Prime Infrastructure.
Enable CDP
Rapid PVST
20-11
Chapter 20
Confirmation
The Confirmation screen is the last step in the Initial Device Setup workflow in which you can view the
settings you specified. Click Deploy to deploy the configuration. A job is created and the job status
information is displayed.
To view the deployed jobs, choose Administration > Jobs to view the status and details about the job.
If the deployment fails, the number of devices on which the deployment failed appears in the Failed
column of the Workflow Status menu at the bottom of the Prime Infrastructure interface. Click the
number displayed to go directly to the Choose Other Devices screen to view the device(s) that failed.
You can modify necessary settings and repeat the workflow for that device.
SystemAllows you to specify new IP addresses to replace the IP addresses that were previously
assigned by the DHCP server. You can edit IP address, hostname, subnet, and gateway values only;
you cannot modify the device type and serial number.
If you have many devices, it might be easier to edit these values in a spreadsheet. You can export the
list of devices as a CSV file, edit the file, and then import the file to overwrite the table.
Layer 2Allows you to configure Spanning Tree, VTP, LLDP, and CDP. By default, Rapid PVST
and CDP are enabled because they are required by Prime Infrastructure.
High AvailabilityAllows you to configure power and system redundancy. If the High Availability
check box is unchecked, redundancy is disabled on the device.
InterfacesAllows you to configure VLANs. You can check how many ports your devices have and
based on that information, you can split the interfaces into interface patterns.
OtherAllows you to configure any other commands in the terminal configuration mode.
20-12
OL-32122-01
Chapter 20
Create Groups
2.
Wireless Parameters
3.
4.
Guest Access
5.
Confirmation
Create Groups
The Create Groups page is where the Mobility Architecture group is automatically defined for the
wireless devices that you selected in the Choose Other Devices page. The Mobility Group consists of
Mobility Controller, Switch Peer Group, and Mobility Agents. You cannot modify the Mobility
Controller and the Mobility Agent that were previously configured. Whereas, you can add Switch Peer
Groups.
Wireless Parameters
The Wireless Parameters page allows you to assign Wireless Management IP, Mask, and Wireless
VLAN ID for the selected wireless devices. You can also choose to export the list of devices as a CSV
file, edit the values, and import the file to overwrite the values for the devices. Then, click Save.
Guest Access
The Guest Access page is displayed only if you have chosen to configure guest access as part of the
wireless device configuration in the Choose Other Devices page. Default values are displayed for the
guest WLAN and VLAN fields. Based on the security profile and the authentication method that you
select for your guest, you must enter the primary and secondary Radius server details.
Confirmation
The Confirmation page is the last step in the Guided workflow for wireless features in which you can
view the settings you specified. Click Deploy to deploy the configuration. For more information about
the confirmation job status and the workflow status, see the Confirmation.
20-13
Chapter 20
20-14
OL-32122-01
PART
Viewing Devices
CH A P T E R
21
Viewing Devices
Viewing Network Devices
From the Inventory > Device Management > Network Devices page, you can view device inventory
and device configuration information. The Network Devices page contains general administrative
functions and configuration functions as described in Table 21-1.
Table 21-1
Task
Description
Manage devices
21-1
Chapter 21
Viewing Devices
Table 21-1
Task
Description
After you set up a site group profile, you can Add to Group button located at the top of the
Network Devices page under Groups & Sites.
add devices to it.
To add devices to site groups in Network
Devices page, add them to Group and then
select site group.
To add devices to site maps, go to the Maps >
Site Map.
Note
Note
21-2
OL-32122-01
Chapter 21
Viewing Devices
Viewing Compute Devices
Table 21-1
Task
Description
21-3
Chapter 21
Viewing Devices
Table 21-2
Task
Description
View basic device information such as device Click the arrow near the UCS device name to
name, device type, IP address, reachability
open the schematic that shows the
status, and alarm count.
inter-connections of the UCS chassis and
blades and the up/down status of chassis and
blade servers.
You can create user defined UCS sub-groups Hover your mouse over the expand icon next to
similar to device groups.
User Defined UCS and click Add SubGroup.
See Creating Device Groups.
21-4
OL-32122-01
CH A P T E R
22
QuickAllows you to quickly discover the devices in your network based on the SNMP community
string, seed IP address, and subnet mask you specify. Choose Inventory > Device Management >
Discovery, then click Quick Discovery. See Running Quick Discovery.
RegularAllows you to specify protocol, credential, and filter settings, and schedule the discovery
job. You can also apply to the added devices any credential profiles you have created. See Changing
Discovery Settings and Using Credential Profiles.
Step 2
Step 3
Run Now to save the settings and immediately start the discovery job.
Related Topics
Running Discovery
22-1
Chapter 22
Choose Inventory > Device Management, click Discovery Settings, then click New.
Step 2
Enter the required settings, then click Save. For descriptions of the template parameters, see the Cisco
Prime Infrastructure Reference Guide.
Step 3
In the Discovery Settings, select the discovery job that you just created, then click Schedule.
Step 4
Related Topics
Running Discovery
Step 2
Select the running discovery job for which you want to see details.
Ping Sweep
Routing Table
You can import a CSV file to add data for the protocols. Table 22-1 describes the CSV file format for
each of the protocols.
Note
You can import a CSV file if you are using a supported version of Mozilla Firefox only.
22-2
OL-32122-01
Chapter 22
Table 22-1
Protocol
Ping sweep
Any valid IP address and subnet mask, separated by a comma. You can specify
multiple networks in a single discovery by adding additional rows.
Routing table
Choose Inventory > Device Management > Network Devices, then click Add.
Step 2
Step 3
Click Add to add the device with the settings that you specified.
Note
As part of the SNMP read-write credential verification on the device, a log message appears in the
managed device indicating there was a configuration change from the IP address of the Prime
Infrastructure server during the inventory task.
Related Topics
Running Discovery
Choose Inventory > Device Management > Network Devices, then click Bulk.
22-3
Chapter 22
Step 2
Click the link to download a sample file that contains all of the fields and descriptions for the information
that must be contained in your imported file.
Step 3
Click Browse to navigate to your file, then click Import and wait for the import to complete. (To check
the status of the import, choose Administration > Jobs).
Step 2
Click Add.
Step 3
Enter the Profile Name and Description under the General Parameters.
Step 4
Enter valid credentials and other values in the SNMP, Telnet/SSH and HTTP fields.
You cannot apply a credential profile to a device unless the profile has at least an SNMP read credential.
Step 5
Related Topics
22-4
OL-32122-01
Chapter 22
Step 2
Step 3
Click Profile Details and enter valid credentials and other values in the SNMP, Telnet/SSH and HTTP
fields.
Step 4
(Optional) Click Device List to view the devices associated with the selected profile.
Step 5
Click Save to update the profile of all associated devices or Click Save and Sync to update and
synchronize the devices with the updated profile.
Note
The credential profile associated with the devices with different credential profile will get lost.
The manually updated parameters like Telnet parameter, Http parameters will be applied to all of
the selected devices.
Related Topics
Step 2
Step 3
Click Delete.
You cannot delete a credential profile until you have removed all device-to-profile associations. You can
remove these associations using the device edit page under Inventory > Device Management >
Network Devices.
Related Topics
22-5
Chapter 22
Step 2
Click Copy.
Step 3
Enter the Profile Name and Description under the General Parameters.
Step 4
Step 5
Related Topics
Step 2
Step 3
Click the Device List to view the devices associated with the selected profile.
You have exceeded the maximum number of managed devices allowed for your license. If you need
additional information about licensing, see the following:
Cisco Prime Infrastructure Quick Start Guidecontains descriptions of the different licenses,
22-6
OL-32122-01
Chapter 22
The wrong device credentials were entered into Prime Infrastructure so that Prime Infrastructure
was unable to contact the device. In this case, the Reachability column in Inventory > Device
Management > Network Devices is red and indicates the device is unreachable.
If the Device Type column in the Inventory > Device Management > Network Devices, displays
Unknown for a device, Prime Infrastructure does not support the device. You can check if support for
that device type has been added to Prime Infrastructure by choosing Administration > Software
Update, then clicking Check for Updates.
22-7
Chapter 22
22-8
OL-32122-01
CH A P T E R
23
Manually upgrading your devices to the latest software version can be error prone and time consuming.
Cisco Prime Infrastructure simplifies the version management and routine deployment of software
updates to your devices by helping you plan, schedule, download, and monitor software image updates.
You can also view software image details, view recommended software images, and delete software
images.
Prime Infrastructure stores all of the software images for the devices in your network. The images are
stored according to the image type and version.
Before you can upgrade software images, you must configure your devices with SNMP read-write
community strings that match the community strings entered when the device was added to Prime
Infrastructure.
Table 23-1 describes the different processes involved in managing software images and whether the
processes are supported in the Unified Wireless LAN Controllers and devices.
Table 23-1
Software Image
Management
Processes
Image import from
device
Description
Unified WLCs
23-1
Chapter 23
Table 23-1
Software Image
Management
Processes
Description
Unified WLCs
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Supported
Image
Ability to upgrade software image on the managed Supported
upgrade/distribution devices from Prime Infrastructure. This allows
you to upgrade the software image for multiple
devices based on demand or at a later point in time
as scheduled. The feedback and status are
displayed during the upgrade and devices can be
restarted, if required. In large deployments, you
can stagger reboots so that the service at a site is
not completely down during the upgrade window.
Supported
Supported
Image
recommendation
Supported
Supported
Image upgrade
analysis
Supported
23-2
OL-32122-01
Chapter 23
Because collecting software images can slow the data collection process, by default, Prime Infrastructure
does not collect and store device software images when it gathers inventory data from devices.
To set image management and distribution preferences:
Step 1
Step 2
To have Prime Infrastructure automatically retrieve and store device images when it collects device
inventory data, check Collect images along with inventory collection.
Step 3
Select other options as necessary. Hover your mouse cursor over on the information icon to view details
about the options.
Note
The Config Protocol Order field specifies the order in which the protocol is used. For example,
if SSH is listed before Telnet, SSH is used first, and Telnet is used next.
Note
If you enabled FIPS mode when you installed Prime Infrastructure, TFTP and FTP are disabled
by default. You must manually enable TFTP and FTP, if required, by choosing Administration
> System Settings > Server Settings, and then restarting Prime Infrastructure.
Step 4
Click Save.
Step 5
Choose Inventory > Device Management > Software Images and click the Image Dashboard icon in
the top-right corner of Software Image page to view all of the software images retrieved by Prime
Infrastructure. The images are organized by image type and stored in the corresponding software image
group folder.
Choose Inventory > Device Management > Software Images and click the Image Dashboard icon in
the top-right corner of Software Image page.
Step 2
Step 3
23-3
Chapter 23
Step 2
Click Import.
Step 3
Specify the source from which the software image is imported. You can specify any one of the following
sources:
Cisco.comPrime Infrastructure displays the recommended software images for the device type
you specify, but it does not allow you to download software images directly from cisco.com. You
must manually download the software image from cisco.com and then import the downloaded image
file. Prime Infrastructure does not display deferred software images.
URLSpecify the FTP URL from where you can import the software image. You can use an HTTP
URL where user credentials are not required.
ProtocolSpecify the FTP location from where you want to import a software image. User
credentials are required. The FTP protocol only is supported.
Note
Step 4
For wireless LAN controllers, you can import software images from a file or a URL only. For
more information about Software Image Management Processes and Supported Devices, see
Table 23-1.
Specify Collection Options and when to import the image file. You can run the job immediately or
schedule it to run at a later time.
Note
Step 5
Click Submit.
Step 6
Choose Administration > Jobs to view the status about the image collection job. The Duration field is
updated after the job completes.
Related Topics
23-4
OL-32122-01
Chapter 23
Step 2
Navigate to and select the software image for which you want to change requirements, then click Image
Details.
Step 3
Modify the necessary fields, then click Save. Your changes are saved in the software version in which
you made the change.
Note
Step 1
Step 2
Select the software images that you want to distribute, then click Distribute.
By default, the devices for which the selected image is applicable are shown.
Step 3
Choose the image name in the Distribute Image Name field to change your selection and pick a new
image, then click Save.
Step 4
To change the location on the device in which to store the software image, choose the value displayed in
the Distribute Location field, select a new location, then click Save.
The Status and Status Message fields display the validity of the selections you made. For example, if the
status is green, there is adequate space available to store the image on the specified location on the
device.
Step 5
Choose Administration > System Settings > Image Management to change the default distribution
options.
Step 6
Note
Step 7
Choose Administration > Jobs to view details about the image distribution job. The Duration field is
updated after the job completes.
23-5
Chapter 23
Step 2
Navigate to and select the software image for which you want to change requirements, then click Image
Details.
Step 3
Recommend Image from Cisco.com to select an image available on Cisco.com. Specify options,
click Start Recommendation, then skip ahead to Step 5.
Prime Infrastructure displays recommended software images for your specific device types, but it
does not allow you to download software images directly from cisco.com. You must manually
download software images from cisco.com and then import the downloaded image file. Prime
Infrastructure does not display deferred software images.
Select Image from Local Repository to select an image stored locally. Then, under Local
Repository:
Select the Show All Images check box to display all images available in the Prime
Infrastructure repository.
Unselect the Show All Images check box to display the software images applicable to the
selected device.
Step 4
Step 5
Choose the image name in the Distribute Image Name field to change your selection and pick a new
image, then click Save.
Step 6
Specify Distribution Options. You can change the default options in Administration > System Settings
> Image Management.
Step 7
Does the device have sufficient RAM to hold the new software?
Is the devices flash memory large enough to hold the new software?
Step 2
Step 3
Choose the source of the software image that you want to analyze.
Step 4
23-6
OL-32122-01
Chapter 23
Step 5
Step 6
23-7
Chapter 23
23-8
OL-32122-01
CH A P T E R
24
Configuration Archives
Configuration Rollbacks
Configuration Archives
Prime Infrastructure attempts to collect and archive the following device configuration files:
Startup configuration
Running configuration
A configuration archive is created if there is a change between the last archived configuration and the
current running configuration only. You can specify how Prime Infrastructure archives the
configurations:
On demandYou can have Prime Infrastructure collect the configurations of selected devices by
choosing Inventory > Configuration Archive and selecting the option to schedule the archive
immediately.
ScheduledYou can schedule when Prime Infrastructure collects the configurations of selected
devices and specify recurring collections by choosing Inventory > Device Configuration Archive,
then clicking Schedule Archive.
24-1
Chapter 24
You can schedule to have Prime Infrastructure copy the running configuration to the startup
configuration by choosing Inventory > Device Configuration Archive, then clicking Schedule
Overwrite.
During inventoryYou can have Prime Infrastructure collect device configurations during the
inventory collection process. See Changing Prime Infrastructure Device Configuration Settings for
more information.
Based on Syslogs If device is configured to send syslogs, when there is any device configuration
change, Prime Infrastructure collects and stores the configuration.
Does not back up the running configuration before pushing configuration changes to a device.
Does not attempt to roll back to the previously saved configuration in the archive if the configuration
deployment fails
Step 2
Click Backup Running Configuration to have Prime Infrastructure back up the running
configuration before pushing configuration changes to a device.
Click Rollback Configuration to have Prime Infrastructure attempt to roll back to the previously
saved configuration in the archive if the configuration deployment fails.
Click Save.
Step 2
Select the Archive Configuration on receiving configuration change events check box so that Prime
Infrastructure can collect and store the configuration based on syslog configuration change events. For
more information about the supported Syslog formats, see Supported Syslog Formats for Configuration
Archive Collection Settings.
24-2
OL-32122-01
Chapter 24
Step 3
Click Save.
Message Type is SYS-6-CFG_CHG and message text contains 'telnet', 'Console', 'SNMP', or 'ssh'.
FACILITY is FWSM and MNEMONIC is 111008 and Message text contains 'configure terminal'.
24-3
Chapter 24
Step 2
Click the expand icon for the device whose configuration you want to view. Then click the expand icon
again to view the specific configuration version that you want to compare.
Step 3
In the Compare With column, choose the configuration for which you want to compare the configuration
that you selected in the previous step.
The color key at the bottom of the report shows the differences between the configurations you selected.
Schedule RollbackSpecify when to roll back the running configuration, startup configuration, or
both configurations.
Schedule OverwriteSpecify when to copy the running configuration to the startup configuration.
Schedule DeployYou can schedule when to deploy the configuration and also specify to:
Overwrite the startup configuration. This option is applicable for devices that have a startup
configuration only.
Merge the configuration with the running configuration
Inventory > Device Management > Network DevicesTo change the configuration of a single
device. See Changing a Single Device Configuration.
Configuration > TemplatesTo change the configuration of more than one device and apply a
common set of changes, use a configuration template to make the changes.
Prime Infrastructure provides the following default configuration templates:
CLI templatesCLI templates are user-defined and created based on your own parameters. CLI
templates allow you to select the elements in the configurations. Prime Infrastructure provides
variables which you replace with actual values and logic statements. You can also import
templates from Cisco Prime LAN Management System. See Creating CLI Configuration
Templates.
Feature and technology templatesFeature templates are configurations that are specific to a
24-4
OL-32122-01
Chapter 24
Composite templatesComposite templates are two or more feature or CLI templates grouped
together into one template. You specify the order in which the templates contained in the
composite template are deployed to devices. See Creating Composite Templates.
Choose Inventory > Device Management > Network Devices, then click a device name.
The device details appear in the lower part of the page.
Step 2
Step 3
Select the feature that you want to change, then make the necessary changes.
Step 4
Click Save to save your configuration changes in the Prime Infrastructure database. (To view the status
of the configuration change, choose Administration > Jobs.)
Step 2
Step 3
Step 4
Click Add.
Step 2
Step 3
Select the controller that you want to change. The Device Work Center contains configuration functions
at the bottom of the page. For details, see the Device Work Center.
24-5
Chapter 24
Configuration Rollbacks
Step 4
Step 5
Click Save.
Rebooting Controllers
Step 1
Step 2
Step 3
Step 4
Note
Step 5
Save Config to FlashData is saved to the controller in non-volatile RAM (NVRAM) and is
preserved in the event of a power cycle. If the controller is rebooted, all applied changes are lost
unless the configuration has been saved.
Reboot APsSelect the check box to enable a reboot of the access point after making any other
updates.
Swap AP ImageIndicates whether or not to reboot controllers and APs by swapping AP images.
This could be either Yes or No.
Note
Step 6
Options are disabled unless the Reboot APs check box is selected.
Configuration Rollbacks
You can change the configuration on a device with a configuration stored in Prime Infrastructure. You
can select a single archived version to which you want to rollback.
During the configuration rollback process, the configuration is converted into a set of commands which
are them executed sequentially on the device.
When rolling back a configuration file you can specify the following options:
The type of configuration file to which to rollback, for example running or startup configuration
Whether to sync the running and startup configurations after rolling back the running configuration
If rolling back a startup configuration only, specify to reboot the device so that startup configuration
becomes the running configuration
Before rolling back the configuration, specify whether to create new archived versions. You can also
specify whether to continue the rollback if the archived configuration fails.
24-6
OL-32122-01
Chapter 24
Step 2
Click the expand icon for the device whose configuration you want to roll back.
Step 3
Click the specific configuration version that you want to roll back, then click Schedule Rollback.
Step 4
Step 5
Click Submit.
You cannot delete configuration versions, but older configuration versions are replaced by newer
configuration versions.
To change the number of configurations that Prime Infrastructure retains:
Step 1
Step 2
Enter a new value in the Number of Versions field. To archive an unlimited number of configuration
versions, unselect the Number of version to retain and Number of days to retain check boxes.
Step 3
Click Save.
24-7
Chapter 24
In this release, a stateful switchover of access points (AP SSO) is supported. An AP SSO ensures that
the AP sessions are intact even after a switchover.
Note
The stateful switchover of clients is not supported, which means that all clients, with the exception of
clients on locally switched WLANs on access points in FlexConnect mode, are deauthenticated and
forced to reassociate with the new controller in the Active state.
The Redundancy is supported only on the 5500, 7500, 8500, and WiSM2 controllers.
The primary and secondary controllers must be of the same hardware model.
The primary and secondary controllers must be running the same Controller software release.
The service port IP address and route information is maintained for each device.
If the Redundancy is enabled on a controller, the Prime Infrastructure or any other device cannot
manage the standby controller.
You cannot enable the Redundancy on a controller, if the controller is added to the Prime
Infrastructure through the service port. You must delete the controller and add it through the
management interface to enable the Redundancy on that controller.
When there is an audit mismatch between a controller and the Prime Infrastructure, you must not
restore the Redundancy parameters from the Prime Infrastructure on to the controller. However, you
can refresh the Redundancy Parameters in the Prime Infrastructure.
Before you enable the Redundancy, you must download the certificates for each device.
Configuration is downloaded from the network to the active controller, and then the details are
transferred to the standby controller through the Redundancy interface.
When an old active controller pairs up with the new active controller, the control is not transferred
back to the old active controller and it becomes the standby controller for the new active controller.
Step 2
In the Device Group area, expand Device Type, then expand Wireless Controller.
Step 3
Select the controller that you have chosen as the primary controller. The details of the device appear on
the lower part of the page.
24-8
OL-32122-01
Chapter 24
Step 4
Step 5
From the left sidebar menu, choose System > Interfaces. The Interfaces list page appears.
Step 6
Step 7
In the IP Address field, enter an IP address that belongs to the management interface subnet.
Step 8
Click Save.
Note
You can also configure the IP address of the Redundancy Management in the Global Configuration
details page. Choose Inventory > Device Management > Network Devices > Device Type > Wireless
Controller > Controller > Configuration > Redundancy > Global Configuration to access the Global
Configuration details page.
Step 2
In the Device Group area, expand Device Type, then expand Wireless Controller.
Step 3
Select the primary controller for which you have configured the redundancy-management interface IP
address. The details of the controller appear on the lower part of the page.
Step 4
Step 5
From the left sidebar menu, choose Redundancy > Global Configuration. The Global Configuration
details page appears.
Step 6
You must configure the following parameters before you enable the Redundancy Mode for the primary
controller:
Mobility MAC AddressEnter the virtual MAC address for the Redundancy pair. Ensure that the
mobility MAC address that you enter is the same for both primary and secondary controllers.
Step 7
Click Save. The Enabled check box for the Redundancy Mode becomes available for editing.
Step 8
Select the Enabled check box for the Redundancy Mode to enable the Redundancy on the primary
controller.
Note
After you enable the Redundancy, you cannot modify the Redundancy-Management IP, Peer
Redundancy-Management IP, Redundant Unit, and Mobility MAC Address.
24-9
Chapter 24
Note
Step 9
You cannot configure this controller during the Redundancy pair-up process.
Step 2
In the Device Group area, expand Device Type, then expand Wireless Controller.
Step 3
Select the controller that you have chosen as a secondary controller. The details of the controller appear
on the lower part of the page.
Step 4
Step 5
From the left sidebar menu, choose Redundancy > Global Configuration. The Global Configuration
Details page appears.
Step 6
You must configure the following parameters before you enable the Redundancy Mode for the secondary
controller:
Peer Redundancy-Management IPEnter the IP address of the peer physical management interface.
This IP address must be the same as the IP address of the local physical management interface of
the primary controller.
Mobility MAC AddressEnter the virtual MAC address of the Redundancy pair. Ensure that the
mobility MAC address that you enter is the same for both primary and secondary controllers.
Step 7
Click Save. The Enabled check box for the Redundancy Mode becomes available for editing.
Step 8
Select the Enabled check box for the Redundancy Mode to enable the Redundancy on the secondary
controller.
Step 9
Note
After you enable the Redundancy, you cannot modify the Redundancy-Management IP, Peer
Redundancy-Management IP, Redundant Unit, and Mobility MAC Address.
Note
You cannot configure the primary controller during the Redundancy pair-up process.
24-10
OL-32122-01
Chapter 24
You can view the Redundancy state details such as the local and peer state, unit, IP addresses of the
redundancy management, peer redundancy management, redundancy port, peer redundancy port, and
peer service port of the paired controller. Choose Inventory > Device Management > Network Devices
> Device Type > Wireless Controller > Controller > Device Details > Redundancy > Redundancy
States to view these details.
RF_SWITCHOVER_ACTIVITY
MIB Name
ciscoRFSwactNoti
Alarm Condition
Prime Infrastructure
Message
Symptoms
This notification is sent by the active controller when the switch over activity is triggered
Severity
Critical
Category
Controller
Probable Causes
When the primary controller crashes or reboots, the switch over occurs and the secondary
controller becomes active
Recommended Actions
None
RF_PROGRESSION_NOTIFY
MIB Name
ciscoRFProgressionNotif
Alarm Condition
24-11
Chapter 24
Prime Infrastructure
Message
1.
2.
3.
Symptoms
This notification is sent by the active controller when the peer state changes from Disabled to
StandbyCold, and then to StandbyHot
Severity
Critical
Category
Controller
Probable Causes
1.
2.
3.
RF_HA_SUP_FAILURE_EVENT
MIB Name
ciscoRFSupHAFailureEvent
Alarm Condition
Prime Infrastructure
Message
Redundancy Failure Event trap triggered by controller IP addr for the reason {1}
Symptoms
This notification is sent when the Redundancy fails due to the discrepancy between the active and
the standby controllers
Severity
Major
Category
Controller
Probable Causes
None
Recommended Actions
None
Step 2
In the Other Background Tasks area, select the Redundancy Status background task.
24-12
OL-32122-01
Chapter 24
Step 3
Step 4
Click Go.
When traps are missed by the Prime Infrastructure, you must run this background task to complete the
following:
Swap the network route table entries with the peer network route table entries.
Once the Redundancy pair-up process is completed, the Redundancy state for the active controller
becomes Paired and the standby controller is removed from the Prime Infrastructure.
Step 2
In the Device Group area, expand Device Type, then expand Wireless Controller.
Step 3
Select the primary or active controller. The details of the controller appear in the lower part of the page.
Step 4
Step 5
From the left sidebar menu, choose Redundancy > Global Configuration. The Global Configuration
details page appears.
Step 6
In the Peer Service Port IP field, enter the IP address of the peer service port.
Step 7
In the Peer Service Netmask IP field, enter the IP address of the peer service subnet mask.
Step 8
Click Save.
Step 2
In the Device Group area, expand Device Type, then expand Wireless Controller.
Step 3
Select the primary controller for which you have configured the redundancy-management interface IP
address. The details of the controller appear on the lower part of the page.
24-13
Chapter 24
Step 4
Step 5
From the left sidebar menu, choose Redundancy > Peer Network Route.
Step 6
From the Select a command drop down list, choose Add Peer Network Route.
Step 7
Step 8
Step 9
Step 2
In the Device Group area, expand Device Type, then expand Wireless Controller.
Step 3
Select the controller for which you want to disable the redundancy. The details of the controller appear
in the lower part of the page.
Step 4
Step 5
From the left sidebar menu, choose Redundancy > Global Configuration. The Global Configuration
details page appears.
Step 6
Unselect the Enabled check box for the Redundancy Mode to disable the Redundancy on the selected
controller.
Step 7
When you disable redundancy on the controller, both active and standby controllers reboot. You must
refresh the configuration from the device to remove any audit mismatches in the Redundancy
parameters. The active controller becomes a standalone controller and the standby controller reboots
with all of the ports disabled.
24-14
OL-32122-01
CH A P T E R
25
Types of Groups
You can use groups to filter views of devices and their associated alarms, control which network
topology to view, and perform bulk operations (such as configuration changes and software updates) on
sets of devices. Grouping not only saves you time when configuring multiple devices, but it also ensures
that configuration settings are applied consistently across your network.
Prime Infrastructure provides the following types of grouping:
Device type groupsBy default, Prime Infrastructure creates rule-based device groups and assigns
devices to the appropriate Device Type folder. You cannot edit these device groups. You can view
the rules for a device group by hovering your mouse cursor over the device group folder. The device
type groups are not used for network topology maps.
User defined groupsCreate your own device groups based. These groups can be static or dynamic.
See Creating Device Groups.
Location groupsCreate location-based groups. For example, if you have devices that reside in
different time zones, you can create location groups based on geographic regions so that the devices
in one group can have a different time zone setting from the devices in another group. See Using
Location Groups.
Port groupsCreate port groups to simplify monitoring and configuring ports. See Creating Groups
of Ports.
In smaller deployments where all devices can be configured with the same settings, you may only need
to create one general device group. This setup allows you to configure settings for the group, and then
apply those settings consistently across all of your devices.
Note
You cannot control which users have access to which device groups. All users can see all device groups.
For role-based access control (RBAC), you need to create sites and virtual domains.
25-1
Chapter 25
StaticCreate and name a new device group to which you can add devices using the Add to Group
button from Inventory > Device Management > Network Devices > Groups & Sites.
DynamicCreate and name a new device group and specify the rules to which devices must comply
before they are added to this device group. You do not add devices to dynamic groups. Prime
Infrastructure adds devices that match the specified rules to the dynamic group from Inventory >
Grouping > Location & Device.
MixedCreate and name a new device group to which you can add devices manually and specify
the rules to which devices must comply before they are added to this device group from Inventory
> Grouping > Location & Device.
Before you create a device group, make sure that you understand the unique properties that you want the
group to contain. For example, you may want to set up two device groups that have different
authentication settings or different time zone settings.
Note
While there is no limit to the number of rules that you can specify for a dynamic group, as the number
of rules increases, the group update performance could become slower.
To create a device group, follow these steps:
Step 1
Choose Inventory > Device Management > Network Devices or Inventory > Grouping > Location
& Device.
Step 2
In the Device Groups pane on the left, click the Create User Defined Group icon.
Step 3
Enter the group name and group description, and select a parent group, if applicable.
Step 4
Step 5
To create a dynamic group, in the Add Devices Dynamically group box, specify the rules that you want
to apply to the devices in the group. Click Preview to view the devices that are automatically added to
the group based on the specified rule and the manually added devices.
Note
Step 6
You can create a rule using the UDF labels defined in Administration > System Settings > User
Defined Field.
To create a static group, in the Add Devices Manually group box, click Add, then choose the
devices that you want to assign to the group.
Click Save to add the device group with the settings that you specified.
The device group that you created appears under the user-defined groups.
25-2
OL-32122-01
Chapter 25
Choose Inventory > Grouping > Location & Device or Inventory > Device Management > Network
Devices.
Step 2
In the Device Groups pane on the left, click the Create Location Group icon.
Step 3
Enter the group name and group description, and select a parent group, if applicable.
Step 4
In the Add Devices Dynamically group box, specify the rules that you want to apply to the devices in
the group.
Step 5
In the Add Devices Manually group box, choose the devices that you want to assign to the group.
Step 6
Click Preview to view the devices that are automatically added to the group based on the specified rule
and the manually added devices.
Step 7
Click Save to add the device group with the settings that you specified.
Choose the group from the Device Groups pane on the left.
Step 2
Step 3
25-3
Chapter 25
Step 4
Choose the group from the Device Groups pane on the left.
Step 2
Choose the Duplicate Group option in the quick view and update the device details.
Step 3
Step 4
Note
If you duplicate a child group, a copy of child group is created under the same parent group.
Choose the group from the Device Group pane on the left.
Step 2
Step 3
User Defined GroupWhen you create a child group under a parent device group, the devices
accessible to the child group depend on the device group that you create:
If the parent and child group are both dynamic device groups, the child group can access the
25-4
OL-32122-01
Chapter 25
If the parent group is a static device group and the child group is a dynamic group, the child
device group.
Location GroupThe parent group is a superset of all the child groups and inherits the child group
devices.
You created a static group and have not added devices to the group.
You created a dynamic group in which no devices matched the rules that you specified for the
dynamic group.
By default, Prime Infrastructure displays empty groups. If you do not want to display empty groups,
choose Administration > System Settings > Grouping, then unselect Display groups with no
members check box.
StaticCreate and name a new port group to which you can add interfaces using the Add to Group
button from Inventory > Grouping > Port.
DynamicCreate and name a new port group and specify the rules to which ports or interfaces must
comply before they can be added to this port group.
Note
While there is no limit on the number of rules that you can specify for a dynamic group, as the
number of rules increases, the group update performance could become slower.
Step 2
In the Port Groups pane on the left, click the Create Group icon.
Step 3
Step 4
25-5
Chapter 25
Step 5
DynamicYou specify the rules to which ports must comply before they are added to this port
group. You do not add ports to dynamic groups. Prime Infrastructure adds ports that match the
specified rules to the dynamic group.
Click the ports that you want to add to the port group, click Add to Group, then choose the port group
from the Select Group list and click Save.
Step 2
In the Port Groups pane on the left, click the Create Group icon.
Leave the default Parent Group text box entry as User Defined.
Step 3
Enter a group name and description, then select whether the group is static or dynamic:
DynamicYou specify the rules to which ports must comply before they are added to this port
group. You do not add ports to dynamic groups. Prime Infrastructure adds ports that match the
specified rules to the dynamic group.
The port group that you created appears under the User Defined folder.
Step 4
If you created a static port group, add the ports to the group by clicking Add to Group, choosing the
port group from the Select Group list and clicking Save.
If you are deleting a static port group, make sure that it does not contain any subgroups or members. If
you are deleting a dynamic port group, make sure that it does not contain any subgroups; however, the
dynamic group can be associated with members.
To delete a port group follow these steps:
Step 1
Step 2
Hover your mouse cursor over the name of the name of the port group that you want to delete, then click
Delete Group.
25-6
OL-32122-01
PART
CH A P T E R
26
26-1
Chapter 26
Note
1.
Make sure your devices were successfully added to Prime Infrastructure as explained in Validating
That Devices Were Added Successfully.
2.
Create device groups. See Types of Groups. Any devices that you do not assign to a group will
appear under the Unassigned device group.
If you attempt to view a map with more than 500 devices, a warning appears asking if you want to
continue and that it might take longer to display the map.
OverviewDisplays an overview window in lower right corner of the topology window, which
shows the full map and, if you have zoomed in on the map, the currently viewable portion of the map.
SearchTo find a specific device in your network topology, enter a device hostname or IP address,
or substring, for the device in the topology Search field. If a device was moved from its initial
deployed location but is still on the network, you can use the network topology search to locate the
device.
Tip
To show the interface and link status for a created link, click on the created link that connects one more
managed devices, then click Edit Interface Assignment to assign the link to the appropriate interface
on the managed device.
26-2
OL-32122-01
Chapter 26
Click on a device group icon, then in the summary panel that appears, click Drill Down Group.
From the Device Group navigation pane, find the group in the hierarchy and click on the group
name.
In addition to the summary information, you can also click on a device or group icon, or a link to get
additional tools, such as the device 360 view.
If a device has an alarm associated with it, an alarm badge is displayed on the device icon on the
topology map. The color of the alarm badge corresponds with the alarm severityminor (yellow),
major (orange), or critical (red)and matches the alarms displayed in the Alarm Browser.
A link down alarm generates an alarm badge on a connector or associated link in the topology map.
After the link up alarm is received, the connector and link alarms and corresponding badges are
cleared.
The alarm badges on group icons represent the most severe alarm currently active for any object in
the group.
26-3
Chapter 26
Step 1
Step 2
Select the device group, in either the All Locations folder or the User Defined folder, which you want to
view the network topology. If you did not previously create device groups, all devices will appear in the
Location > Unassigned folder.
Icons appear on the devices and links indicating critical, major, minor alarms associated with that device
or link. See Topology Map Icons for more information.
Step 3
Click on a device to view the device summary information (such as host name, IP address, and alarm
summary). You can also launch the Device 360 view for additional device information.
Step 4
Click on a link to view the summary information about the link, showing the devices and ports or
interface to which the link is connected.
Step 5
Click on the link connect icon (a green ball at the end of any link) to view the name and status of the
interface to which the link is connected.
Step 2
To modify the hop count, click the Edit icon and select a new value from the Hops pulldown menu.
Choose Dashboards, then select the dashboard to which you want to add the topology dashlet.
Step 2
Click the Settings icon (see Figure 7-3), then choose Add Dashlet(s).
Step 3
Click Add next to the Network Topology dashlet. You can drag and drop the topology dashlet to the
desired location in the dashboard.
Step 4
Edit the dashlet to enter a title and select the device group for which you want to display its topology.
26-4
OL-32122-01
CH A P T E R
27
Inventory > Device Management > Network DevicesIf a site has been previously created, you
can add devices to the site by clicking Groups & Sites > Add to Site.
Creating Sites
You can create sites by:
Automatically creating a site tree map based on the hostnameSee Using the Automatic Hierarchy
to Create Maps.
27-1
Chapter 27
Step 1
Step 2
Choose Select a command > New Campus/Site or New Building, then click Go.
Step 3
Complete the required fields, then click OK. See Importing Site Map Data for information about
importing site map information.
Table 27-1
Step 1
Step 2
Step 3
Step 4
Format
Description
XML
A TAR GZIP or ZIP file containing definitions of all Prime Infrastructure map data,
including images and calibration data.
AP/Wifi TDOA Received/Chokepoint A CSV file exportable from Cisco WCS 7.0.
Placement files
WLSE Map and AP Location Data
An encrypted XML file exportable by Cisco Wireless LAN Solution Engine (WLSE).
Related Topic
Image resolutionFor higher zoom, use an image that has at least one dimension (X or Y)
exceeding 4096. For example, (4096 x 2160), (3072 x 8192), or (15360 x 25600). Higher the image
resolution, more will be the zoom levels. Lower image resolution can provide only 3 zoom levels.
There are no restrictions on the supported image resolution. For example, 100 Mega Pixel and 1
Giga Pixel. Image resolutions that are higher than 1 Giga Pixel are also accepted depending on the
memory availability.
27-2
OL-32122-01
Chapter 27
Files with lower resolution that are used by existing maps can provide 3 or 4 zoom levels
depending on the dimensions.
Note
RGB settingsImages must have the color space set to RGB. These images must be in eight bit
depth or higher. Otherwise, they will appear black on the floor.
Gamma settingsThe black and white images with gamma settings set to maximum and after tile
cutting, will appear black on the floor. Such issues cannot be auto-corrected because the images will
loose resolution and boundaries. These images must be opened in an image editor and the RGB color
space must be added. You may also need to adjust the white balance depending on the image
histogram and convert the image to eight bit or higher.
CAD file format must be AutoCAD version 2010 or earlier. Before you save a CAD file, ensure the
following:
Zoom images to maximum.
Remove unwanted layers from the CAD files, that is, layers that add unnecessary artifacts to
CAD files and layers that do not provide significant information about the image on the CAD
files.
If the GPS marker is greater than 20m/65ft, a warning message appears when you save a map. To
address this issue, use the AutoCAD image with correct drawing scale and import into Prime
Infrastructure, and then apply the GPS markers.
Note
You can specify multiple rules for the same subnet, allowing you to (for example) specify multiple
monitoring data sources or VLANs.
To associate endpoints with a site:
Step 1
Choose Services > Application Visibility & Control > Endpoint Association.
Step 2
Step 3
Complete the fields as required. See Table 27-2 for field descriptions.
Step 4
Click Save.
27-3
Chapter 27
Table 27-2
Field
Description
Site
Subnet
Enter the routing prefix (and optional Data Source and VLAN) of the subnetwork to be associated with
this site. The entry must be in Classless Inter-Domain Routing notation.
Data Source
Select the edge router or NAM monitoring traffic to and from the devices in the specified subnetwork.
VLAN
Adding Google Earth Location Launch Points to Access Point Pages, page 27-10
Creating and Importing Coordinates in Google Earth (KML File), page 27-5
Note
Adding an AP to Google Earth map without having the AP associated on a standard map, you do not see
any heatmap when you view the AP in Google Earth.
Longitude (East or West)Angular distance in degrees relative to Prime Meridian. Values west of
Meridian range from 180 to 0 degrees. Values east of Meridian range from 0 to 180 degrees. The
default is 0.
Coordinates in degrees, minutes, seconds, direction:
27-4
OL-32122-01
Chapter 27
Latitude (North or South)Angular distance in degrees relative to the Equator. Values south of the
Equator range from 90 to 0 degrees. Values north of the Equator range from 0 to 90 degrees. The
default is 0.
Coordinates in degrees, minutes, seconds, direction:
Degrees (90 to 90)
Minutes (0 to 59)
Seconds (00.00 to 59.99)
DirectionNorth or South (N, S)
AltitudeHeight or distance of the access point from the surface of the earth in meters. If not
provided, value defaults to 0. Values range from 0 to 99999.
TiltValues range from 0 to 90 degrees (cannot be negative). A tilt value of 0 degrees indicates
viewing from directly above the access point. A tilt value of 90 degrees indicates viewing along the
horizon. Values range from 0 to 90. The default azimuth angle is 0.
RangeDistance in meters from the point specified by longitude and latitude to the point where the
access point is being viewed (the Look At position) (camera range above sea level). Values range
from 0 to 999999.
HeadingCompass direction in degrees. The default is 0 (North). Values range from 0 to 180
degrees.
Altitude ModeIndicates how the <altitude> specified for the Look At point is interpreted.
Clamped to groundIgnores the <altitude> specification and places the Look At position on
27-5
Chapter 27
Step 2
In the Places page on the left sidebar menu, choose My Places or Temporary Places.
Step 3
Right-click Temporary Places and select Add > Folder from the drop-down lists.
Note
Step 4
By using a KML file, folders can be created hierarchically to any depth. For example, you can
create folders and placemarks organized by country, city, state, zip.
This is not applicable for CSV. In CSV there can be only one level of hierarchy.
NameFolder name
DescriptionFolder description
Note
Step 5
If the View coordinates (latitude, longitude, range, heading, and tilt) are specified, this
information is used to fly or advance to the correct location when Google Earth is first
loaded.
If no coordinates are specified, the latitude and longitude information is derived using the
minimum and maximum latitude and longitude of all access points within this group or
folder.
Click OK to save the folder. After the folder is created, it can be selected from the Places page to create
Placemarks.
Step 2
In the Places page on the left sidebar, select My Places or Temporary Places.
Step 3
Step 4
Right-click your created folder and select Add > Placemark from the drop-down lists.
Step 5
NameThe Placemark name must contain the name, MAC address, or IP address of the appropriate
access point.
Note
The MAC address refers to base radio MAC not Ethernet MAC.
LatitudeProvides the current coordinate for the folder if the placemark is created inside the folder
or the coordinate for the placemark (if not created inside a folder). This field is automatically filled
depending on where the yellow Placemark icon is located on the map. Use your mouse to move the
Placemark to the correct location or enter the correct coordinate in the Latitude text box.
LongitudeProvides the current coordinate for the folder if the placemark is created inside the
folder or the coordinate for the placemark (if not created inside a folder). This field is automatically
filled depending on where the yellow Placemark icon is located on the map. Use your mouse to move
the Placemark to the correct location or enter the correct coordinate in the Longitude text box.
27-6
OL-32122-01
Chapter 27
ViewAllows you to configure the Latitude, Longitude, Range, Heading and Tilt coordinates. See
the Understanding Geographical Coordinates for Google Earth section on page 27-4 for more
information on these geographical coordinates.
Longitude and latitude are automatically filled depending on where the yellow Placemark icon
is located on the map. Use your mouse to click and move the Placemark to the correct location.
All of the coordinates can be entered manually.
AltitudeEnter the altitude in meters in the text box or use the Ground to Space slide bar to indicate
the altitude.
Clamped to groundIndicates that the Look At position is on the ground. This is the default.
Relative to groundInterprets the <altitude> as a value in meters above the ground.
AbsoluteInterprets the <altitude> as a value in meters above sea level.
Extend to groundFor Relative to ground or Absolute settings, indicates whether or not the
When all coordinates are entered, click Snapshot current view or click Reset to return the coordinates
to the original settings.
Note
For more information regarding Google Earth, see to the Google Earth online help.
Step 7
Click OK.
Step 8
Step 9
When all placemarks are created, save the folder as a .kmz file (KML Zip file) or as a .kml file.
Note
Note
To save the folder, right-click the folder, select Save as from the drop-down list, navigate to the
correct location on your computer, and click Save. Both .kmz and .kml files can be imported into
the Prime Infrastructure.
Open a flat file and provide the necessary information as a comma-separated list. The Table 27-3 lists
the potential data, whether the data is optional or required, and the parameters of the data.
Note
For more information regarding the geographical coordinates listed in Table 27-3, see the
Understanding Geographical Coordinates for Google Earth section on page 27-4.
27-7
Chapter 27
Table 27-3
Step 2
Folder Name
Value Optional
Max Length: 32
FolderState
Value Optional
FolderLongitude
Value Optional
Range: 0 to 180
"FolderLatitude"
Value Optional
Range: 0 to 90
FolderAltitude
Value Optional
Range: 0 to 99999
FolderRange
Value Optional
Range: 0 to 99999
FolderTilt
Value Optional
Range: 0 to 90
FolderHeading
Value Optional
Range: 0 to 180
FolderGeoAddress
Value Optional
FolderGeoCity
Value Optional
Max Length: 64
FolderGeoState
Value Optional
Max Length: 40
FolderGeoZip
Value Optional
Max Length: 12
FolderGeoCountry
Value Optional
Max Length: 64
AP_Name
Value Required
Max Length: 32
AP_Longitude
Value Required
Range: 0 to 180
AP_Latitude
Value Required
Range: 0 to 90
Save the .csv file. The file is now ready to import into the Prime Infrastructure.
Step 2
Step 3
From the Select a command drop-down list, choose Import Google KML or Import CSV.
Step 4
Click Go.
Step 5
Use the Browse button to navigate to the .kml, .kmz, or .csv file on your computer.
Step 6
When the file name path is displayed in the text box, click Next.
The input file is parsed and validated for the following:
Access points specified in the uploaded file are validated (the specified access points must be
available within the Prime Infrastructure).
Range validations are performed for tilt, heading, range, and other geographical coordinates fields.If
longitude and latitude are provided, range validations are performed; if not, the value is defaulted to
0.
27-8
OL-32122-01
Chapter 27
Step 7
Note
In KML, the longitude and latitude ranges can only be entered in decimal format. In CSV,
different formats are supported (see the CSV sample under Google Maps > Import CSV).
Note
If the input file does not validate for completeness, an error page appears. The uploaded
information cannot be saved until all errors are corrected.
After the files pass all validation checks, review the file details and click Save.
If the uploaded information was saved previously, the information is overwritten accordingly:
If the folder was uploaded previously, the coordinates are updated for the folder.
If access points were uploaded previously, the coordinates are updated for the access points.
New folders, as needed, are created and access points are placed accordingly.
Step 2
Choose Monitor > Google Earth Maps. The Google Earth Maps page displays all folders and the
number of access points included within each folder.
Step 3
Click Launch for the map you want to view. Google Earth opens in a separate page and displays the
location and its access points.
Note
To use this feature, you must have Google Earth installed on your computer and configured to
auto-launch when data is sent from the server. You can download Google Earth from the Google
website: http://www.google.com/earth/index.html.
In the Google Earth Map page, click the folder name to open the details page for this folder. The Google
Earth Details provide the access point names and MAC or IP addresses.
Note
To delete an access point, select the applicable check box and click Delete.
To delete the entire folder, select the check box next to Folder Name and click Delete. Deleting
a folder also deletes all subfolders and access points inside the folder.
27-9
Chapter 27
Step 2
Step 2
In the Access Point summary page, click the Edit View link next to page heading.
Step 3
In the Edit View page, highlight Google Earth Location in the left-hand column. Click Show.
The Google Earth Location column heading moves into the View Information column.
Note
Step 4
The View Information listings, top-to-bottom, reflect the left-to-right order of the columns as they
appear on the Access Point summary page.
To change the display order of the columns, highlight the Google Earth Location entry and click the Up
and Down buttons as needed. Click Submit.
You are returned to the Access Points summary page, and a Google Earth launch link is in the display.
Note
The launch link also appears in the general summary page of the Access Points details page
(Monitor > Access Points > AP Name).
Step 2
Caution
Refresh SettingsSelect the Refresh from Network check box to enable this on-demand refresh.
This option is applied only once and then disabled.
Because this refresh occurs directly from the network, it could take a long period of time to collect data
according to the number of access points.
27-10
OL-32122-01
Chapter 27
LayersLayer filters for access points, access point heat maps, and access point mesh information
can be selected and saved. Select the check box to activate the applicable layer and click > to open
the filter page.
Note
These settings apply when Google Earth sends the request for the next refresh.
Access PointsFrom the AP Filter drop-down list, choose to display channels, Tx power level,
coverage holes, MAC addresses, names, controller IP, utilization, profiles, or clients.
Note
If the access point layer is not checked, no data is returned, and an error message is
returned to Google Earth as a Placemark without an icon.
AP HeatmapFrom the Protocol drop-down list, choose 802.11a/n, 802.11b/g/n, 802.11a/n &
802.11b/g/n, or None. Select the cutoff from the RSSI Cutoff drop-down list (- 60 to - 90 dBm).
Note
If the protocol chosen is both 802.11a/n and 802.11b/g/n, the heat maps are generated
for both and overlaid on top of each other. The order cannot be defined. To prevent this
overlay, you must turn off individual overlay in Google Earth or change it in the Google
Earth Settings on the Prime Infrastructure.
AP Mesh InfoChoose Link SNR, Packet Error Rate, or none from the Link Label drop-down
list. Choose Link SNR or Packet Error Rate from the Link Color drop-down list.
Note
Step 3
When the AP Mesh Info check box is chosen, Mesh Links are also automatically shown.
Click Save Settings to confirm these changes or Cancel to close the page without saving the changes.
Note
To use the Automatic Hierarchy Creation feature, you must have an established naming pattern for your
wireless access points that provides the campus, building, floor, or outdoor area names for the maps.
For example, San Jose-01-GroundFloor-AP3500i1.
Step 1
Choose Maps > Wireless Maps > Automatic Hierarchy Creation to display the Automatic Hierarchy
Creation page.
Step 2
In the text box, enter the name of an access point on your system. Or, you can choose one from the list.
27-11
Chapter 27
To update a previously created regular expression, click Load and Continue next to the
expression and update the expression accordingly. To delete a regular expression, click Delete
next to the expression.
Note
Step 3
Click Next.
Step 4
If your access points name has a delimiter, enter it in the text box and click Generate basic regex based
on delimiter. The system generates a regular expression that matches your access points name based
on the delimiter.
For example, using the dash (-) delimiter in the access point name San Jose-01-GroundFloor-AP3500i1,
produces the regular expression /(.*)-(.*)-(.*)-(.*)/.
If you have a more complicated access point name, you can manually enter the regular expression.
Note
You are not required to enter the leading and trailing slashes.
Note
Step 5
Click Test. The system displays the maps that will be created for the access point name and the regular
expression entered.
Step 6
SJC
2.
14
3.
4.
AP-BREAK-ROOM
Building
2.
Device Name
3.
Floor
27-12
OL-32122-01
Chapter 27
4.
Campus
Automatic Hierarchy Creation produces a campus named SanFrancisco, a building under that campus
named EastLab, and a floor in EastLab named 3.
Note
The two hierarchy types, Not in device name and Device have no effect, but enable you to skip groups
in case you need to use a matching group for some other purpose.
Automatic Hierarchy Creation requires the following groups to be mapped in order to compute a map on
which to place the access point:
Campus group present Building group
in match?
present in match?
Yes
Yes
Yes
Yes
Yes
No
Failed match
Yes
No
Yes
Yes
No
No
Failed match
No
Yes
Yes
No
Yes
No
Failed match
No
No
Yes
Failed match
No
No
No
Failed match
Automatic Hierarchy Creation attempts to guess the floor index from the floor name. If the floor name
is a number, AHC will assign the floor a positive floor index. If the floor name is a negative number or
starts with the letter B (for example, b1, -4, or B2), AHC assigns the floor a negative floor index. This
indicates that the floor is a basement.
When searching for an existing map on which to place the access point, AHC considers floors in the
access points building with the same floor index as the access points name.
For example, if the map SF > MarketStreet > Sublevel1 exists and has a floor index of -1, then the access
point SF-MarketStreet-b1-MON1 will be assigned to that floor.
Step 7
Click Next. You can test against more access points. You may test your regular expression and matching
group mapping against more access points by entering the access point names in the Add more device
names to test against field, and clicking Add.
You then click Test to test each of the access points names in the table. The result of each test is displayed
in the table.
If required, return to the previous step to edit the regular expression or group mapping for the current
regular expression.
Step 8
Note
Click Next, then click Save and Apply. This applies the regular expression to the system. The system
processes all the access points that are not assigned to a map.
You can edit the maps to include floor images, correct dimensions, and so on. When Automatic
Hierarchy Creation creates a map, it uses the default dimensions of 20 feet by 20 feet. You will need to
edit the created maps to specify the correct dimensions and other attributes.
27-13
Chapter 27
Maps created using Automatic Hierarchy Creation appear in the maps list with an incomplete icon. Once
you have edited a map, the incomplete icon disappears. You may hide the column for incomplete maps
by clicking the Edit View link.
27-14
OL-32122-01
PART
Troubleshooting Applications
Using Mediatrace
CH A P T E R
28
Configuring Interfaces
Configuring DMVPN
Configuring GETVPN
Add or edit the device in Prime Infrastructure to use SSHv2 (rather than Telnet) as the management
transport protocol.
a.
When you add the device with automatic discovery, enter the SSH credentials.(Adding Devices
Using Discovery.)
28-1
Chapter 28
b.
Step 2
Step 3
When you add the devices manually (Adding Devices Manually), in Step 2, select SSH2 as the
protocol.
If the device is also managed by Prime Infrastructure which is not configured to use SSH2, edit the
device credentials:
a.
b.
c.
d.
Click Update.
Activate a WSMA profile on the device by configuring a WSMA configuration profile as follows:
#configure terminal
wsma agent config profile PIwsmaConfigServiceSSH
#exit
#wsma profile listener PIwsmaConfigServiceSSH
no wsse authorization level 15
transport ssh subsys wsma-config
#exit
For more information about WSMA, see the WSMA Configuration Guide.
Step 4
Configure a configuration archive, which will be used by WSMA for handling transactional
configurations and rollbacks by using the following CLI commands on the device:
#configure terminal
archive
log config
hidekeys
path flash:roll
maximum 5
#end
For more information about configuration archives, see the Cisco IOS Configuration Fundamentals
Command Reference Guide.
ASR 1000 series platform from Cisco IOS-XE Release 15.3(1)S1 or later
ISR 4300 and 4400 series platform from Cisco IOS-XE Release 15.3(2)S or later
28-2
OL-32122-01
Chapter 28
Application Visibility is configured differently on different platforms and IOS releases. Newer IOS
releases provide new mechanisms with better performance for setting up the Application Visibility and
Control (AVC). Thus when upgrading an ASR 1000, CSR or ISR 4400 platforms running IOS-XE
release prior to 15.4(1)S to an IOS-XE release 15.4(1)S or later, or when upgrading an ISR-G2 platform
running IOS release prior to 15.4(1)T to IOS release 15.4(1)T or later, we recommend that you
re-configure the AVC on these devices.
To simplify configuration, the Application Visibility feature is split into four types of metric and
NetFlow reports:
Report
Description
Traffic Statistics
Voice/Video Metrics
Activating the Application Visibility feature can impact device performance. To minimize the potential
impact, the template allows you to select the traffic interfaces to monitor and the reports to generate.
To configure application visibility in your network:
1.
(Optional) Set up WSMA on the devices to assure that the devices is configured via the WSMA
protocol, rather than CLI (for more information, see Configuring the Device using WSMA). WSMA
provides a more robust configuration mechanism.
2.
Make sure that your devices are running an up-to-date NBAR protocol packs (see NBAR Protocol
Packs).
3.
Estimate the potential resources impact on the device (CPU and memory) before activating
application visibility on the device (for more information, see Activating or Deactivating a
Troubleshooting Session).
Activate application visibility on the device, either by creating a template and pushing it across the
network (for more information, see Creating an Application Visibility Template), or by enabling AVC
on an interface from the Device Work Center (see Enabling Default Application Visibility on an
Interface).
28-3
Chapter 28
cevModuleASR1000ESP5
cevModuleASR1000ESP10
cevModuleASR1000ESP20
cevModuleASR1001ESP
cevModuleASR1002FESP
Choose Services > Application Visibility and Control > Readiness Assessment.
Step 2
In the Interface column for the device that you want estimates on, click the down arrow icon.
The list shows only those interfaces supporting Application Visibility capability.
Step 3
Select Internet Profile or Enterprise Profile. The device resource estimation is based on a typical
traffic profile. Select Internet Profile for typical service-provider traffic, or Enterprise Profile for a
typical enterprise-traffic.
Step 4
Select the interfaces for which you want to estimate the resource utilization.
Speeds shown are those currently configured for each interface. If you want to base the estimate on a
different speed, click Speed (Mbps) and enter a different value.
Step 5
28-4
OL-32122-01
Chapter 28
Choose Configuration > Templates > Features & Technologies > Application Visibility > AVC
Configuration.
Step 2
In the Template Basic area, enter a unique name and a description in the appropriate fields.
Step 3
In the Validation Criteria area, choose a device type from the list and enter the OS version.
Step 4
In the Template Detail area, choose an Interface Role from the drop-down list. The interface role
designates the group of interfaces on which you can monitor the traffic and produce
Application-Visibility reports. See the Creating an Interface Role section for information about creating
an interface role.
Step 5
In the Traffic Statistics area, you can determine which traffic should be monitored to produce the traffic
statistics reports, select the Off radio button if you do not want to collect the statistics on data packets.
a.
Select the IP address/subnets.You can generate the report only on IPv4 traffic. We recommend to
configure the required minimal set of filter.
28-5
Chapter 28
Step 6
Step 7
In the HTTP URL Visibility area, you can select the traffic that should be monitored to produce the
report. Select the Off radio button if you do not want to collect URL statistics.
a.
Select the IP address/subnets. You can select a specific set of IPv4 addresses or subnets to be
monitored.
b.
Select the application from the drop-down list. You can select a specific set of applications that
should be monitored (there could be up to 32 monitored applications). By default, all of the
enterprise related http-based applications are include in the list.
In the Application Response Time area, you can determine the traffic that should be monitored to
produce the application response time reports. Also, optionally set a sampling option for the reports.
Select the Off radio button if you do not want to collect ART metrics.
a.
Select the IP address/subnets. You can select a specific set of IPv4 addresses or subnets to be
monitored.
b.
Choose the Application from the drop-down list. You can select a specific set of applications that
should be monitored (there could be up to 32 monitored applications). By default, all of TCP traffic
is monitored.
c.
In the Advanced Options, choose the Sampling Rate from the drop-down list. In High scale
environments, collecting performance indicators for every TCP conversation can lead to high
resources consumption on the device. The sampling option provides the ability to further optimize
the resource consumption by collecting the performance indicators for 1 out of every n TCP
conversation. This advanced option can be used to activate sampling and select the sampling rate for
the tool. It is not recommended to activate sampling as activating sampling leads to less accurate
results. Sampling should be used when it is necessary to limit the resource consumption on the
devices.
Note
Step 8
In the Voice/Video metrics area, you can determine the traffic that should be monitored to produce the
voice/video reports. Select the Off radio button if you do not want to collect the voice/video metrics.
a.
Note
b.
Step 9
Sampling option is not applicable for ISR-G2 routers. This option will be ignored for the n
ISR-G2.
Choose the IP address/subnets. You can choose a specific set of IPv4 addresses or subnets to be
monitored.
IP filtering is not supported on the ISR-G2 routers until all UDP traffic is monitored.
Choose the Voice/Video Application from the drop-down list. You can choose a specific set of
applications that should be monitored (there could be up to 32 monitored applications). By default,
all RTP enterprise-related applications are monitored.
28-6
OL-32122-01
Chapter 28
When a device does not have an application visibility configuration deployed on it, or it has a default
application visibility configuration deployed on it (if all metrics are collected with a set of default
parameters), the Device Work Center allows you to enable or disable a default application visibility
configuration on the device by selecting interfaces on the device and enabling or disabling the default
configuration on the interfaces.
Note
When you deploy an application visibility template to the device, the application visibility template
configuration will overwrite the default application visibility configuration that was enabled from the
Device Work Center.
The default configuration collects all the possible visibility metrics on all applicable IPv4 traffic.
Note
Note
Application Visibility is configured differently on the ASR platform running Cisco IOS-XE15.3(1)S1 in
comparison to Cisco IOS-XE15.3(2)S or later releases. After an ASR platform Cisco IOS release is
upgraded from Cisco IOS-XE15.3(1)S1 to Cisco IOS-XE Releases 15.3(2)S and later, we recommend
that you reconfigure Application Visibility on those devices.
To change the default application visibility configuration profile configured on the device, first disable
the Application Visibility policy on all interfaces and then re-enable it on the selected interfaces with the
new profile.
To enable or disable the default application visibility configuration on the specific interface, follow these
steps:
Step 1
Step 2
After choosing the device from list, click Configuration. The Feature Configuration pane appears.
Step 3
Expand the App Visibility & control folder and choose App Visibility.
Step 4
To activate an out-of-the-box AVC profile on an interface, select one or more interfaces then click
Enable App Visibility and select the required profile. If at least one of the non-selected interface is
attached to a different profile, a warning message will be displayed such that all non-selected
interfaces that are attached to a different profile will be detached from that profile.
Use the interfaces list to view the current App Visibility configuration on the device. The column
App Visibility Policy displays the current profile/policy attached to the interface.
Note
In Cisco Prime Infrastructure Release 2.2, the application visibility feature displays the user
defined AVC policy per interface on the application visibility interfaces.
28-7
Chapter 28
If the application visibility control is configured on the interface using the Application Visibility
Template, the template-name will be displayed.
If the application visibility control is configured on interface using the one-click option, the name
of the AVC Profile that was configured will be displayed.
If the application visibility control is configured manually out-of-band by the user via CLI, the name
of the policy-map or performance monitor context that was configured will be displayed.
Note
Note
In Cisco Prime Infrastructure Release 2.2, a visual indication column (App Visibility Status)
provides indication on whether AVC is currently activated on the interface. The column will also
indicate cases when the interface is INCAPABLE of running AVC and cases when AVC is
mis-configured on the interface (e.g. AVC configured to send netflows to servers other than
prime infrastructure).
To Disable any of the Activated AVC profiles on an selected interface, click Disable App Visibility,
check Deactivate App Visibility Troubleshooting if you also wish to deactivate an AVC
troubleshooting policy if such is active on the interface.
When Enabling/Disabling AVC a pop up message will appear before the actual provisioning
takes place. Selecting the CLI preview tab on that popup message will generate the list of CLIs
to be pushed to the device.
Caution
Note
To avoid overloading the server, we recommend that you configure no more than ten active
troubleshooting sessions. Application troubleshooting is not supported on the ISR-G2 platforms.
Troubleshooting sessions are configured differently on the ASR platform running Cisco IOS-XE Release
15.3(1)S1 in comparison to Cisco IOS-XE Release15.3(2)S or later releases. After, an ASR platform
Cisco IOS Release is upgraded from Cisco IOS-XE Release 15.3(1)S1 to Cisco IOS-XE Release
15.3(2)S or later, we recommend that you deactivate and reactivate active troubleshooting sessions on
those devices.
28-8
OL-32122-01
Chapter 28
Choose Services > Application Visibility & Control > Application Troubleshooting.
Step 2
In the AVC Troubleshooting Session page, click Add and enter a session name.
Step 3
In the Source/Destination IPs field, click Edit, and choose the source and destination IP addresses from
the drop-down list. You can select the IP traffic and collect Application Visibility troubleshooting
information for that specific IP traffic. The options are: on all IPv6 traffic or on all IPv4 traffic or on
specific IPv4 addresses/subnets. Also, you can select a list of IP constraint pairs. Each such pair
designates a bi-directional symmetric condition on the source and destination IPs of the traffic. For
example, the pair: Any IPv4 <=> IPv4 subnet 192.168.0.0/16 matches all of the flows from
192.168.0.0/16 to any other IP and vice-versa (all of the flows from any IP address to 192.168.0.0/16).
You can add multiple pair conditions.
Step 4
To add more IP constraints in the format of IP source/destination pairs, click the + icon in the Select
Source Destination dialog box.
Note
The IP addresses on both sides of the pairs should be of the same IP version.
Step 5
Click OK.
Step 6
Step 7
Step 8
Choose the application from the object selector dialog box. When you choose the applications, you can
have a combination of Categories, Sub-categories, Encrypted Applications, and Tunneled Applications
from the available list. A maximum of 32 applications or categories or attributes can be selected
Step 9
Step 10
After the troubleshooting session is activated, click Launch Report to generate the Raw NetFlow report.
Choose Services > Application Visibility & Control > Application Troubleshooting.
Step 2
Choose a troubleshooting session from the list and click Activate or Deactivate.
Step 3
Click Save.
28-9
Chapter 28
Step 1
Choose Services > Application Visibility & Control > Application Troubleshooting.
Step 2
Caution
To avoid overloading the server, we recommend that you configure no more than ten active
troubleshooting sessions.
b.
c.
To delete a troubleshooting session, choose a session from the list and click Delete.
Choose Configuration > Templates > Features & Technologies > Security > VPN Components >
IKE Policies.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a Device Type from the drop-down list and enter the OS version.
For more information about the required field descriptions, see the Cisco Prime Infrastructure 2.2
Reference Guide.
Step 4
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Choose Configuration > Templates > Features & Technologies > Security > VPN Components >
IKE Settings.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
For more information about the required field descriptions, see the Cisco Prime Infrastructure 2.2
Reference Guide.
28-10
OL-32122-01
Chapter 28
Step 4
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Choose Configuration > Templates > Features & Technologies > Security > VPN Components >
IPSec Profile.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
Step 4
In the Template Detail area, click Add Row and enter the required information. A transform set
represents a certain combination of security protocols and algorithms. During the IPsec negotiation, the
peers agree to use a particular transform set for protecting a particular data flow. A transform set
describes a particular security protocol with its corresponding algorithms. For more information about
the required field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Choose Configuration > Templates > Features & Technologies > Security > VPN Components >
Preshared Keys.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a Device Type from the drop-down list and enter the OS Version.
Step 4
In the Template Detail area, click Add Row and enter the required information.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Choose Configuration > Templates > Features & Technologies > Security > VPN Components >
RSA Keys.
28-11
Chapter 28
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
Step 4
In the Template Detail area, click Add and enter the required information.
Step 5
Select the Exportable box to generate RSA as an exportable key, then click OK.
Step 6
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Choose Configuration > Templates > Features & Technologies > Security > VPN Components >
Transform Sets.
Step 2
In the Template Basic area, enter a name, description, and tag for your template in the appropriate text
boxes.
Step 3
In the Validation Criteria area, choose a device type from the drop-down list and enter the OS version.
Step 4
In the Template Detail area, click Add Row and enter the required information.
Note
Step 5
The ESP encryption algorithm is used to encrypt the payload, and the integrity algorithm is used
to check the integrity of the payload.
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Cisco IOS router that supports the Cisco Unity Client Protocol
28-12
OL-32122-01
Chapter 28
After the Cisco Easy VPN server is configured, a VPN connection is created with minimal configuration
on an Easy VPN remote, such as a Cisco 800 series or 2800 series router. When the Easy VPN remote
initiates the VPN tunnel connection, the Cisco Easy VPN server pushes the IPsec policies to the Easy
VPN remote and creates the corresponding VPN tunnel connection.
Choose Configuration > Templates > Features & Technologies > Security > Easy VPN Server Proxy
Setting.
Step 2
Step 3
Step 4
In the Template detail area enter a name, and choose the settings that you want to associate with the
group.
Step 5
Choose the No Proxy Server option or Automatically Detect Proxy Settings option if you want the clients
in this group to automatically detect a proxy server when they use the VPN tunnel.
Step 6
Choose the Manual Configuration option to manually configure a proxy server for clients in this group.
If you choose this option, you should manually configure a proxy server.
Step 7
Select the Bypass proxy server for local addresses check box to prevent the clients from using the
proxy server for local (LAN) addresses.
Step 8
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Choose Configuration > Templates > Features & Technologies > Security > Easy VPN Remote.
Step 2
Step 3
Step 4
In the Easy VPN Remote Interface Configuration area, enter the required information.For more
information about the required field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
28-13
Chapter 28
Step 5
In the Easy VPN Remote connection characteristics area, enter the required information.For more
information about the required field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
Note
If you enable identical addressing, you must first configure Easy VPN Remote in network
extension mode.
Step 6
Step 7
In the Remote Firewall Settings area, set the firewall settings for the Easy VPN Remote connection.
Step 8
Step 9
Navigate to the My Templates folder and choose the template that you just saved.
Step 10
Click the Publish icon in the top-right corner, then click OK.
Step 11
Create a composite template (Creating Composite Templates), and add the ACL and Easy VPN Remote
templates to the composite template.
Step 12
Use the arrows buttons to arrange the templates in the order in which they should be deployed to the
devices. For example, to create an ACL and associate it with an interface, put the ACL template first,
followed by the EasyVPN Remote template.
Step 13
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Do the following:
Create AAA method list for the group and the user by using the CLI template
(Optional) Create a CLI template for RADIUS server group creation or configure the RADIUS
server while creating the AAA method list
(Optional) Create an ACL template for the split tunnel ACL in the ISAKMP Group configuration
Choose Configuration > Templates > Features & Technologies > Security > Easy VPN Server.
Step 2
Step 3
28-14
OL-32122-01
Chapter 28
Step 4
In the Interface Configuration area, choose the configuration methods and complete the fields of the
interface that is configured on the device.
Step 5
In VPN Components Assembly area, enter the Transform Set profile name that you created in the
Transform Set template (Configuring Transform Sets) and complete the fields in this area.
Step 6
In the Group Authorization area, enter the Method List profile name that you created in the CLI template
and complete the fields in this area.
Step 7
In the User Authorization area, enter the same Method List profile name that you created in the CLI
template, and complete the fields in this area.
Step 8
In the ISAKMP Group configuration area, click Add Row to add the ISAKMP Group configuration.
Step 9
In the ISAKMP Group configuration dialog box, enter the ACL profile name that you created in the ACL
template and the Browser Proxy profile name that you created in the Browser Proxy template, and
complete the fields in this area.
Step 10
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Step 11
Create a composite template (Creating Composite Templates) and add the AAA Method List and Radius
server, IPsec Profile (Creating an IPsec Profile Template), ACL Browser Proxy (Creating an Easy VPN
Server Proxy Setting Template), and Easy VPN_ Remote templates in the composite template.
Step 12
Using the arrow icons to arrange the templates in a order in which they should be deployed to the devices.
For example, to create an ACL and associate it with an interface, arrange the ACL template first,
followed by the EasyVPN_Remote template.
Step 13
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Click Configuration > Templates > Features & Technologies > Interfaces > Cellular > GSM Profile.
Step 2
Step 3
Step 4
In the Template Detail area, enter an Access Point Name and choose a profile number from the
drop-down list.
Step 5
Choose the type of authentication that your service provider uses. (CHAP authentication is more secure
than PAP authentication.)
Step 6
Enter the username given to you by your ISP or your network administrator, and enter a password.
Step 7
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Step 8
Click OK.
28-15
Chapter 28
Note
To deploy the Cellular Profile template on any GSM HSPA, HSPA+R7, and LTE-Verizon modem, you
should have the GSM profile (Creating a GSM Profile Template) created on the router.
Step 1
Choose Configuration > Templates > Features & Technologies > Interfaces > Cellular > Cellular
Profile.
Step 2
Step 3
Step 4
In the Template Detail area, define the interface as Primary WAN Interface or Backup WAN Interface
and complete the fields.
Step 5
In the Dialer Configuration area, choose Yes to enable the persistent data connection and complete the
fields.
Step 6
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Step 7
Click OK.
You can configure the ISR so that some approved web traffic is not redirected to ScanSafe for scanning.
When you bypass ScanSafe scanning, the ISR retrieves the content directly from the originally requested
web server without contacting ScanSafe. When ISR receives the response from the web server, it sends
the data to the client. This is called whitelisting traffic.
See the Cisco ISR Web Security with Cisco ScanSafe Solution Guide for more information about
ScanSafe.
Creating a ScanSafe Template
Whitelist information
28-16
OL-32122-01
Chapter 28
Choose Configuration > Templates > Features & Technologies > Security > ScanSafe.
Step 2
In the Template Basic area, enter a name and a description in the appropriate fields.
Step 3
In the Validation Criteria area, choose a device type from the list and enter the OS version.
Step 4
In the Template Detail area, enter the required information. For more information about the required
field descriptions, see the Cisco Prime Infrastructure 2.2 Reference Guide.
Step 5
Click Save as New Template. After you save the template, apply it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Configuring Interfaces
The Interfaces feature helps in setting up physical and logical interfaces. Physical interfaces on a device
depend on the device type and its interface processors or port adapters. IPv4 addressing is supported for
all interfaces including service modules such as WAN, LAN, and logical interfaces. The following
interfaces are supported in this release:
WAN Interfaces
Configuring Controllers
LAN Interfaces
Logical Interfaces
Step 2
After choosing the device from list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
In the Interface page, select the serial interface in the Interface Summary area and click Edit.
Step 5
In the Create or Edit Serial Interface page, enter the basic configuration information.
28-17
Chapter 28
Configuring Interfaces
Step 6
Note
Select the encapsulation type as High Level Data Link Control (HDLC) or Point-to-Point Protocol
(PPP) or Frame Relay. Use the Advance Configuration area to configure the encapsulations.
Step 7
Step 8
For Frame Relay encapsulation, use the IETF option to connect to non-Cisco routers. (The Autosense
feature is supported only on Frame Relay.)
Note
The Autosense feature allows the router to detect the LMI type that is being used, by communicating
with the switch and then uses the same type of LMI.
Step 9
For PPP encapsulation, specify the CHAP and PAP configurations with directions.
Step 10
Click Save. The Interface Summary page displays the modified interfaces.
Step 11
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
In the Interface page, select the POS interface from the Interface Summary area and click Edit.
Step 5
In the Create or Edit POS Interface page, enter the basic configuration information.
Step 6
Select the Enable SPE Scrambling check box to enable the SPE scrambling.
Step 7
Select the Send LAIS when Shutdown check box to send the Line Alarm Indication Signal (LAIS)
when the POS interface is in administrative shut down state.
Step 8
Select the encapsulation type as HDLC or PPP or Frame Relay and use the Advance Configuration area
to configure the encapsulations.
Step 9
Step 10
In the Advanced Configuration area, select the alarm reporting and alarm reporting threshold options to
receive alarms when there is any event.
Step 11
28-18
OL-32122-01
Chapter 28
Step 1
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the service module interface from the Interface Summary area and click Edit.
Step 5
In the Fast Ethernet interface pane, complete the basic configuration information.
Step 6
Configuring Controllers
To create or edit the DSL, SHDSL, and VDSL controllers interface, follow these steps:
Step 1
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the DSL, SHDSL or VDSL controller from the interface summary area and click Edit.
Step 5
Step 6
Click OK. After you configure the controller, you must configure the DSL, SHDSL or VDSL
subinterface.
Step 7
To configure the DSL subinterface, select an ATM interface in the Interface Summary page, and click
Add Subinterface.
Step 8
Step 9
a.
In the Create ATM Sub Interface page, choose the encapsulation from the drop-down list.
b.
c.
Select a dialer to be associated to the ATM subinterface by using the Create or Associate dialer
options.
d.
Click OK.
To configure the SHDL subinterface, select a SHDSL interface in the Interface Summary page, and click
Add Subinterface.
a.
In the Create SHDSL subinterface page, add the DSL Group and select the DSL pair.
b.
c.
Click OK.
To configure the VDSL subinterface, select a VDSL interface in the Interface Summary area, and click
Add Subinterface.
a.
In the Create VDSL subinterface page, choose the Operating Mode from the drop-down list.
b.
c.
Click OK.
28-19
Chapter 28
Configuring Interfaces
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the Gigabit Ethernet or Fast Ethernet in the Interface Summary area, and click Edit.
Step 5
Step 6
Step 7
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Step 5
In the Create or Edit Loopback Interface area, enter the basic configuration information.
Step 6
Step 7
Click OK.
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Step 5
In the Create or Edit VLAN Interface page, complete the basic configuration information.
Step 6
Step 7
28-20
OL-32122-01
Chapter 28
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the VLAN interface from the Interface Summary area, and click Edit.
Step 5
In the Create or Edit VLAN Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After choosing the device, choose Configuration. The Feature Configuration pane appears.
Step 4
Step 5
Step 6
In the Create or Edit Tunnel Interface page, complete the basic configuration information.
Step 7
Step 8
Step 9
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
28-21
Chapter 28
Configuring Interfaces
Step 4
Select the Tunnel interface in the Interface Summary page, and click Edit.
Step 5
In the Create or Edit Tunnel Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Step 5
In the Create or Edit Virtual Template Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Interfaces.
Step 4
Select the Virtual Template interface in the Interface Summary page, and click Edit.
Step 5
In the Create or Edit Virtual Template Interface page, complete the basic configuration information.
Step 6
Step 7
Step 8
28-22
OL-32122-01
Chapter 28
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Interface folder, then click Cellular WAN Interfaces.
Step 4
Step 5
Step 6
a.
Select a cellular interface with CDMA Sprint modem, and click Manage Modem.
b.
In the Manage Modem dialog box, select the OMA-DM or Manual radio button. If you choose the
Manual option, complete the fields to manually configure the CDMA Sprint modem, then click OK.
Select a cellular interface with CDMA Verizon modem, and click Manage Modem.
b.
In the Manage Modem dialog box, enter the Account Activation Information, then click OK.
Select a cellular interface with CDMA Generic modem, and click Manage Modem.
b.
In the Manage Modem dialog box, complete the fields to configure the CDMA Generic Modem, then
click OK.
Step 2
Choose the device from the list or click Add to add a new device, then configure the device.
Step 3
After choosing the device, click Configuration. The Feature Configuration pane appears.
Step 4
Step 5
Step 6
Step 7
Choose the Profile Number from the drop-down list, and enter the Access Point Name, then click OK.
28-23
Chapter 28
NAT Types
NAT operates on a routergenerally connecting only two networks togetherand translates your
private (inside local) addresses within the internal network, into public (inside global) addresses before
any packets are forwarded to another network. This functionality gives you the option to configure the
NAT so that it will advertise only a single address for your entire network to the outside world. Doing
this effectively hides the internal network from the world, giving you additional security.
NAT types include:
Static Address Translation (SAT) Allows one-to-one mapping between local and global
addresses.
OverloadingA form of dynamic NAT that maps multiple unregistered IP addresses to a single
registered IP address (many to one) using different ports. This method is also known as Port Address
Translation (PAT). With PAT, thousands of users can be connected to the Internet using only one real
global IP address.
2.
3.
28-24
OL-32122-01
Chapter 28
Note
Caution
4.
5.
The NAT feature is supported on the following: ASR platform from Cisco IOS Release 3.5 or later and
ISR platform from Cisco IOS Release 12.4(24)T or later.
CLI changes that begin with EMS_ are not supported and might cause unexpected behavior.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security, expand the NAT subfolder, and then click IP
Pools. The NAT Pools page appears.
Step 4
Click Add IP Pool > IP+Prefix or IP Range + Prefix, and enter the Name, IP Address/Range, Prefix
Length, and Description. You cannot change the name of the pool after creating the pool.
Note
Step 5
Click Save to deploy the IP pool to the device, or Cancel to cancel your editing.
Step 6
To edit the existing IP Pool, in the NAT IP Pools page do the following:
Step 7
a.
Click in the selected IP Pools parameters row, and edit the parameters. or
b.
Select the IP Pools, and click Edit. The selected IP Pools opens for editing. You can edit all of the
parameters except the pool name.
Static
Dynamic
Dynamic PAT
28-25
Chapter 28
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security, expand the NAT subfolder, and then click
NAT44 Rules.
Step 4
In the NAT 44 page, click the down arrow icon next to the Add NAT Rule button.
Click Static to create Static Rule. For a description of the elements, see the Cisco Prime
Infrastructure 2.2 Reference Guide.
Click Dynamic to create Dynamic NAT Rule. For a description of the elements, see the Cisco Prime
Infrastructure 2.2 Reference Guide.
Click Dynamic PAT to create Dynamic PAT Rule. For a description of the elements, see the Cisco
Prime Infrastructure 2.2 Reference Guide.
Step 5
Step 6
To edit the existing NAT44 rule in the NAT44 page, do one of the following:
Click the selected NAT44 rules parameters row, and edit the parameters.
Select the NAT44 rule, and click Edit. The selected NAT44 rule opens for editing. You can edit all
of the parameters.
Step 7
You can change the Source and Destination according to the creation rules. You can also change the
Options selection according to the creation rules.
Step 8
Configuring Interfaces
A virtual interface is a logical interface configured with generic information for a specific purpose or for
specific users, plus router-dependent information.
To configure a virtual interface, follow these steps:
Step 1
Step 2
After choosing the device from list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security, expand the NAT subfolder, and then click
Interfaces.
In the Interface page, select the interface that you want to change and choose the association from the
drop-down list. The options are: Inside, Outside, and None.
Step 4
28-26
OL-32122-01
Chapter 28
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After choosing the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security, expand the NAT subfolder, and then click Advanced Settings > Max.
Translation.
Step 5
Reset the parameter values. Configure the maximum number of NAT entries that are allowed for all of
the parameters. A typical range for a NAT rate limit is from 100 to 300 entries.
Step 6
Configuring DMVPN
The DMVPN feature allows you to scale large and small IP Security (IPsec) VPNs by combining generic
routing encapsulation (GRE) tunnels, IPsec encryption, and Next Hop Resolution Protocol (NHRP).
A typical VPN connection is a point-to-point IPsec tunnel connecting two routers. DMVPN enables you
to create a network with a central hub that connects other remote routers, referred to as spokes, using a
GRE over an IPsec tunnel. IPsec traffic is routed through the hub to the spokes in the network.
See Dynamic Multipoint IPsec VPNs (Using Multipoint GRE/NHRP to Scale IPsec VPNs) for more
information about DMVPN (requires a Cisco.com login ID).
Cisco Network Control System allows you to configure your router as a DMVPN hub, DMVPN spoke
or cluster. You can configure the router in the following ways:
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
28-27
Chapter 28
Configuring DMVPN
Step 3
In the Feature Configuration pane, expand the Security folder, and then click DMVPN. Click Add to
create the DMVPN.
Step 4
In the Device Role and Topology Type area, select the topology and the device role. The options are:
Spoke, Hub, and Dynamic Connection between Spokes.
Step 5
In the Multipoint GRE Interface Information area, choose the WAN interface that connects to the
Internet from the drop-down list.
Step 6
Step 7
Note
The Network ID is a unique 32-bit network identifier from a Non Broadcast Multiaccess (NBMA)
network. The tunnel key is used to enable a key ID for a particular tunnel interface. The MTU size of IP
packets that are sent on a particular interface.
Note
The default MTU value for Ethernet and the serial interface is 1500. The default value varies depending
upon the media type. The Tunnel throughput delay is used to set the delay value for a particular interface.
Step 8
In the Encryption policy field, click the anchored plus button (+) to add the Transform Set Profile (see
Security > VPN Components > Transform Sets in the Cisco Prime Infrastructure 2.1 Reference Guide).
Step 9
In the Transform Set Profile dialog box, enter the Name and choose the acceptable combination of
security protocols and algorithm from the drop-down list to configure the transform set.
Step 10
Select the IP Compression check box to enable the IP compression for the transform set.
Step 11
Choose the mode for the transform set. The options are: Tunnel mode or Transport mode.
Step 12
In the NHS Server Information area, enter the IP address for the physical interface of the hub and tunnel
and the Fallback Time. If the device supports the cluster then add the next hop server information, such
as Cluster ID, Max Connection, Hub IP address, and Priority.
Note
Step 13
Note
The NHS server information is required only for spoke configuration. If you select the Use
Cluster for NHS check box, add the information, such as Cluster ID, Max Connection, and Next
Hub Server. The template with the NHS cluster configuration will be applied only to the device
running Cisco IOS Software Release 15.1(2)T or later.
In the Routing Information area, choose the routing information. The options are: EIGR, RIPV2, and
Other.
Step 14
Choose the existing EIGRP number from the drop-down list or enter an EIGRP number. Use the Other
option to configure the other protocols.
Step 15
Click Save to save the single NHS server entry details and the priority of the server, save the entire group
of server, and save the NHS cluster information. when you save the NHS cluster information, the NHS
server will be populated in the non-editable field.
Step 16
28-28
OL-32122-01
Chapter 28
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then click DMVPN. Click the Add
button to create the DMVPN tunnel.
Step 4
In the Device Type and Topology area, choose Hub and Spoke as the topology, and select either Hub or
Spoke as a device role.
Step 5
Choose the WAN interface from the drop-down list, and then configure the Multipoint GRE IP Address
and the subnet mask for the tunnel interface.
Step 6
Configure the NHRP and the Tunnel Interface parameters, such as the IP address, NHRP parameters and
map, MTU value, Source of the Tunnel, Tunnel Mode, and Tunnel Key.
Step 7
Create the transform-set for protecting the data flow between the devices. You can specify up to four
transforms: One Authentication Header (AH), one Encapsulating Security Payload (ESP) encryption,
one ESP authentication, and one compression. These transforms define the IPsec protocols and the
algorithms.
Step 8
Step 9
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then click DMVPN. Click the Add to create the DMVPN tunnel with
fully meshed topology.
Step 5
In the Create DMVPN Tunnel configuration page, select the Full Mesh radio button to configure the
network type as full mesh topology.
Step 6
Repeat Step 6 through Step 8 in the Configuring Hub and Spoke Topology section.
Step 7
For Fully Mesh spoke topology, in the NHS Server Information area, add the next hub server
information, such as the IP Address of Hub's physical interface and the IP address of Hub's tunnel
interface.
Step 8
28-29
Chapter 28
Configuring DMVPN
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
Feature Configuration pane, expand the Security folder, and then click DMVPN. Click Add to create
the DMVPN tunnel.
Step 4
From the Create DMVPN Tunnel configuration page, select Spoke radio button to configure the device
role as a spoke.
Step 5
Repeat Step 6 through Step 8 from in the Configuring Hub and Spoke Topology section.
Note
Step 6
Click Add Row to configure the cluster related information, and add the Cluster-ID and Maximum
Connection values.
Step 7
Click Expand Row (next to the radio button) and click Add Row to add the NHS server information.
Step 8
Enter the NHS server, the GRE Tunnel IP addresses, and the Priority of this NHS server. Click Save to
save the NHS server entry configuration.
Step 9
Step 10
Click Save again to save the NHS group information with the cluster configuration. This will
automatically populate the NHS server IP address in the table.
Editing a DMVPN
To edit a DMVPN tunnel, follow these steps:
Step 1
Step 2
Choose the device from the list or click Add to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then click DMVPN. The available tunnel is displayed.
Step 5
Select the tunnel, and click Edit. The Edit DMVPN Tunnel page opens.
Step 6
In the Edit DMVPN Tunnel page, you can edit the DMVPN parameters.
Step 7
Step 8
Click Cancel to close the Edit DMVPN Tunnel page without applying the configuration to the device.
28-30
OL-32122-01
Chapter 28
Deleting a DMVPN
To delete a DMVPN tunnel, follow these steps:
Step 1
Step 2
Choose the device from the list to delete the DMVPN tunnel. If the device is not added, click Add to add
the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then click DMVPN. The available tunnel is displayed.
Step 5
Step 6
Step 7
Click No on the warning message if you do not want to delete the selected tunnel.
Step 8
Click Cancel to cancel all of the changes that you have made without sending them to the router.
Configuring GETVPN
A Group Encrypted Transport VPN (GETVPN) deployment has three primary components: Group
Member, Key Server, and Group Domain of Interpretation protocol. Group Members encrypt and decrypt
the traffic, and Key Server distributes the encryption key to all group members. The Key Server decides
on a single data encryption key for a given lifetime. Because all Group Members use the same key, any
Group Member can decrypt the traffic encrypted by any other Group Member. GDOI protocol is used
between the Group Member and Key Server for group key and group Security Association (SA)
management. A minimum one Key Server is required for a GETVPN deployment.
Unlike traditional IPsec encryption solutions, GETVPN uses the concept of group SA. All members in
the GETVPN group can communicate with each other using a common encryption policy and a shared
SA. Therefore, there is no need to negotiateIPsec between Group Members on a peer-to-peer basis,
thereby reducing the resource load on the Group Member routers.
Group Member
The Group Member registers with the Key Server to get the IPsec SA that is necessary to encrypt data
traffic within the group. The Group Member provides the group identification number to the Key Server
to get the respective policy and keys for this group. These keys are refreshed periodically by the Key
Server, before the current IPsec SAs expire, so that there is no traffic loss.
Key Server
The Key Server is responsible for maintaining security policies, authenticating Group Members and
providing a session key for encrypting traffic. Key Server authenticates the individual Group Members
at the time of registration. Only after successful registration can the Group Members participate in a
group SA.
A Group Member can register at any time and receive the most current policy and keys. When a Group
Member registers with the Key Server, the Key Server verifies the group identification number of the
Group Member. If this identification number is valid, and the Group Member has provided valid Internet
Key Exchange (IKE) credentials, the Key Server sends the SA policy and the keys to the group member.
28-31
Chapter 28
Configuring GETVPN
The keys sends two types to Group Member: the Key Encryption Key (KEK) and the Traffic Encryption
Key (TEK). The TEK becomes part of the IPsec SA with which the group members within the same
group encrypt the data. The KEK is used to secure rekey messages between the Key Server and the Group
Members.
The Key Server sends out rekey messages either because of an impending IPsec SA expiration or because
the security policy has changed on the Key Server. Keys can be distributed during rekey using either
multicast or unicast transport. the multicast method is more scalable because keys need not be
transmitted to each group member individually. Unlike in unicast, The Key Server will not receive
acknowledgment from the Group Member about the success of the rekey reception using the multicast
rekey method. Usign the unicast rekey method, the Key Server will delete a Group Member from its
database if the Group Member does not acknowledge three consecutive rekeys.
Group Domain of Interpretation
Group Domain of Interpretation protocol is used for Group key and group SA management. Group
Domain of Interpretation uses Internet Security Association Key Management Protocol (ISAKMP) for
authenticating the Group Members and Key Servers. All of the standard ISAKMP authentication
schemes like RSA Signature (certificates) and preshared key can be used for GETVPN.
For more information on GETVPN, See
http://www.cisco.com/en/US/prod/collateral/iosswrel/ps6537/ps6586/ps6635/ps7180/deployment_guid
e_c07_554713.html.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then click
GETVPN-GroupMember. Click Add to create the GET VPN group member.
Step 4
In the Add GroupMember dialog box, choose the General tab, and enter the Group Name and Group
Identity. Choose the Registration Interface from the drop-down list.
Step 5
Enter the Primary Key Server and Secondary Key Server IP addresses. Click Add Row or Delete to add
or delete the secondary key server IP addresses.
Note
The primary key server is responsible for creating and distributing group policies to all group
members and periodically synchronizes with the secondary key servers. The server with the
highest priority is elected as a primary key server.
Step 6
Click the row or field to edit the secondary key server IP address.
Step 7
Step 8
In the Add Group Member dialog box, choose the Advanced tab, and choose the Local Exception ACL
and Fail Close ACL from the drop-down list.
If the Fail Close feature is configured, all of the traffic passing through the group member will be
dropped until the group member is registered successfully. Once the group member registers
successfully and SAs are downloaded, this feature turns off by itself.
28-32
OL-32122-01
Chapter 28
Step 9
Choose the Migration tab, and select the Enable Passive SA check box to enable passive SA. Use this
option to turn on the Passive SA mode for this group member.
Step 10
Click OK to add the Group member in the table. To display the commands, click CLI preview. After the
scheduled deploy is completed, the configuration is applied on the device.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then click GETVPN-KeyServer.
Click Add to create the GETVPN key server.
Step 4
In the Add Key Server dialog box, choose the General tab, and enter the Group Name, Group Identity,
WAN IP address, and Priority of this key server.
Step 5
Enter the Co-operative Key Servers IP address. Click Add Row or Delete to add or delete the
Co-operative key server IP address. Click the row or field, and edit the IP address.
Step 6
In the Add KeyServer dialog box, choose the Rekey tab, and choose the Distribution method from the
drop-down list.
The distribution method is used to send the rekey information from key server to group members. When
you choose the distribution method as multicast, specify the multicast address to which the rekey needs
to be transmitted.
Step 7
In the Add KeyServer dialog box, choose the GETVPN Traffic tab, and enter the Traffic to be encrypted,
Encryption Policy, and Anti Replay.
The access list defines the traffic to be encrypted. Only the traffic which matches the permit lines will
be encrypted. Be sure not to encrypt certain traffic that should always be permitted even if the crypto
sessions are not active.
Step 8
Click OK to add the Group member in the table. To display the commands, click CLI preview. After the
scheduled deployment is completed, the configuration is applied on the device.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In Feature Configuration pane, expand the Security folder, and then click GETVPN-Group Member
or GETVPN-KeyServer. The GETVPN-GroupMember or GETVPN-KeyServer summary page opens.
28-33
Chapter 28
Step 4
In the GETVPN summary page, select the group name and click Edit. The Edit GETVPN-GroupMember
or GETVPN-Keyserver page appears.
Step 5
In the Edit GETVPN-GroupMember or GETVPN-KeyServer page, you can edit the GETVPN
parameters.
Step 6
Step 2
Choose the device from the list or click Add to add a new device, then configure the device. The device
details appear on the lower part of the page.
Step 3
After choosing the device, click Configuration. The Feature Configuration pane appears.
Step 4
In the Feature Configuration pane, expand the Security folder, and then click GETVPN-Group
Member or GETVPN-KeyServer. The GETVPN-GroupMember or GETVPN-KeyServer summary
page opens.
Step 5
In the GETVPN summary page, select the group name and click Delete.
Step 6
28-34
OL-32122-01
Chapter 28
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, Expand the Security folder, and then choose VPN Components >
IKE Policies.
Step 4
Step 5
In the IKE Policies page, enter the Priority, Authentication, D-H Group, Encryption, Hash, and Lifetime.
For a description of the elements on the IKE Policies page, see Security > VPN Components > IKE
Policies in the Cisco Prime Infrastructure 2.1 Reference Guide.
Step 6
Click Save to save the configuration, then click Save again to generate the CLI commands.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
IKE Settings.
Step 4
Select the Enable IKE and Enable Aggressive Mode check box to enable the IKE policies and the
aggressive mode.
Step 5
Step 6
Enter the Dead Peer Detection Keepalive and Dead Peer Detection Retry time in seconds.
For a description of the elements on the IKE Settings page, see Security > VPN Components > IKE
Settings in the Cisco Prime Infrastructure 2.1 Reference Guide.
Step 7
28-35
Chapter 28
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
IPsec Profile.
Step 4
Step 5
In the IPsec Profile page, enter the information such as Name, Description, and Transform Set, and the
IPsec SA Lifetime.
Note
When you edit a profile, you cannot edit the name of the IPsec profile. A transform set represents
a certain combination of security protocols and algorithms. During the IPsec security association
negotiation, the peers agree to use a particular transform set for protecting a particular data flow.
A transform describes a particular security protocol with its corresponding algorithms
Step 6
Enter the IPsec SA Lifetime in seconds to establish a new SA after the set period of time elapses.
Step 7
To edit the IPsec profile parameters, click Field and edit the parameter of that IPsec profile.
Step 8
To delete the IPsec profile, select the IPsec Profile from the list, and click Delete.
Step 9
Click Save to save the configuration, then click Save again to generate the CLI commands.
Step 2
Select a device or click Add to add a new device, and then configure the device. The device details
appear in the lower part of the page.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Security folder, and then choose VPN Components > Preshared Keys.
Step 5
Step 6
In the Preshared Keys page, enter the IP Address, Host Name, Subnet Mask, and Preshared Keys.
Step 7
To edit the preshared key parameters, click the Field and edit the parameter of that preshared key.
28-36
OL-32122-01
Chapter 28
Step 8
To delete the preshared key, choose the preshared key from the list, and click Delete.
Step 9
Click Save to save the configuration, then click Save again to generate the CLI commands.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
RSAKeys.
Step 4
Step 5
Step 6
In the Add RSA Keys dialog box, enter the Label, Modulus, and Type.
Note
For a modulus value between 512 and 1024, enter an integer value that is a multiple of 64. If you
want a value higher than 1024, you can enter 1536 or 2048. If you enter a value greater than 512,
key generation may take a minute or longer. The modulus determines the size of the key. The
larger the modulus, the more secure the key, but keys with a large modulus take longer to
generate, and encryption/decryption operations take longer with larger keys.
Step 7
Select the Make the Key exportable check box to generate the RSA as a exportable key.
Step 8
Step 9
To import the RSA key, click Import. The Import RSA Key dialog box appears.
Step 10
In the Import RSA Key dialog box, enter the label of the RSA key, Key type, and password to decrypt
the key. If the key type is general-keys, signature or encryption, copy and paste the public and private
key data that was saved.
Step 11
To import usage-key, enter the public and private key data of both the signature and encryption keys.
Step 12
Step 13
To export the RSA key, choose the RSA key from the list and click Export. The Export RSA Key Pair
dialog box appears.
Step 14
In the Export RSA Key Pair dialog box, enter the password to encrypt the RSA key and choose the
encryption algorithm from the drop-down list.
Step 15
28-37
Chapter 28
Step 16
To delete the RSA key, choose the RSA key from the list, and click Delete.
Step 2
After choosing the device from the list, click Configuration. The Feature Configuration pane appears.
Step 3
In the Feature Configuration pane, expand the Security folder, and then choose VPN Components >
Transform Sets.
Step 4
Step 5
In the Transform Sets page, enter the Name and select the acceptable combination of security protocols
and algorithm to configure the transform set.
Note
Step 6
Step 7
The ESP encryption algorithm is used to encrypt the payload and the integrity algorithm is used
to check the integrity of the payload.
TransportEncrypt data only. Transport mode is used when both endpoints support IPsec.
Transport mode places the authentication header or encapsulated security payload after the original
IP header; thus, only the IP payload is encrypted. This method allows users to apply network
services such as quality-of-service (QoS) controls to encrypted packets.
TunnelEncrypt data and IP header. Tunnel mode provides stronger protection than transport
mode. Because the entire IP packet is encapsulated within AH or ESP, a new IP header is attached,
and the entire datagram can be encrypted. Tunnel mode allows network devices such as a router to
act as an IPsec proxy for multiple VPN users; tunnel mode should be used in those configurations.
Click Save to save the configuration, then click Save again to save the configuration changes.
28-38
OL-32122-01
Chapter 28
By default, the traffic between interfaces in the same zone is not subjected to any policy. The traffic
passes freely.
When an interface is a member of a security zone, all traffic to and from that interface (except traffic
going to the router or traffic going to another interface on the same zone) is dropped.
To permit traffic between interfaces that belong to different zones, a firewall policy with concrete rules
must be pushed to the device. If the policy permits the traffic between these two zones (through inspect
or pass actions) traffic can flow through the zones. Figure 28-1 describes the security zone.
Figure 28-1
E0
Router
Zone Z1
Zone Z2
E2
E1
146616
E3
The following describe the relationships between the interfaces and security zones shown in Figure 28-1.
Traffic flows freely between interfaces E0 and E1 because they are members of the same security
zone (Z1).
If no policies are configured, traffic will not flow between zones (for example, E0 and E2, E1 and
E2, E3 and E1, and E3 and E2).
Traffic can flow between interface E0 or E1 and E2 only when an explicit policy is configured to
permit the traffic between zone Z1 and zone Z2.
Traffic can never flow between E3 and interface E0, E1or E2 because E3 is not a part of any security
zone.
Prime Infrastructure supports the zone-based firewall feature on Cisco ASR, ISR, and CSR routers.
Using Prime Infrastructure, you can configure a zone-based firewall policy template and deploy it to
multiple devices. After you deploy the zone-based configuration, you can navigate to the Device Work
Center to view the deployed firewall configuration on a specific device.
To monitor the zone-based firewall, check the Zone-Based Firewall Monitor Hits capability on the
Device Work Center or the Prime Infrastructure syslog feature, which supports zone-based firewall
syslog messages.
Prime Infrastructure can configure Zone-Based Firewall either through CLI (over Telnet or SSH) or
through WSMA. Zone-Based Firewall can be configured through WSMA in a more efficient and robust
method and we recommend that you use the WSMA protocols for configuring Zone-Based Firewall. For
more information on using WSMA with Prime Infrastructure, see Configuring the Device using WSMA.
28-39
Chapter 28
Note
The Zone-Based Firewall feature is supported on the following: ASR platform from Cisco IOS-XE
Release 15.2(2)S or later, ISR G2 platform from Cisco IOS Release 15.0(1)M or later, ISR G3 platform
from Cisco IOS-XE 15.3(2)S Release or later, and CSR platform from Cisco IOS-XE 15.3(1)S Release
or later.
To configure a zone-based firewall template:
1.
Define the zones. A security zone is defined as an interface role (see Creating an Interface Role).
2.
Define the IPv4 network objects (see Creating an IPv4 Network Object).
Note
3.
Design a firewall policy and deploy it to multiple devices (for more information, see Creating a
Policy Rule).
4.
Validate the configuration for a specific device (see Creating a Zone-Based Firewall).
5.
Modify the global objects and template configuration (see Creating a Zone-Based Firewall Policy
Rules Template).
6.
7.
Monitor the syslog messages (for more information, see Where to Find Syslogs).
To modify security zones, IPv4 network objects, and firewall policies, edit the firewall policy and
redeploy it to the relevant devices.
28-40
OL-32122-01
Chapter 28
For information to create an IPv4 network object, see Creating Network Objects.
Choose Configuration > Templates > Shared Policy Objects > Shared > Interface Role or IPv4
Network Object.
Step 2
In the Create/Edit Network Object or Interface Role page, select the Allow Value Override Per Device
check box and define the values per specific device. The defined values will override the regular values
defined for the Interface Role \ Network Object.
Step 3
Choose Configuration > Templates > Features & Technologies > Security > Zone Based Firewall >
Policy Rules.
Step 2
In the Template Basic area, enter a name and a description in the appropriate fields.
Step 3
In the Validation Criteria area, choose a Device Type from the list and enter the OS Version.
Step 4
Enter the required fields. For descriptions of the template parameters, see the Cisco Prime Infrastructure
2.1 Reference Guide.
Step 5
Click Save as New Template. After you save the template, deploy it to your devices using the procedures
in Creating Feature-Level Configuration Templates.
Note
The Zone Based Firewall feature is supported on the ASR platform on Cisco IOS-XE Release 15.2 (2)S
or later, ISR G2 platform on Cisco IOS release 15.0 (1) M or later, ISR G3 platform on Cisco IOS-XE
Release 15.3(2)S or later, and CSR platform on Cisco IOS-XE Release 15.3(1)S.
28-41
Chapter 28
Step 1
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Zones.
Step 4
Step 5
Step 6
Step 7
a.
Select a VRF before assigning interfaces to the security zone. Only the interfaces that are assigned
to the selected VRF can be assigned to the zone.
b.
If the user selects the global VRF, only interfaces which are not assigned to any VRF can be
assigned to the zone.
To assign the interfaces to the security zone, click the down arrow icon. The Interface Object Selector
dialog box appears.
a.
In the Interface selector dialog box, select the Interface check box to select the interface from the
list (can be multiple selection).
b.
Click OK to save the configuration or click Cancel to cancel all of the changes that you have made
without sending them to the router.
Step 8
In the Advanced options column, click Configure. The Advanced Parameters Configuration dialog box
appears.
Step 9
Define a set of advanced parameters which would be applicable for the inspected traffic that goes
through the interfaces that belongs to the zone. For each parameter, select the check box to the left of
the parameter name to override the default value for the parameter and then select the new value for the
parameter. (Optional) In the Advanced Parameters Configuration dialog box, do the following:
Note
Step 10
a.
Select the Alert check box and select the On radio button to set the alert.
b.
Select the Maximum Destination check box to set the maximum destination.
c.
Select the TCP SYN-Flood Rate per Destination check box to set the TCP flood rate.
d.
Select the Basic Threat Detection Parameters check box and select the On radio button to
configure the FW drop threat detection rate, FW inspect threat detection rate, and FW SYN attack
threat detection rate.
Click:
Step 11
To edit the existing security zone parameters, select the zone, and click Edit in the Advance options
column. The Advanced Parameters Configuration dialog box appears.
Step 12
In the Advanced Parameters Configuration dialog box, edit the values and click Save to save the changes.
When you hover your mouse over the Advanced Options icon, the configured parameters will be
displayed in the quick view window.
Step 13
28-42
OL-32122-01
Chapter 28
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Zones.
Step 4
b.
Select the zone, and click Edit. The selected Zone entity opens for editing.
Step 5
Click the add icon to assign the interface to the zone or to un-assign the existing interfaces from the zone
You can also change the Description of the zone and edit the advanced parameters of the zone.
Step 6
Configuring a Default-Zone
A default zone is a zone that is automatically assigned to all interfaces that are not assigned to any other
zone on device.
To configure a default zone, follow these steps:
Note
Step 1
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
From the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then
click Zones.
Step 4
In the Zones page, click Enable Default to enable or disable the default security zone in the device. The
default zone will host all of the interfaces that are not related to any zone.
Step 5
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Policy Rules. The Policy
Rules page appears.
28-43
Chapter 28
Step 4
From the Policy Rules page, click Add Rule and complete the fields. When you add a rule, you can place
a rule at the top or bottom of the policy or after/before an existing rule. Firewall Rules are processed
according to their order. To control the order of the rules, select the location of the rule in the table and
use Add Top or Add Bottom option to add the rule to the top or the bottom of the table. Select a rule and
use Add After or Add Before option to add the rule before or after an existing rule.You can place a rule
at any given location and later use drag and drop to change its location.
Step 5
(Optional) Enter the firewall rule name. If you do not provide the name for the firewall rule, the system
generates a name for the firewall rule. You cannot use these formats rule_<number> or
EMS_rule_<number> to create the firewall rule name (For example, rule_1). These are system reserved
formats.
Step 6
Select the source and destination zones for the rule, the rule is applicable only for traffic that flows from
the source zone to the destination zone. Note that the source and destination zones must be different.
Step 7
To add the source and the destination IP address, click the add icon. The Source/Destination IP address
dialog box appears.
Step 8
a.
In the Source/Destination IP address dialog box, select the Any check box to set the value to any.
b.
c.
Click the + button to add the new IP address and the subnet.
d.
e.
Click OK to save the configurations or click Cancel to cancel all of the changes that you have made
without sending them to the router.
(Optional) Set the Service values. To add or remove the service, click the down arrow icon. The Firewall
Service dialog box appears. You can also select a predefined Service. For creating services, see Creating
a Service Group.
a.
In the Firewall Service dialog box, select the service or port-based application check box to select
the application or the service for the rule.
b.
Select specific TCP / UDP ports by selecting TCP or UDP, close the window and enter the list of
ports to be used in the text box that appears next to the TCP or UDP icon. For viewing port-based
applications, see Assigning TCP/UDP Ports on an Application.
c.
d.
Step 9
Select the appropriate action. The options are: Drop, Drop and Log, Inspect, Pass, and Pass and Log.
Step 10
If you select the action to inspect, click Configure in the Advance options column. The Advanced
Parameters Configuration dialog box appears.
Step 11
To customize the device default value, select the Parameter check box and set the new value.
b.
To apply the device default value, unselect the Parameter check box.
c.
To view the firewall rule default parameters, see Configuring a Default Parameters Map.
d.
When you hover your mouse cursor over the Advanced Options icon, the configured parameters are
displayed in the quick view window.
Click Save to apply the rule to the device. For description of the elements, see the Cisco Prime
Infrastructure 2.2 Reference Guide.
28-44
OL-32122-01
Chapter 28
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Policy Rules. The Firewall
Rules page appears.
Step 4
In the Firewall Rules page, click Hit Counters and use one of the following options to analyze the
sessions and packets hit counters for the firewall rules.
Step 5
Click the Show all option to view the packets and sessions counters for all firewall rules. The packets
and sessions counters are displayed in two separate columns.
Note
When you select the Show all option, the system will display a warning message stating that it
may take more time to complete this operation. Sessions hit counters are not applicable for
Drop/Pass rules. Similarly, packet hit counters are not applicable for Inspection rules.
Step 6
To know the time of the last update for the rules, hover the mouse cursor over the column names or click
the Last Update Time option in the Hit Counters.
Step 7
Click the Show for selected rules option to show the hit counters for a specific rule or a couple of
selected rules. The hit counters would be displayed in a popup dialog box with a refresh button that
allows quick refresh of the data.
Step 8
Use the predefined filters options available in the top-right corner of the table to display the rules at the
top or bottom based on the packets/sessions counts.
Step 9
Click Reset All Counters to discard all of the rules counters on the device. The application will display
a warning message before resetting the rules counters.
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Policy Rules. The Firewall
Rules page appears.
Step 4
Select the check box to select the rule, and then click Edit. The selected Rule opens for edit. You
cannot edit the name of the policy rule.
28-45
Chapter 28
Note
Step 5
In Cisco Prime Infrastructure Release 2.2, you can specify the Transmission Control Protocol
(TCP) / User Datagram Protocol (UDP) port range in the firewall rule service. When you add a
new rule or edit an existing rule under the Service column, click object selector to assign the
TCP / UDP, and click OK. You can define the port numbers in the text box that appears near the
protocol icon. Also, you can define the port range in the format of
<start-port-number>-<end-port-number>, and this range can be configured for that specific
protocol (TCP or UDP).
You can re-order firewall rules by dragging a rule and dropping it in a different location.
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Service Groups. The Service Groups page appears.
Step 4
Step 5
Step 6
a.
In the Service Group page, click Add Service Group and enter the Service Group Name. You cannot
change the name after creating the Service Group. Also, you cannot create a service group without
an application (see Creating Custom Applications).
b.
c.
In the Applications dialog box, select the Applications check box to select one or more applications
from the list, then click OK.
In the Service Groups page, click the Service Group parameters row and edit the parameters.
Select the service group and click Edit. You can add new applications or remove an already selected
application.
To remove an application from the selected list, hover your mouse cursor over the application name
and click X.
28-46
OL-32122-01
Chapter 28
Note
When you click Save in the following procedure, your changes are deployed on the device. You cannot
review the requested operation or remove the request from the pending changes queue.
To assign or unassign TCP/UDP ports for an application, follow these steps:
Step 1
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall > Common Building Blocks, and then click
Port Mappings. The Port Application Mapping page appears.
Note
Step 4
Step 5
Assign port(s) by defining one or more ports separated by comma (For example: 1234, 2222 and so
on).
b.
Assign port(s) by defining the port range (For example: 1111-1118). You can also assign a
combination of ports and port ranges.
c.
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Default Parameters. The
Default Parameters page appears.
Step 4
Note
Step 5
28-47
Chapter 28
Choose Inventory > Device Management > Network Devices, then select a device.
Step 2
Step 3
In the Security subfolder, expand the Zone Based Firewall and then click Interfaces.
Step 4
In the Interface page, select the interface that you want to change and click the down arrow icon. The
Zone dialog box appears.
Step 5
In the Zone dialog box, select the new security zone for the interface. If the selected interface is already
assigned to a zone, you will get a warning message.
Step 6
Click Yes on the warning message if you want to change the assignment of that interface.
Step 7
To un-assign the interface from the specific zone, select the interface and delete the zone information.
Step 8
The following sections describe the routing protocols supported by Prime Infrastructure.
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click Static. The Static Routing page appears with options to
configure IPv4 static routes.
28-48
OL-32122-01
Chapter 28
Step 5
In the IPv4 Static Routes page, click Add Row, and then complete the fields.
For Permanent Route, choose either of the following:
True to specify that the route will not be removed from the routing table, even if the next-hop
Click Save.
c.
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click RIP. The RIP Routing page appears with options to configure
IPv4 RIP routes.
Step 5
b.
c.
Click Save.
d.
Click Passive Interface to select the passive interface that you want to add.
e.
28-49
Chapter 28
EIGRP uses the Diffusing Update Algorithm (DUAL) to determine the most efficient route to a
destination and provides a mechanism for fast convergence. Routers using EIGRP and IGRP can
interoperate because the routing metric used with one protocol can be easily translated into the routing
metric of the other protocol.
To create an EIGRP route, follow these steps:
Step 1
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click EIGRP. The EIGRP Routing page appears with options to
configure IPv4 EIGRP routes.
Step 5
In the IPv4 EIGRP Routes page, click Add Row, and then complete the fields.
b.
Click Save.
c.
Click Add Interface to select the passive interface that you want to associate to the Autonomous
System (AS) number created.
d.
Step 2
Choose the device from the list or click Add Device to create a new device, then configure the device.
Step 3
After selecting the device, click Configuration. The Feature Configuration pane appears.
Step 4
Expand the Routing folder, and then click OSPF. The OSPF Processes page appears with options to
configure IPv4 OSPF processes.
Step 5
In the IPv4 OSPF Processes page, click Add Row, and then complete the fields.
b.
Click Save.
c.
Click Passive Interfaces to select the passive interface that you want to associate to the process
created.
d.
Click Advanced. The Advanced OSPF IPv4 Configuration dialog box appears.
e.
Click Networks > Add Row, and then complete the fields.
f.
Click Route Summarization > Add Row, and then complete the fields.
g.
Click OK.
28-50
OL-32122-01
Chapter 28
h.
28-51
Chapter 28
28-52
OL-32122-01
CH A P T E R
29
Note
To use this feature, your Cisco Prime Infrastructure implementation must include Assurance licenses.
For WAAS deployments to be successful, however, network operations staff must share a common data
resource that gives them complete visibility into network performance data throughout every stage of the
optimization cycle, including:
Identifying the sites and applications that are candidates for optimization, so that network designers
can plan where WAAS optimization is critical (see Identifying Optimization Candidates).
Establishing site and application performance baselines (see Establishing Performance Baselines).
Prime Infrastructure performs baselining for key performance metrics and detects abnormal
deviations of baselined values. The key performance metrics include:
Server Response Time
Client Transaction Time
Network Round-Trip Time
MOS score
Jitters
Packet loss
Bytes sent/received
Interface utilization
CPU Utilization
Memory Utilization
29-1
Chapter 29
Prime Infrastructure determines the baseline (mean) for each metric by taking the average values of
the metric during the last 30 days. Average values are computed separately for each hour of the day
for each monitored entity (such as interface, host, site, or application). For example, the baseline for
HTTP response time of a given server between 9AM to 10AM today will be different from the
baseline of the same server between 7PM to 8PM yesterday.
Prime Infrastructure also computes the metrics standard deviations using the last 30 days of data.
Similar to averages, standard deviations are computed separately for each hour of the day for each
monitored entity.
Post-implementation validation that WAN performance and application stability have actually
improved (see Validating Optimization ROI).
Because the mean and standard deviation of each metric vary over time, Prime Infrastructure
continuously reevaluates the thresholds used to compute the health scores (adaptive thresholds).
Prime Infrastructure computes baselines and thresholds every hour, and evaluates health scores
every five minutes. In each interval:
a. Health scores are computed for every application-site combination.
b. These health scores are aggregated to derive the overall health of each business-critical
application (across all sites) and overall health of each site (across all business-critical
applications).
When aggregating across sites/applications, the worst scores are used. For example, if any
business-critical application of a given site is rated red, that site is also rated red for that interval.
See Health Rules for more information.
Ongoing monitoring and troubleshooting of the optimized flows (see Monitoring Optimized Flows).
Using the baseline means and standard deviations, Prime Infrastructure can monitor application and
service health issues by detecting abnormal deviations of key metrics from their baselined values
and assign a health scores (red, yellow, or green) for each application and site for each monitoring
interval.
A red score indicates a highly abnormal deviation from baseline (deviations from baselines with
1%).
A green score indicates that the metric is within its normal range.
A gray score indicates there is insufficient data for a site/application.
Cisco Prime Infrastructure offers a consistent data resource for each of these stages in performance
optimization.
Client Experience (varies based on application type: average transaction time for transaction-based
applications such as HTTP, or MOS code for real-time applications such as RTP)
Network Performance (average network time for HTTP, jitter and Package Loss for RTP)
29-2
OL-32122-01
Chapter 29
The KPI scores can come from multiple data sources; scores are computed across all data sources for all
of the KPIs, and the overall score in the main dashboard is an aggregate of these scores. Scores are
assigned as red, yellow, or green based on the warning and critical threshold values assigned in
Administration > Health Rules; you can use this option to modify the health rule settings as necessary
for your network.
For data to be displayed in Service Health, there must be at least one hour of data. After the first hour,
the previous hours data is overlaid on the data line as the historical data for the next hour. After the first
day, standard deviation and mean are based on the hourly data for the previous day.
Note
The Site-Application Health Summary dashlet will display data two hours after the server has
been installed; baseline dashlets will display baseline values after one hour.
These scores are stored for seven days. When you view the data for a previous day, the maximum moving
time interval is six hours (you can look at up to six hours of data at a time).
Health Rules
The data displayed in the Service Health dashboard (Home > Performance > Service Health) is
computed using health rules. You can customize the health rules by clicking the desired row and editing
the Critical and Warning values.
Criticalturns red when the data value exceeds the specified Critical value.
Warningturns yellow when the data value exceeds the Warning value.
If the health rule does not exceed the specified Critical or Warning values, it is green.
For example, for Traffic Rate, you might specify the T1 the baseline value of 100 Mbps for a given site,
application, and datasource, and the standard deviation value of 20 Mbps.
If the Traffic Rate exceeds 161.8 Mbps, which is 100+(3.09 x 20), you see a red bar indicating a critical
warning.
You can click any of the colored bars to get further details.
29-3
Chapter 29
Step 2
On the Service Health dashboard, some applications are already set as Business Critical. To view the
currently defined business critical applications and to edit the contents of the Service Health dashboard:
a.
Click All Applications in the left column, select the check box for the application, then click Edit.
b.
In the Edit Application box, select the Business Critical check box, then click Update.
Step 3
Step 4
Choose the User Defined Applications, from the show drop-down list, and select the new
application check box, then click Deploy.
b.
In the Device Selection dialog box, select the NAM device or the ISR/ASR to which this application
is to be deployed, then click Submit.
c.
Note
Custom Application support for ISR G2 is only from Cisco IOS Release 15.3 onwards.
29-4
OL-32122-01
Chapter 29
Step 2
Step 3
Step 4
Step 5
Application Traffic
Server Traffic
Client Traffic
Network Links
All of the dashlets show the current traffic rate (in bytes per second), average number of concurrent
connections, and average transaction time in milliseconds, for every application, client, server, or
network link.
Network Links also shows the sites for that client and server endpoints of each link, and the average
length of time that the link exists.
Server Traffic shows both the server IP address and the application that it serves.
To filter the data displayed in all of the dashlets by Time Frame, Site, or Application, enter or select
the filter criteria that you want on the Filters line and click Go.
To filter within a dashlet, click its Filter icon and specify a Quick or Advanced Filter, or use a Preset
Filter.
b.
Specify filter and other criteria for the report, then click Run.
Step 2
Step 3
Use these dashlets to establish the performance characteristics of your optimization candidates as
currently configured.
Worst N Clients by ART Metrics: For the worst-performing clients and applications: Maximum
and average transaction times, and 24-hour performance trend.
Worst N Sites by ART Metrics: The same information for the worst-performing sites and
applications.
29-5
Chapter 29
Application Server Performance: For all application servers: the maximum and average server
response time, and a 24-hour performance trend.
Application Traffic Analysis: Gives 24-hour application traffic metrics in bytes per second and
packets per second. Calculates statistical mean, minimum, maximum, median, and first and second
standard deviation for the period,
You can sort by any column in any dashlet by clicking the column heading. You can also filter the data
in the dashlets by Time Frame, Site, and Application.
Step 4
Click the Site tab and use Top N Applications, Top N Devices with Most Alarms, Top N Clients and
Worst N Clients by ART Metrics as you did in Step 3.
Enabling Baselining
Standard deviation and mean values are used to compute the scores in the Service Health dashboard.
Baselining is not enabled by default. When baselining is enabled:
The blue line indicates the mean value for that hour.
Figure 29-1
Application Traffic AnalysisShows the aggregate bandwidth rate/volume for a site/enterprise one
application, service, or set of applications.
29-6
OL-32122-01
Chapter 29
Step 2
Step 3
Open the Application Traffic Analysis dashlet, hover your cursor over the dashlet icons and click
Dashlet Options.
b.
Open the Application ART Analysis dashlet, hover your cursor over the dashlet icons and click
Dashlet Options.
b.
c.
Transaction Time (Client Experience)Graphs average client transaction times (in milliseconds)
for the past 24 hours, with separate lines for optimized traffic and pass-through traffic (in which
optimization is turned off). With optimization enabled, you should see a drop in the optimized traffic
time when compared to the pass-through time.
Traffic Volume and Compression RatioGraphs the bandwidth reduction ratio between the
number of bytes before compression and the number of bytes after compression.
Multi-Segment Network Time (Client LAN-WAN - Server LAN)Graphs the network time
between the multiple segments.
Step 2
You can filter the data in the dashlets by Time Frame, Client Site, Server Site, and Application.
Step 3
To generate a report:
a.
Choose Tools > Reports > Report Launch Pad, then choose Performance > WAN Application
Performance Analysis Summary.
b.
Specify the filter and other settings for the report, then click Run.
29-7
Chapter 29
Step 1
Step 2
Step 3
Click the Conversations tab to see individual client/server sessions, or the Site to Site tab to see
aggregated site traffic. For each client (or client site) and server (or server site) pair and application in
use, these pages show:
Step 4
Average and Max Transaction TimeThe time between the client request and the final response
packet from the server. Transaction time will vary with client uses and application types, as well as
with network latency. Transaction Time is a key indicator in monitoring client experiences and
detecting application performance problems.
Average Client Network TimeThe network time between a client and the local switch or router.
In WAAS monitoring, Client Network Time from a WAE client data source represents the network
RTT between the client and its edge WAE, while Client Network Time from the WAE server data
source represents the WAN RTT (between the edge and core WAEs).
Average WAN Network TimeThe time across the WAN segment (between the edge routers at the
client and server locations).
Average Server Network TimeThe network time between a server and NAM probing point. In
WAAS monitoring, Server Network Time from a server data source represents the network time
between the server and its core WAE.
Average Server Response TimeThe average time it takes an application server to respond to a
request. This is the time between the client request arriving at the server and the first response packet
being returned by the server. Increases in the server response time usually indicate problems with
application server resources, such as the CPU, Memory, Disk, or I/O.
Traffic VolumeThe volume of bytes per second in each of the Client, WAN, and Server segments.
You can filter the data displayed by Time Frame, or click the Filter icon and specify a Quick or
Advanced Filter, or use a Preset Filter.
29-8
OL-32122-01
CH A P T E R
30
Troubleshooting Applications
Use the following procedure to determine if there are any problem indications associated with any of the
specific applications being run across the network by the end user.
Before You Begin
Step 1
To view the applications accessed by the end user and the response time for the applications for the users
devices, open the User 360 View for that user and click the Applications tab.
Step 2
Endpoint
Mac address
Application
To get more information about an application, choose Dashboard > Performance > Application.
30-1
Chapter 30
Troubleshooting Applications
30-2
OL-32122-01
CH A P T E R
31
Using Mediatrace
Troubleshooting RTP and TCP Flows Using Mediatrace
The Mediatrace troubleshooting tool generates a table that lists the currently active RTP streams or TCP
sessions. Using these Mediatrace tables and their associated options, you can:
Identify and select RTP or TCP flows with problems (see Using the Mediatrace Tables).
Troubleshoot problems with RTP or TCP flows (see Running Mediatrace from Selected RTP or TCP
Flows).
Troubleshoot problems with RTP or TCP flows between any two arbitrary endpoints (see Launching
an Ad Hoc Mediatrace From Endpoints).
Troubleshoot problems with RTP flows starting from the RTP Conversations dashlet (see
Troubleshooting Worst RTP Endpoints Using Dashlets).
Identify and compare flow performance indicators and data sources (see Comparing Flow Data
From Multiple Sources).
To configure data collection for Mediatrace, see Managing Metrics in the Cisco Prime Infrastructure 2.1
Administrator Guide.
31-1
Chapter 31
Using Mediatrace
Step 2
From the Application drop-down list, choose RTP or TCP. The page shows the corresponding table:
RTP Streams or TCP Sessions.
Step 3
To review all flows with a particular type of issue, click the appropriate column heading to sort on
that column.
For example, if you are monitoring RTP performance across the network and want to see the streams
with the worst jitter or packet loss, click the Jitter or Packet Loss column headings to sort the streams
on these performance indicators. You can then select any of the streams for troubleshooting.
To find a particular flow with a problem, click the Quick Filter icon and enter a filter criterion under
one or more row headings.
For example, an end user having trouble accessing an application might report the IP address and
the name of that application. You can do a quick filter on the TCP table for either the Client IP
address or Application ID, then select that session for troubleshooting.
To spot issues in RTP subflows, click the triangle icon next to any aggregated RTP flow.
For example, an RTP voice/video flow between any two endpoints will appear in the RTP Streams
table as a single flow with a triangle icon. Clicking the icon will show you the four subflows: an
incoming and outgoing video subflow, and an incoming and outgoing voice subflow.
Step 4
To troubleshoot the flow, see Running Mediatrace from Selected RTP or TCP Flows.
Choose Services > Application Visibility and Control > Mediatrace. In the Application drop-down
list, choose RTP or TCP, then find the flow that you want by using the steps in Using the Mediatrace
Tables.
Step 2
Select the flow and click Trace Service Path. Prime Infrastructure displays the RTP or TCP Stream
Details page for the selected flow, with all of the routers in the flows path in the Troubleshooting Status
table, in the order of their distance from the flows source endpoint. Routers that are Medianet-capable
are indicated by a filmstrip icon.
Step 3
To run Mediatrace or Traceroute from a router in the flows path, click the Start Mediatrace or Start
Traceroute link next to that router in the table.
Note
The Start Mediatrace link is present when the device is Mediatrace-capable; the Start
Traceroute link is present when the device is not Mediatrace-capable.
Mediatrace can take a minute or more to run, depending on traffic, congestion, and the total number of
hops between the flow endpoints.
While running Mediatrace or Traceroute, click the Logs tab to see useful information, including:
Errors encountered during the operation, including router response timeouts and other steps that did
not complete.
Where non-Medianet-capable routers where encountered and how they were processed.
31-2
OL-32122-01
Chapter 31
Using Mediatrace
Troubleshooting RTP and TCP Flows Using Mediatrace
Step 4
Step 5
When the operation is complete, the Troubleshooting tab displays a topology map of all of the devices
between the flows two endpoints. Device icons in the map consist of:
Alarm SeverityThe most severe alarm currently recorded for the device.
Minus sign on red backgroundThe device is Medianet-capable but not configured as a Medianet
responder. RTP/TCP performance statistics will not be available for the device. To remedy this
situation, you must configure the device as a Medianet responder as explained in Troubleshooting
RTP and TCP Flows Using Mediatrace.
To see key performance metrics, such as CPU and memory utilization, jitter, and packet loss, for all
Medianet-capable devices in the RTP or TCP flows path, click the Medianet Path View tab. To see the
performance metrics in numerical and graphic form, click the subtabs in the Medianet Path View pane.
Note
Step 6
The Medianet Path View tab is available only when you are able to start a Mediatrace operation
from the Troubleshooting Status table. If you can only trigger Traceroute operations, it will not
be shown.
Choose Services > Application Visibility and Control > Mediatrace. From the Application
drop-down list, choose RTP or TCP.
Step 2
Step 3
31-3
Chapter 31
Using Mediatrace
Step 4
For an RTP flow, select or enter the Source Endpoint Port and Destination Endpoint Port.
Step 5
Click Trace Service Path (for an RTP flow) or OK (for a TCP flow). Prime Infrastructure displays the
RTP or TCP Stream Details page for the specified flow, with all of the routers in the flows path in the
Troubleshooting Status table, in the order of their distance from the flows source or client endpoint.
Routers with a filmstrip icon next to them are Medianet-capable.
Step 6
To run Mediatrace or Traceroute from a router in the flows path, click the Start Mediatrace or Start
Traceroute link next to that router in the table.
Mediatrace can take a minute or more to run, depending on traffic, congestion, and the total number of
hops between the flow endpoints.
While running Mediatrace or Traceroute, click the Logs tab to see useful information, including:
Step 7
Step 8
Errors encountered during the operation, including router response timeouts and other steps that did
not complete.
When the operation is complete, the Troubleshooting tab displays a topology map of the all the devices
between the flows two endpoints. Device icons in the map will be badged as follows:
Alarm SeverityThe most severe alarm currently recorded for the device.
Minus sign on red backgroundThe device is Medianet-capable but not configured as a Medianet
responder. RTP/TCP performance statistics will not be available for the device. To remedy this
situation, you must configure the device as a Medianet responder.
To see key performance metrics for all Medianet-capable devices in the flows path, click the Medianet
Path View tab. Click the subtabs in the Medianet Path View pane to see the performance metrics in
numerical and graphic form.
Note
Step 9
The Medianet Path View tab is available only when you are able to start a Mediatrace operation
from the Troubleshooting Status table. If you can only trigger Traceroute operations, it will not
be shown.
Use the appropriate links in the Troubleshooting Status table to launch a Mediatrace or Traceroute
operation on a different router, restart a Mediatrace or Traceroute operation that is completed, or stop
one in progress.
31-4
OL-32122-01
Chapter 31
Using Mediatrace
Troubleshooting RTP and TCP Flows Using Mediatrace
Step 2
In the Worst N RTP End Point Pairs dashlet (if this dashlet is not already in the dashboard, see Adding
Dashlets), note the Source Address for your worst performing RTP flows.
Step 3
In the RTP Conversations dashlet in the same page, find the most recent conversation for the same
Source Address.
Step 4
Select that conversation in the RTP Conversations dashlet, then choose Troubleshoot > Trace Service
path. Prime Infrastructure displays the RTP Stream Details page for the selected flow, with all of the
routers in the flows path in the Troubleshooting Status table, in order of their distance from the flows
source endpoint. Routers that are Medianet-capable are indicated by a filmstrip icon.
Step 5
To run Mediatrace or Traceroute from a router in the flows path, click the Start Mediatrace or Start
Traceroute link next to that router in the table.
Note
The Start Mediatrace link is present when the device is Mediatrace-capable; the Start
Traceroute link is present when the device is not Mediatrace-capable.
Mediatrace can take a minute or more to run, depending on traffic, congestion, and the total number of
hops between the flow endpoints.
While running Mediatrace or Traceroute, click the Logs tab to see useful information, including:
Step 6
Step 7
Errors encountered during the operation, including router response timeouts and other steps that did
not complete.
When the operation is complete, the Troubleshooting tab displays a topology map of the all of the
devices between the flows two endpoints. Device icons in the map will be badged as follows:
To see key performance metrics for all Medianet-capable devices in the flows path, click the Medianet
Path View tab. To see the performance metrics in numerical and graphic form, click the subtabs in the
Medianet Path View pane.
Note
The Medianet Path View tab is available only when you are able to start a Mediatrace operation
from the Troubleshooting Status table. If you can only trigger Traceroute operations, it will not
be shown.
31-5
Chapter 31
Using Mediatrace
Step 8
Identify the NAM, NetFlow, and other sources reporting this performance data.
If you have multiple NAM or NetFlow data sources, compare how those sources are reporting key
performance indicators for a particular flow.
Step 2
From the Application drop-down list, choose RTP or TCP, then find the flow that you want using the
steps in Using the Mediatrace Tables.
Step 3
Expand a row (for an RTP or TCP flow) to view the details of the key performance indicators appropriate
for the selected flow and the data source for each such set of indicators.
Step 4
31-6
OL-32122-01
CH A P T E R
32
Location ServiceAlso known as Context Aware Service (CAS). This is the core service of the
Mobility Services Engine (MSE) that turns on Wi-Fi client tracking and location API functionality.
Allows MSE to simultaneously track thousands of mobile assets and clients by retrieving contextual
information such as presence, location, telemetry data, and historical information.
Mobile ConciergeMobile Concierge enables the Cisco Mobility Services Advertisement Protocol
(MSAP). This protocol enables direct communication between the MSE and mobile devices,
allowing content to be pushed directly to the mobile device pre-association. This functionality is
dependent on the mobile device supporting 802.11u and MSAP.
CMX Analytics ServiceThe CMX Analytics service analyzes wireless device location
information in a particular network. The CMX Analytics service uses the data provided by the Cisco
Mobility Services Engine (MSE) to calculate the location of Wi-Fi devices in the Wireless Local
Area Network (WLAN). In addition, the FastLocate feature sends information about the RSSI
strength of data packets to the Cisco WLC that can be used for location calculations.
When a wireless device is enabled in a network, it transmits probe request packets to identify the
wireless network in its neighborhood. Even after connecting to the access point in the WLAN, the
client devices continue to transmit probe request packets to identify other access points for better
quality of service. The access points gather these request and the associated RSSI from the various
wireless devices and forwards them to the Wireless LAN Controller (WLC). The controller then
forwards this information to the MSE.
The basic data that is collected from various APs, when analyzed, produces information and
knowledge about the movement and behavior patterns of people who are using Wi-Fi devices in the
building. For example, the building can be an airport, shopping mall, city center, and so on. The
CMX Analytics service helps the airport authorities or the building owners to understand the
movement of passengers or customer within their building. This helps them improve the signage,
make changes to the under utilized areas, and so on.
For more information about the Cisco MSE, see the Cisco Prime Infrastructure Classic View
Configuration Guide for Wireless Devices, Release 2.2 at the following URL:
32-1
Chapter 32
http://www.cisco.com/c/en/us/td/docs/wireless/prime_infrastructure/2-2/configuration/guide/pi_22_cg/
mse.html
32-2
OL-32122-01
CH A P T E R
33
AppNav ControllerThis is component that intelligently distributes traffic from a router to service
nodes. The Cisco AppNav Controller is a part of Cisco IOS-XE Release 3.10 on the Cisco ISR-4400,
Cisco CSR, and Cisco ASR 1K platforms.
Cisco WAAS Service NodesThese optimize traffic flows and are available in different form
factors, for example, standalone appliances and virtualized ISR-WAAS running in a Cisco IOS-XE
container.
33-1
Chapter 33
Cisco WAAS Central ManagerThis is used to monitor and configure the ISR-WAAS.
This chapter describes the configuration of the Cisco AppNav Controller functions on routers.
Figure 33-1 describes the components of Cisco AppNav.
Figure 33-1
Cisco AppNav
Distribution
Policy
WN4
360142
WN1
ANC2
They can intelligently redirect new flows based on the load on each service node. This includes loads
of individual application accelerators.
If the flows do not require any optimization, service nodes can inform the Cisco AppNav Controller
to directly pass the packets, thereby minimizing latency and resource utilization.
The Cisco AppNav components support VRF. The VRF information is preserved when traffic
returns from a service node. However, Prime Infrastructure does not support VRF.
For specific applications, such as Messaging Application Programming Interface (MAPI) and
Virtual desktop infrastructure (VDI), the components ensure that a family of flow is redirected to
the same service node.
Asymmetric flows can be optimized in situations where traffic in one direction goes through one
Cisco AppNav Controller and the return traffic goes through a different Cisco AppNav Controller.
But both redirect the traffic to the same ISR-WAAS. This is achieved using the Cisco AppNav
Controller Group.
Inter-box high availability is also supported using the Cisco AppNav Controller Group, which
means that if one router goes down, traffic can be redirected to a different router in the Cisco
AppNav Controller Group enabling uninterrupted flow.
33-2
OL-32122-01
Chapter 33
Intra-box high availability of the Cisco AppNav Controller is supported on those Cisco ASR1000
Series platforms that have dual RP, or dual FP, or both. This means that if the active RP fails, the
standby RP takes over or if the active FP fails, the standby FP takes over, and the flows continue
uninterrupted.
The Cisco AppNav technology allows IP flows to be intercepted on routers and sent to a set of Cisco
WAAS Service Node for processing. The initial application of Cisco AppNav which is supported in
Cisco IOS-XE Release 3.10, is in Cisco WAAS.
The platform must be Cisco 4451-X ISR, Cisco Integrated Services Routers (ISR) G2, Cisco ASR
1000 Series Aggregation Services Routers, or Cisco Cloud Services Router.
The software version of above mentioned platforms must be Version 3.10 and later.
ControllersA list of routers that cooperate to redirect traffic. This is a list of IP addresses, exactly
one of which must belong to the router on which Cisco AppNav is being configured.
Cisco WAAS Service Node Groups (SNGs)There must be one or more SNGs that are the target
of redirected traffic and are defined as a set of IP addresses.
Class MapsA set of class maps that classify incoming and outgoing traffic. Class maps consist of
a set of match conditions that together specify traffic of interest. They can match traffic based on
three types of conditions:
An access control list (ACL) that selects traffic based on a source and destination IP address and
port.
A protocol that is used to select traffic that uses the Microsoft port mapper service rather than
depending on fixed port numbers. This includes MAPI and a host of other Microsoft protocols.
A remote device that matches the traffic that has traversed a particular Cisco WAAS Service
Node on the remote end. The remote device is identified by a MAC address.
33-3
Chapter 33
Policy mapsA Cisco AppNav policy map is an ordered list of rules, each of which specify what
is to be done with some type of traffic. A rule thus consists of a class map and an action. The action
is to either redirect to a service node group or to pass through.
ClustersA Cisco WAAS cluster is the combination of a policy map, controller group, and a set of
service node groups used by the policy map. A cluster can be enabled or disabled. Prime
Infrastructure allows several clusters to be defined but only one can be enabled at a time. An
authentication key is used to secure communication between the controllers and the nodes in a
cluster.
Cisco WAAS interfacesTraffic can be optimized only on interfaces where Cisco WAAS is
enabled.
The WAN optimization template and the Device Work Center both have a default policy. The default
policy consists of a number of class maps that match different types of traffic (HTTP, CIFS, TCP, and so
on) that is optimized by Cisco ISR-WAAS. The template also includes a policy map containing a rule
for each of those class maps. By default, all the matched traffic is redirected to a single service node
group.
Step 2
Step 3
On the Configuration tab in the bottom pane, and click WAN Optimization.
The Cisco AppNav configuration is divided into the following sections:
AppNav controllersThe Controllers page shows the IP addresses of routers belonging to the same
cluster as the router. You must assign one of the addresses to one of the currently selected router's
interfaces. Each router's own IP address is shown in a drop-down list. The IP addresses of other
routers in the same cluster are listed in a separate table.
Cisco WAAS clusters The Cisco WAAS Clusters page is the main Cisco AppNav page. It lists the
Cisco WAAS clusters configured on the device and allows new ones to be created. To view the
detailed configuration for a cluster, including the policy map, select the cluster, and click Edit.
In this page, cluster settings and policies can be edited. Expand individual rules by clicking the
arrow in the third column. This enables the corresponding rule to be edited as well as the class
maps and Cisco WAAS service node groups to be viewed, modified, and created. New rules can
be added by clicking Add Policy. The order of the rules within a policy map is significant and
the table allows the order to modified by dragging rows or selecting a contiguous list of rows
and using the Up or Down arrows in the menu bar.
To create a new cluster, select Add WAAS Cluster on the Cisco WAAS Cluster Overview tab.
This launches a wizard that prompts for controllers, Cisco WAAS Service Node, interception
interfaces, and some general cluster parameters. After providing the necessary information,
click Finish for the configuration to take effect.
33-4
OL-32122-01
Chapter 33
The wizard creates the cluster with a default policy that works for most small installations. All
the TCP flows are redirected to a single node group, with the node group being monitored for
overload conditions.
Note
Because Prime Infrastructure does not support VRFs; therefore, only one Cisco WAAS cluster can be
enabled at a time.
InterceptionThe Interception page lets the administrator select interfaces on which incoming and
outgoing traffic should be redirected (subject to policies). All the WAN interfaces on the router
should have Cisco WAAS enabled.
Advanced SettingsThe Advanced Settings folder contains pages for Cisco WAAS service node
groups, class maps, and policy maps. Most of this information is also available in the Cisco WAAS
Clusters page, but it is helpful to be able to view the definition of these objects directly.
Cisco WAAS Node GroupsThe Cisco WAAS Node Groups page allows the existing Cisco
Interface Roles
The Cisco AppNav solution redirects traffic only on interfaces on which it has been explicitly enabled.
Routers differ in terms of available interfaces and how they are named. Since the templates are intended
to be applied to multiple devices, they refer to interface roles instead of actual interfaces.
Interface roles are logical objects that exist only in Prime Infrastructure. They can be used in templates
instead of actual interface names. When a template is deployed to a device, the interface role is resolved
to a set of actual interfaces.
You can override, the set of interfaces on which Cisco WAAS is enabled during template deployment on
a per-device basis. However, we recommend that you to define one or more interface roles and save them
as part of the template to simplify the template deployment process.
You can define interface roles in Configuration > Templates > Shared Policy Objects > Interface
Role. For more information, see the Creating Interface Roles.
Choose Configuration > Templates > Features & Technologies > WAN Optimization.
33-5
Chapter 33
Step 2
Step 3
Controller IP addressesA list of controllers can be configured here or during deployment. For
example, if the template is used for multiple sites, such as branches, this field must be left empty.
However, values can be provided during deployment.
Service nodesThe Cisco WAAS service node groups are used by the policy map. By default, there
is a single service node group called WNG-Default. If the template is used for multiple sites, leave
the service node groups empty and add the actual IP addresses during deployment. Enter the
following details:
Name of the Service Node
Description
IP address of the Cisco WAAS Service Node
InterceptionInterface roles for which Cisco WAAS should be enabled. During deployment, an
actual list of interfaces is presented. You can make a selection of the actual interfaces belonging to
the device, for each device. The purpose of the interface roles is to initialize the selection with a
default. Therefore, the list of enabled interface roles can be left empty in the template design view.
Here you can do the following:
Select or unselect the Enable WAAS check box.
GeneralA valid cluster ID range is between 1 to 32. Select the check box to enable or disable a
cluster. Enter the following details:
Cluster ID
Authentication Key
After this, select or unselect or uncheck the Enable Distribution check box.
Step 4
Step 5
Click Finish.
You can view the configured template by choosing Configuration > Templates > Features &
Technologies > My Templates.
Step 2
Step 3
33-6
OL-32122-01
Chapter 33
Step 4
In the Value Assignment panel select each target device, one at a time and complete all the fields for that
router:
ControllersThe list of controller IP addresses. This must include an IP address assigned to the
device itself.
Node GroupsEnter IP addresses belonging to each of the ISR-WAAS groups used in the policy.
Step 5
Click Apply.
Step 6
Click OK.
The Cisco AppNav is deployed on multiple devices.
Note
When a template is deployed to one or more devices, a job is created. To verify the status of the template
deployment, choose Administration > Jobs. After you create a template, it can be edited multiple times
depending on the requirements. To view detailed status information about failures, success, or warnings,
choose Job Dashboard > More Details on Dashboard > Status of the job. To view the details of the
job status, select the icon in the status field.
Class maps are created for different types of traffic optimized by the Cisco WAAS service node.
A default policy map, that redirects all TCP traffic to the Cisco WAAS service node, is generated.
Cisco WAAS is enabled on interfaces denoted by an interface role (specified at the time of container
activation).
For more information on how to configure Cisco AppNav using this method, see the Installing an
ISR-WAAS Container.
33-7
Chapter 33
33-8
OL-32122-01
CH A P T E R
34
Note
In this chapter, ISR-WAAS device refers to the router and ISR-WAAS container refers to the container.
Note
Interface Roles
Ensure that the name of the ISR-WAAS container does not exceed 22 characters.
34-1
Chapter 34
For cross-launching Cisco WAAS Central Manager GUI for monitoring purposes
Note
Cisco WAAS Central Manager configuration is a one-time configuration. The Cisco WAAS Central
Manager IP address is required for Prime Infrastructure to authenticate itself to Cisco WAAS Central
Manager, and is configured in Prime Infrastructure using the Settings menu.
Note
If Cisco WAAS Central Manager IP is not configured in Prime Infrastructure, the newly activated
ISR-WAAS will not be registered with Cisco WAAS Central Manager.
To configure the Cisco WAAS Central Manager IP address and server name in Prime Infrastructure:
Step 1
Step 2
Step 3
Step 4
Click Save.
WCM can be deployed under the following condition:
Prime Infrastructure works only with the active Cisco WAAS Central Manager that is configured in
Prime Infrastructure.
After a Cisco WAAS Central Manager failover, one of the following must take place for Prime
Infrastructure-Cisco WAAS Central Manager interworking to operate properly again:
Prime Infrastructure is reconfigured with the IP address of the new Cisco WAAS Central Manager.
Choose Administration > User, Roles & AAA > SSO Servers.
Step 2
Choose Add SSO Server from the Select a command drop-down list.
Step 3
34-2
OL-32122-01
Chapter 34
Step 4
Click Save.
Step 5
Step 6
Step 7
Step 8
Click Save.
Step 9
Configure the WCM IP address. For information on how to configure the WCM IP address, see the Cisco
WAAS Central Manager Integration.
Step 10
After you configure the IP address, log out of Prime Infrastructure and log in to WCM and create a
username.
Log in to WCM.
Step 2
Step 3
Click Create.
Step 4
Step 5
Choose Role Management and click admin to assign a RBAC role to create a user account.
Step 6
Step 7
Click Submit.
Step 8
Choose Devices > Configure > AAA > NCS Single Sign-On.
Step 9
Select the Enable NCS Single Sign-On check box and enter the CAS/SSO server URL.
Step 10
Step 11
Step 2
34-3
Chapter 34
Step 3
Step 4
Step 2
Note The Cisco ISR-WAAS Container Lifecycle enables a user to install, uninstall, activate, or
deactivate the service container.
Note
Step 2
Device
URL
Protocol
File
Step 3
Step 4
Click Refresh to view the imported image in the Services > Router Virtual Containers > WAAS-XE
> Services Catalogue folder.
34-4
OL-32122-01
Chapter 34
Note
Ensure that the name of the ISR-WAAS container does not exceed 22 characters.
Choose Services > Router Virtual Containers > Services Catalogue to import an OVA image. For
information on how to import an OVA image, see the Defining Interface Roles.
Step 2
Step 3
Click Deploy.
Step 4
In the Network Wizard page, select the ISR-WAAS device on which you want to configure the container.
Step 5
Choose the Install option and select a Resource Profile from the drop-down list.
Step 6
Note
To successfully install and activate an ISR-WAAS, you need to have enough memory for each resource
profile. For ISR-WAAS-750, you need 4194304 KB memory and two CPUs, for ISR-WAAS-1300, you
need 6291456 KB memory and four CPUs, and for ISR-WAAS-2500, you need 8388608 KB memory
with six CPUs.
Choose Services > Router Virtual Containers > Service Catalogue to import an OVA image. For
information on how to import an OVA image, see the Defining Interface Roles.
Step 2
Step 3
Click Deploy.
Step 4
In the Network wizard screen, select the device on which you want to configure the container
Step 5
Step 6
Step 7
34-5
Chapter 34
Step 8
Note
Once the ISR-WAAS is installed and activated, the Cisco AppNav configuration is automatically
configured.
Note
To successfully install and activate a ISR-WAAS, you should at least have 8 GB RAM in the router for
the 750 resource profile.
Step 2
From the list that is displayed, choose the router on which you want to install the ISR-WAAS container.
Step 3
Step 4
Step 5
Click OK.
Step 2
Select the ISR-WAAS folder that contains the imported OVA image.
Step 3
Click Deploy.
From the list that is displayed, select the routers on which you want to install the ISR-WAAS container.
After you deploy, you can either click Install (Installing an ISR-WAAS Container) or Install and
Activate (Installing and Activating an ISR-WAAS Container)
Step 4
If you choose Install and Activate, enter the following details in the Value Assignment area:
Enter the ISR-WAAS IP Address/Mask
Enter the Router IP/ Mask
Enter a Service Container name
Select a Resource Profile
Step 5
Click OK.
34-6
OL-32122-01
Chapter 34
Step 2
From the list that is displayed, select the router from which you want to uninstall the Cisco WAAS
container by clicking it.
Step 3
Step 4
Click Uninstall.
Step 5
Click OK.
Step 2
From the list that is displayed, select the routers from which you want to uninstall the Cisco WAAS
containers by clicking them.
Step 3
Click Uninstall.
Step 4
Click OK.
Note
When a Cisco WAAS virtual appliance is uninstalled through Prime Infrastructure, the corresponding
Cisco AppNav configuration is removed.
34-7
Chapter 34
Step 2
Select a Cisco ISR-WAAS device name from the device group list.
Step 3
Step 4
Click Deactivate.
Step 2
Step 3
Click Deactivate.
34-8
OL-32122-01
CH A P T E R
35
What Is Mobility?
New Mobility
Mobility Anchors
What Is Mobility?
Mobility, or roaming, is an ability of a wireless client to maintain its association seamlessly from one
access point to another securely and with as little latency as possible. To allow more flexible roaming
and to minimize the need for tunnel encapsulation of traffic, Cisco Prime Infrastructure provides a robust
mobility architecture that distributes mobility functionality across the network devices.
The following are the key elements of the mobility architecture:
Mobility Controller (MC)The MC (for example, Cisco 5700 Series Wireless Controller) is
responsible for one or more MAs or switch peer groups, handling roaming within its span of control,
and transiting traffic between MAs and/or MCs when co-located with MTE.
Mobility Agent (MA)The MA (for example, Catalyst 3650 or Catalyst 3850 Switch) resides in the
access switch or edge switch that the WAP is directly connected to, and terminates at the CAPWAP
tunnel for communications with the WAP.
Mobility Oracle (MO)The MO is a top-level control entity responsible for connecting multiple
MCs or mobility subdomains in deployments of the largest scale, to enable roaming across very
large physical areas.
Mobility DomainA roaming domain: a mobile user may roam across all of the devices in this
domain (the set of WAPs and all of the control entities associated with it). This typically includes
MAs and MCs, and may include a MO (to join multiple subdomains).
Mobility Sub-DomainThe set of WAPs and associated MAs and one MC, representing a portion
of a larger mobility domain (where a MO serves to coordinate roaming between multiple
sub-domains).
Switch Peer Group (SPG)A group of switches (acting as MAs). An SPG establishes a full mesh
of mobility tunnels among the group members to support efficient roaming across the WAPs
associated with the switches in the group. An SPG is also intended to limit the scope of interactions
between switches during handoffs. An SPG is configured by the Mobility Controller, and every
switch in the switch peer group has the same view of the membership. The switches in an SPG might
35-1
Chapter 35
New Mobility
be interconnected by a set of direct tunnels. When a station roams from one switch to another within
the same switch peer group, if the point of presence stays at the original or anchor switch, the traffic
can be directly tunneled back to the anchor switch without involving the MTE. This direct tunneling
mechanism is a data path optimization and is optional.
Mobility GroupA mobility group is a set of MCs (and their associated MAs / switch peer groups)
Mobility Tunnel EndpointThe Mobility Tunnel Endpoint (MTE) provides data plane services for
mobile devices through the use of tunneling. This minimizes the impact of roaming events on the
network by keeping the user's point of presence on the network a constant. If the VLAN or subnet
of the roamed client is available at the MTE, the MTE could become the point of presence; otherwise
it merely functions as a tunnel switching entity that connects the roamed client to access switch or
MTE that is the point of presence.
Related Topics
New Mobility
Hierarchical Mobility is referred to as New Mobility in the wireless LAN controller configuration. Prime
Infrastructure 2.0 supports the new mobility functionality for Cisco 5508 and WiSM2 platforms that run
Cisco WLC 7.6.
The key features of the New Mobility functionality in Prime Infrastructure are:
Mobility Work Center discovers Cisco 5508 and WiSM 2 platforms that run Cisco WLC 7.6 and
provide necessary operations related to building hierarchical mobility architecture that involves two
device types (Cisco 5508 and WiSM2) and Cisco 3650/3850 deployed as Mobility Agent.
When deploying the hierarchical mobility architecture, the wireless features such as WLAN, VLAN,
security, guest anchor can be configured on Cisco 5508 and WiSM2 using the LifeCycle view.
Deploying the flat mobility architecture on Cisco 5508 and WiSM2 would be supported only in
classic view and entire wireless configuration would be left as it is in classic and LifeCycle view.
As in Prime Infrastructure 2.O, the IOS based devices 3850 and 5760 continue to be configured
using CLI templates for some of the wireless features such as creating VLAN interfaces.
For more information about the new mobility functionality, see the Hierarchical Mobility (New
Mobility) the Cisco Wireless LAN Controllers and Lightweight Access Points for Release 7.3.112.0
Release Notes at:
http://www.cisco.com/c/en/us/td/docs/wireless/controller/release/notes/crn7_3_112_0.html#wp105455
7
Wireless Interface IPIP address on the MC which is used for mobility protocol.
35-2
OL-32122-01
Chapter 35
Mobility RoleShows administrative and operational mobility mode. If Admin and Operational
values are different, the device needs reboot for the administrative mode to be effective. It shows
MO in addition to mobility mode if Mobility Oracle is enabled on it.
Note
Delete DomainDeletes only the domain; it does not delete the controllers from Prime
Infrastructure.
Set as Mobility OracleTo enable MO on a selected MC, if the MC must act as the MO for the entire
domain. There can be only one MO per domain. Only Cisco 5760 series controllers support the MO
feature.
Add members to switch peer groupTo add members to switch peer group.
Delete members from switch peer groupTo delete members from switch peer group.
By default, the Mobility Work Center page displays all of the mobility domains configured in the
managed network. To see a list of mobility devices, choose All Mobility Devices from the left sidebar.
Related Topics
What Is Mobility?
Domains
SPGs on each MC
When a node is selected from the left sidebar, the right pane shows more details. When a domain node
is selected from the left sidebar, the right pane displays the MCs in the domain.
To create a mobility domain:
Step 1
Step 2
Step 3
Enter a name for the mobility domain for the set of MCs that you want to group together.
35-3
Chapter 35
If a selected MC exists in another domain, it is removed from that domain and added to the new domain.
Step 4
Step 5
Click Apply.
Step 2
Step 3
Step 4
Enter a name for the switch peer group that will contain the set of MAs that you want to group together
on the selected MC.
If a selected MA exists in another switch peer group, it is removed from that group and added to the new
group. You can create multiple switch peer groups on an MC.
Step 5
Step 6
Click Apply.
The SPG that you created appears in the left sidebar. You can navigate to it to see the mobility agents on
the selected switch peer group.
Step 2
Step 3
Select a device and the role that you want to change to:
Change Role To Mobility ControllerEnables the mobility controller feature on the selected
controller.
Change Role To Mobility AgentEnables the Mobility Agent feature on the selected controller.
When you do this, the MC feature is disabled.
35-4
OL-32122-01
Chapter 35
Converting MAs to MCs (and vice versa) is limited to 3850 devices. For a changed role to take
effect, you must reboot the device.
Step 4
Assign Mobility GroupAllows you to enter new mobility group name for the selected device.
Click Apply.
Mobility Anchors
Mobility anchors are a subset of a mobility group specified as the anchor controllers for a WLAN. This
feature can be used to restrict a WLAN to a single subnet, regardless of the entry point of a client into
the network. In this way, users can access a public or guest WLAN throughout an enterprise but still be
restricted to a specific subnet. Guest WLAN can also be used to provide geographic load balancing
because WLANs can represent a particular section of a building (such as a lobby, a restaurant, and so on).
When a client first associates to a controller of a mobility group that has been preconfigured as a mobility
anchor for a WLAN, the client associates to the controller locally, and a local session is created for the
client. Clients can be anchored only to preconfigured anchor controllers of the WLAN. For a given
WLAN, you should configure the same set of anchor controllers on all controllers in the mobility group.
When a client first associates to a controller of a mobility group that has not been configured as a
mobility anchor for a WLAN, the client associates to the controller locally, a local session is created for
the client, and the controller is announced to the other controllers in the same mobility group. If the
announcement is not answered, the controller contacts one of the anchor controllers configured for the
WLAN and creates a foreign session for the client on the local switch. Packets from the client are
encapsulated through a mobility tunnel using EtherIP and sent to the anchor controller, where they are
decapsulated and delivered to the wired network. Packets to the client are received by the anchor
controller and forwarded to the foreign controller through a mobility tunnel using EtherIP. The foreign
controller decapsulates the packets and forwards them to the client.
Note
The Cisco 5760 controller can be a guest anchor whereas the Catalyst 3850 switch cannot be a guest
anchor but it can be a foreign controller.
You can configure a guest controller as a mobility anchor for a WLAN for load balancing.
Before You Begin
Ensure that wireless devices are set up in Prime Infrastructure. For more information about setting
up wireless devices, see Configuring Wireless Features.
Ensure that the wireless devices that you want to configure as mobility anchors for a WLAN are in
the same mobility domain.
35-5
Chapter 35
Mobility Anchors
Step 1
Step 2
In the Device Group area, expand Device Type, then expand Wireless Controller.
Step 3
Select the controller that you want to designate as a guest mobility anchor. The details of the device
appear in the lower part of the page.
Step 4
Step 5
From the left sidebar menu, choose WLANs > WLAN Configuration. The WLAN Configuration page
appears.
Note
If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > WLANs >
WLAN Configuration to access the WLAN Configuration page.
Step 6
Select the URL of the desired WLAN ID. A tabbed page appears.
Step 7
Click the Advanced tab, and then click the Mobility Anchors link at the bottom of the page. The
Mobility Anchors page appears.
Note
Step 8
You can also access the Mobility Anchors page from the WLAN Configuration page. Select the
check box of the desired WLAN ID. From the Select a command drop-down list, choose
Mobility Anchors, and then click Go. The Mobility Anchors page appears.
Select the IP address check box of the controller to be designated a mobility anchor, and click Save.
35-6
OL-32122-01
CH A P T E R
36
Managing Reports
Cisco Prime Infrastructure reporting is necessary to monitor the system and network health as well as
troubleshoot problems. A number of reports can be generated to run on an immediate or a scheduled
basis. Each report type has a number of user-defined criteria to aid in defining the reports. The reports
can be formatted as a summary, tabular, or combined (tabular and graphical) layout. After they have been
defined, the reports can be saved for future diagnostic use or scheduled to run on a regular basis.
Reports are saved in these formats:
CSV: The standard format. Whenever any CSV report exceeds 15,000 records, Prime Infrastructure
creates a ZIP file and stores all the CSV files for that report in the ZIP file.
PDF: These reports are either saved to a file on Prime Infrastructure to be downloaded later or
emailed to a specific email address.
Reports include:
HistoricalRetrieves data from the device periodically and stores it in the Prime Infrastructure
database.
TrendGenerates a report using aggregated data. Data can be periodically collected from devices
and a schedule can be established for report generation.
With Prime Infrastructure, you also have the ability to export any report that you can view, sort reports
into logical groups, and archive for long-term storage.
The Reports menu provides access to all Prime Infrastructure reports as well as currently saved and
scheduled reports. It includes:
Report Launch PadThe hub for all Prime Infrastructure reports. From this page, you can access
specific types of reports and create new reports (see Managing Reports).
Reports Run ResultsAllows you to access and manage all currently scheduled runs in Prime
Infrastructure, and to access and manage on-demand exports as well as emailed reports (see
Managing Scheduled Reports).
Saved Report TemplatesAllows you to access and manage all currently saved report templates in
Prime Infrastructure (see Managing Saved Report Templates).
For information about the report field descriptions, see the Field Reference for Cisco Prime
Infrastructure Reports.
36-1
Chapter 36
Managing Reports
Managing Reports
Managing Reports
The Report Launch Pad provides access to all Prime Infrastructure reports from a single page. From this
page, you can create and save new reports, view current reports, open specific types of reports, schedule
a report to run later, and customize the results of a report.
Tip
To see more report details, rest your cursor over the tool tip next to the report type.
Step 2
Choose a category from the left sidebar menu to see the report types for each report category, select the
check box for the appropriate report in the main area of the Report Launch Pad, then click New.
Step 3
In the Report Details page, complete the fields as described in the Report Launch Pad > Report Type
> New section in the Field Reference for Cisco Prime Infrastructure Reports. Parameters shown in the
Report Details will vary with the report type. With some reports, you will need to customize the report
results. See Customizing Report Results.
Step 4
If you plan to run this report later or as a recurring report, enter Schedule parameters as described in the
Report Launch Pad > Report Type > New section in the Field Reference for Cisco Prime Infrastructure
Reports.
Step 5
SaveClick to save this report setup without immediately running the report. If you have entered
Schedule parameters, the report runs automatically at the scheduled date and time.
Run and SaveClick to save this report setup and run the report immediately.
Save and ExportClick to save the report, run it, and export the results to a file. You will be
prompted to:
Select the exported reports file format (CSV or PDF).
Choose whether to send an email when the report has been generated. If you choose this option,
you must enter the destination email address and the email subject line content, and choose
whether you want the exported file included as an attachment to the email.
When you are finished, click OK.
Save and EmailClick to save the report, run it, export the results as a file, and email the file. You
will be prompted to:
Select the exported report file format
Enter the destination email address and the email subject line content
CancelClick to return to the previous page without running or saving this report.
36-2
OL-32122-01
Chapter 36
Managing Reports
Managing Scheduled Reports
If a report has been saved for a specific report type, you can access the current reports from the Report
Launch Pad.
Note
You cannot change or update generated reports for all subdomains at the same time. You can open and
change the reports individually through their respective subdomains. To update all reports, delete the
reports created on subdomains and regenerate virtual domain reports with the changes.
Step 2
Step 3
Step 4
On the Create Custom Report page, complete the required information, then click Apply to confirm the
changes.
Note
The changes made in the Create Custom Report page are not saved until you click Save in the
Report Details page.
Note
The scheduled report tasks are not visible outside the Virtual Domain they run in. The results of the
scheduled report tasks are visible in the Reports Run Results page of the respective domains.
The list of scheduled runs can be sorted by report category, report type, time frame, and report generation
method. For information about the fields on this page, see the Scheduled Run Results page in the Field
Reference for Cisco Prime Infrastructure Reports.
36-3
Chapter 36
Managing Reports
Note
Click the report title to view the details for this report.
Virtual DomainIdentifies the name of the virtual domain under which this report is scheduled.
Run NowClick the Run icon to immediately run the current report.
Note
When you run any domain based report for a sub virtual domain, the report displays all of
the device attributes that are mapped to the virtual domain where you are currently
logged-in.
2.
From last 2 days to 4 weeks, the data is fetched from a hourly aggregated table.
3.
From previous month calendar to last 12 week, the data is fetched from daily aggregated table.
4.
From last 6 months to last 1 year, the data is fetched from a weekly aggregated table.
For detailed information about Prime Infrastructure reports, see the Field Reference for Cisco Prime
Infrastructure Reports.
36-4
OL-32122-01
A P P E N D I X
Note
If any of your installed Cisco Prime products are not yet enabled through licensing, the tabs or options
for those products are not activated.
Common UI Tasks
Search Methods
Global Toolbars
Prime Infrastructure pages contain the following static global toolbar at the top right (see Figure A-1.)
Figure A-1
Virtual Domain nameIndicates the virtual domain to which you are assigned.
Login nameIndicates your login name. Click the arrow to change your user preferences, change
your password, or log out.
Click the downward arrow next to your login name to switch to a different Prime Infrastructure view:
Lifecycle view, which is organized according to home, design, operate, report, and administer
menus.
A-1
Appendix A
Classic view, which closely corresponds to the graphical user interface in Cisco Prime Network
WelcomeLaunches the Getting Started wizard, which provides guidance for getting started with
setting up Prime Infrastructure.
Prime Infrastructure pages contain the following static global toolbar at the bottom right.
Figure A-2
Workflow StatusLaunches the workflow status summary window that displays the site maps,
newly registered devices, and any failed wired and wireless workflows.
Support CasesLaunches the TAC Services Request, where you can open a support request and
gather critical information to be attached to the support case. See Opening a Support Case for more
information.
Alarm BrowserLaunches the alarm browser within the active page (bottom half of the page).
Alarm SummaryLaunches the alarm summary window, displaying all alarms and indicating the
number of critical, major, and minor alarms.
Filters
You can use the Filter feature to display specific information about the Prime Infrastructure interface.
The Filter icon is provided wherever the data is displayed in a tabular format. The following types of
filters are available:
A-2
OL-32122-01
Appendix A
Advanced Filter
To save the filter criteria used in the Advanced filter, follow these steps:
Step 1
Enter the advanced filter criteria, then click Go. The data is filtered based on the filter criteria.
Step 2
Step 3
In the Save Preset Filter dialog box, enter a name for the preset filter and click Save.
Time frameSelect one of the preset options or create a custom time frame.
Figure A-4
To filter the data for all dashlets in a dashboard, follow these steps:
Step 1
Step 2
Change the settings in any of the Filters toolbar options, then click Go.
A-3
Appendix A
Anchored Fields
Edit Tables
Data Popups
Anchored Fields
Anchored fields are recognizable by the plus sign (+) embedded in the field at the far right.
Figure A-5
Anchored Field
Step 2
With the associated data popup displayed (see Data Popups, page A-5), review or update the data as
needed.
Figure A-6
Step 3
When you are finished, click the anchored fields minus (-) button.
Edit Tables
Prime Infrastructure uses tables to display many kind of data, including lists of sites, devices, and events.
The data is arranged in rows and columns, much like a spreadsheet.
An edit table differs from other tables in that you can add, edit, or delete the data it contains. Some edit
tables also give you access to filters (see Filters). Edit tables are often displayed in data popups that are
triggered by check boxes or anchored fields.
Figure A-7
Edit Table
A-4
OL-32122-01
Appendix A
Data Popups
A data popup is a window associated with a check box, anchored field (see Anchored Fields), or other
data-entry feature. It is displayed automatically when you select a feature, so that you can view or update
the data associated with that feature. In addition to containing check boxes, drop-down lists, and
data-entry fields, data popups can also contain edit tables (see Edit Tables).
To use a data popup:
1.
Select the feature that triggers the data popup, such as an anchored field (see Figure A-5) or a check
box (see Figure A-7).
2.
With the associated popup displayed, view or update the fields as needed.
3.
When you are finished, click anywhere outside the data popup. If you entered new information or
changed existing information, your changes are saved automatically.
Common UI Tasks
You can perform the following actions from nearly any Prime Infrastructure window:
Monitoring Alarms
Getting Help
Click the down arrow next to your username (at the top-right of the screen, to the left of the search field)
and choose Change Password.
Step 2
Step 3
A-5
Appendix A
Common UI Tasks
Hover your mouse cursor over the Virtual Domain and click the icon that appears to the right.
Step 2
Choose a domain from the list of domains of which you are a member.
Monitoring Alarms
At the bottom of the Cisco Prime Infrastructure window, hover your mouse cursor over Alarm Summary
or Alarm Browser to get information on the latest active alarms.
Note
The features that appear in the Device 360 View differ depending on the device type.
Figure A-8
A-6
OL-32122-01
Appendix A
Table A-1
Description
Device status
Indicates whether the device is reachable, is being managed, and is synchronized with the Prime
Infrastructure database.
Tool icons
Click one of the following icons at the top right of the device 360 view.
Alarm BrowserLaunches the Alarm Browser. See Monitoring Alarms for more information.
Support CommunityLaunches the Cisco Support Community. See Launching the Cisco Support
Community.
Support RequestAllows you to open a support case. See Opening a Support Case for more
information.
Alarms
Lists alarms on the device, including the alarm status, time stamp, and category.
Modules
Lists the device modules and their name, type, state, and ports.
Interfaces
Lists the device interfaces and the top three applications for each interface.
Neighbors
Lists the device neighbors, including their index, port, duplex status, and sysname.
Wireless Interfaces
Lists the interface names, associated WLANs, VLAN IDs and IP addresses.
WLAN
Lists the WLAN names, SSIDs, security policies, and number of clients.
Enter the user name in the Search field (see Search Methods).
Figure A-9
A-7
Appendix A
Common UI Tasks
Step 2
Multiple matches are displayed in the Search Results dialog. Click View List to display the matches.
Step 3
To launch the User 360 View, hover your mouse cursor over the name in the User Name field, then click
the icon that appears as shown in Figure A-10.
Figure A-10
Step 4
Table A-2
Description
User information
Endpoint
Displays endpoint information. This feature requires integration with an ISE server.
A-8
OL-32122-01
Appendix A
Table A-2
Description
Connected To
Location
Session
Network device (access switch or AP + Controller): Visible indication of existence and severity of
any active alarms associated with the device
Attachment port: Visible indication of existence and severity of any active alarms associated with
the port
Access Policy (ISE Authorization Profile). Visible indication of the existence of any errors
associated with authentication. This feature requires integration with an ISE server.
Endpoint compliance status. This feature requires integration with an ISE server.
Alarms
Click the Alarms tab to view a list of alarms and statistics associated with the network session.
Applications
Click the Applications tab to view a list of applications and statistics associated with the network
session. Session information (Netflow/NAM data, Assurance licenses) must be available.
Getting Help
You can access online help by clicking the question mark icon at the top right of any Prime Infrastructure
page.
Search Methods
Prime Infrastructure provides the following search methods:
You can access the search options from any page within Prime Infrastructure.
Step 2
Click Search to display all matches for the Quick Search parameter.
A-9
Appendix A
Search Methods
Step 3
Click View List to view the matching devices from the Monitor or Configuration page.
Step 2
In the New Search dialog box, choose a category from the Search Category drop-down list.
Step 3
Note
Step 4
Note
To save this search, select the Save Search check box, enter a unique name for the search in the text box,
and click Go.
You can decide what information appears on the search results page. See the Configuring the Search
Results Display (Edit View) for more information.
The Search categories include the following:
A-10
OL-32122-01
Appendix A
Searching Alarms
You can configure the following parameters when performing an advanced search for alarms (see
Table A-3).
Table A-3
Field
Options
Severity
Alarm Category
Choose All Types, System, Access Points, Controllers, Coverage Hole, Config Audit, Mobility
Service, Context Aware Notifications, SE Detected Interferers, Mesh Links, Rogue AP, Adhoc
Rogue, Security, Performance, Application Performance, Routers, Switches and Hubs, or
Cisco Interfaces and Modules.
Condition
Use the drop-down list to choose a condition. Also, you can enter a condition by typing it in this
drop-down list.
Note
If you have selected an alarm category, this drop-down list would contain the conditions
available in that category.
Time Period
Choose a time increment from Any Time to Last 7 days. The default is Any Time.
Acknowledged State
Select this check box to search for alarms with an Acknowledged or Unacknowledged state. If this
check box is not selected, the acknowledged state is not taken into search criteria consideration.
Assigned State
Select this check box to search for alarms with an Assigned or Unassigned state or by Owner Name.
If this check box is not selected, the assigned state is not part of the search criteria.
Note
If you choose Assigned State > Owner Name, type the owner name in the available text box.
Searching Jobs
You can configure the following parameters when performing an advanced search for jobs (see
Table A-4).
Table A-4
Field
Options
Job Name
Job Type
Job Status
Note
You can use wildcards such as *, ? in the Job Name and Job Type text box to narrow or broaden your
search.
A-11
Appendix A
Search Methods
Table A-5
Field
Options
Search By
Choose All APs, Base Radio MAC, Ethernet MAC, AP Name, AP Model, AP Location, IP
Address, Device Name, Controller IP, All Unassociated APs, Floor Area, Outdoor Area,
Unassigned APs, or Alarms.
Note
Search parameters might change depending on the selected category. When applicable,
enter the additional parameter or filter information to help identify the Search By
category. For example, when you select Floor Area, you also must identify its campus
and building. Or, if you select Alarms, you can search for access points based on the
severity of the alarm.
AP Type
AP Mode
Choose All Modes, Local, Monitor, FlexConnect, Rogue Detector, Sniffer, Bridge, or
SE-Connect.
Radio Type
802.11n Support
Select this check box to search for access points with 802.11n support.
OfficeExtend AP Enabled
CleanAir Support
Select this check box to search for access points which support CleanAir.
CleanAir Enabled
Select this check box to search for access points which support CleanAir and which are enabled.
Field
Options
Controller Name
Feature Name
Type
% Used or Greater
Choose the percentage of the license use from this drop-down list. The percentages range from 0 to 100.
Searching Controllers
You can configure the following parameters when performing an advanced search for controllers (see
Table A-7).
A-12
OL-32122-01
Appendix A
Table A-7
Field
Options
Note
This text box appears only if you choose IP Address from the Search for controller by
drop-down list.
This text box appears only if you choose Controller Name from the Search for controller by
drop-down list.
Audit Status
All Status
Searching Switches
You can configure the following parameters when performing an advanced search for switches (see
Table A-8).
Table A-8
Field
Options
Choose All Switches, IP Address, or Switch Name. You can use wildcards (*). For example, if
you select IP Address and enter 172*, Prime Infrastructure returns all switches that begin with IP
address 172.
Searching Clients
You can configure the following parameters when performing an advanced search for clients (see
Table A-9).
.
Table A-9
Field
Options
Media Type
Wireless Type
Choose All, Lightweight or Autonomous Clients if you chose Wireless Clients from the Media Type
list.
A-13
Appendix A
Search Methods
Table A-9
Field
Options
Search By
Choose All Clients, All Excluded Clients, All Wired Clients, All Logged in Guests, IP Address, User
Name, MAC Address, Asset Name, Asset Category, Asset Group, AP Name, Controller Name,
Controller IP, MSE IP, Floor Area, Outdoor Area, Switch Name, or Switch Type.
Note
Clients Detected
By
Search parameters might change depending on the selected category. When applicable, enter the
additional parameter or filter information to help identify the Search By category. For example,
when you select IP address, you must enter the specific IP address for this search.
Client States
Posture Status
Choose All, Unknown, Passed, Failed if you want to know if the devices are clean or not.
Restrict By Radio
Band
Select the check box to indicate a specific radio band. Choose 5 GHz or 2.4 GHz from the drop-down list.
Restrict By
Protocol
Select the check box to indicate a specific protocol. Choose 802.11a, 802.11b, 802.11g, 802.11n, or
Mobile from the drop-down list.
SSID
Select the check box and choose the applicable SSID from the drop-down list.
Profile
Select the check box to list all of the clients associated to the selected profile.
Note
CCX Compatible
Select the check box to search for clients that are compatible with Cisco Client Extensions.
Note
E2E Compatible
Once the check box is selected, choose the applicable version, All Versions, or Not Supported
from the drop-down list.
Select the check box to search for clients that are endtoend compatible.
Note
NAC State
Once the check box is selected, choose the applicable profile from the drop-down list.
Once the check box is selected, choose the applicable version, All Versions, or Not Supported
from the drop-down list.
Select the check box to search for clients identified by a certain Network Admission Control (NAC) state.
Note
Once the check box is selected, choose the applicable state from the drop-down list: Quarantine,
Access, Invalid, and Not Applicable.
Include
Disassociated
Select this check box to include clients that are no longer on the network but for which Prime
Infrastructure has historical records.
Searching Chokepoints
You can configure the following parameters when performing an advanced search for chokepoints (see
Table A-9).
A-14
OL-32122-01
Appendix A
Table A-10
Field
Options
Search By
Search parameters might change depending on the selected category. When applicable, enter the
additional parameter or filter information to help identify the Search By category. For example,
when you select MAC address, you must enter the specific MAC address for this search.
Searching Events
You can configure the following parameters when performing an advanced search for events (see
Table A-11).
Table A-11
Field
Options
Severity
Choose All Severities, Critical, Major, Minor, Warning, Clear, or Info. Color coded.
Event Category
Choose All Types, Access Points, Controller, Security, Coverage Hole, Rogue AP, Adhoc Rogue,
Interference, Mesh Links, Client, Mobility Service, Location Notifications, Pre Coverage Hole, or
Prime Infrastructure.
Condition
Use the drop-down list to choose a condition. Also, you can enter a condition by typing it in this
drop-down list.
Note
If you selected an event category, this drop-down list contains the conditions available in that
category.
Searching Interferers
You can configure the following parameters when performing an advanced search for interferers detected
by access points (see Table A-12).
Table A-12
Field
Options
Search By
Choose All Interferers, Interferer ID, Interferer Category, Interferer Type, Affected
Channel, Affected AP, Severity, Power, or Duty Cycle.
Note
Search parameters might change depending on the selected category. When applicable,
enter the additional parameter or filter information to help identify the Search By category.
Detected By
Choose All Spectrum Experts or a specific spectrum expert from the drop-down list.
Choose the time range for the interferer detections. The times range from 5 minutes to 24 hours to
All History.
Interferer Status
Restrict by Radio
Bands/Channels
A-15
Appendix A
Search Methods
Field
Options
Search By
Search parameters might change depending on the selected category. When applicable, enter the
additional parameter or filter information to help identify the Search By category.
Searching Maps
You can configure the following parameters when performing an advanced search for maps (see
Table A-14).
Table A-14
Field
Options
Search for
Map Name
Search by Map Name. Enter the map name in the text box.
Field
Options
Choose All Rogue Clients, MAC Address, Controller, MSE, Floor Area, or Outdoor Area.
Search In
Status
Select the check box and choose Alert, Contained, or Threat from the drop-down list to include
status in the search criteria.
When a Cisco IPS sensor on the wired network detects a suspicious or threatening client, it alerts the
controller to shun this client.
You can configure the following parameters when performing an advanced search for shunned clients
(see Table A-16).
A-16
OL-32122-01
Appendix A
Table A-16
Field
Options
Search By
Search parameters might change depending on the selected category. When applicable, enter the
additional parameter or filter information to help identify the Search By category.
Searching Tags
You can configure the following parameters when performing an advanced search for tags (see
Table A-17).
Table A-17
Field
Options
Choose All Tags, Asset Name, Asset Category, Asset Group, MAC Address, Controller, MSE,
Floor Area, or Outdoor Area.
Note
Search parameters might change depending on the selected category. When applicable, enter
the additional parameter or filter information to help identify the Search By category.
Search In
Tag Vendor
Select the check box and choose Aeroscout, G2, PanGo, or WhereNet.
Select the Telemetry Tags only check box to search tags accordingly.
Field
Options
Choose All, Switches and Hubs, Wireless Controller, Unified AP, Autonomous AP, Unmanaged
AP, and Routers.
Enter Device IP
Enter the IP address of the device selected in the Select Device Type field.
Field
Options
Enter Tag
A-17
Appendix A
Search Methods
Step 1
Step 2
Choose a category from the Search Category drop-down list, then choose a saved search from the Saved
Search List drop-down list.
Step 3
If necessary, change the current parameters for the saved search, then click Go.
Note
The Edit View page is available only from the Classic view.
Column names appear in one of the following lists:
Hide InformationLists columns that do not appear in the table. The Hide button points to this list.
View InformationLists columns that do appear in the table. The Show button points to this list.
To display a column in a table, click it in the Hide Information list, then click Show. To remove a column
from a table, click it in the View Information list, then click Hide. You can select more than one column
by holding down the shift or control key.
To change the position of a column in the View Information list, click it, then click Up or Down. The
higher a column is in the list, the farther left it appears in the table.
A-18
OL-32122-01