Cisco Dna
Cisco Dna
Cisco Dna
5
First Published: 2018-10-01
Last Modified: 2019-01-15
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com
go trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any
other company. (1721R)
© 2017–2019 Cisco Systems, Inc. All rights reserved.
CONTENTS
Table 1: New and Changed Features for Cisco DNA Center, Release 1.2.5
New Home Page The Cisco DNA Center home page now includes a Default Home Page, on page 5
Network Snapshot section along with Network
Configuration and Tools sections.
Topology Enhancements You can assign devices to specific sites using the Assign Devices to Sites, on page 94
topology map. You can unpin devices in a group. You
can export a snapshot of your topology layout in SVG
or PDF format. Some keyboard shortcuts are included.
Software Image Management The upgrade readiness precheck now includes the Provision Software Images, on page 87
device management status and a file transfer check.
Also, the Distribute and Activate processes are now
separate processes. An automatic flash cleanup process
is included to create the space required for the image
upgrade.
Fabric in a Box You can now add the selected device as a control plane, Add Devices to a Fabric, on page 236
a border node, and an edge node.
Layer 2 Selective Flooding You can enable Layer 2 selective flooding for a segment Associate Virtual Networks to the
when a Layer 2 extension is enabled for the same Fabric Domain, on page 240
segment.
Server Connectivity During host onboarding, you can designate a port on Configure Host Onboarding, on page
the edge device as the server port during port 239
assignment.
Layer 2 Border Handoff Layer 2 handoff achieves Layer 2 connectivity between Add Device as a Border Node, on page
hosts in the fabric and an external Layer 2 domain. 238
Important Cisco DNA Assurance is an application that is available from Cisco DNA Center. From Cisco DNA Center,
Release 1.2.5, we are providing you with a separate user guide, which deals exclusively with Assurance. For
details, see the Cisco DNA Assurance User Guide.
Log In
Access Cisco DNA Center by entering its network IP address in your browser. For compatible browsers, see
the Cisco DNA Center Release Notes for the version of Cisco DNA Center that you are using currently. This
IP address connects to the external network and is configured during the Cisco DNA Center installation. For
more information about installing and configuring Cisco DNA Center, see the Cisco Digital Network
Architecture Center Installation Guide.
You should continuously use Cisco DNA Center to remain logged in. If you are inactive for too long, Cisco
DNA Center logs you out of your session automatically.
Procedure
Step 1 Enter an address in your web browser's address field in the following format. Here server-ip is the IP address
(or the hostname) of the server on which you have installed Cisco DNA Center:
https://server-ip
Example: https://192.0.2.1
Depending on your network configuration, you may have to update your browser to trust the Cisco DNA
Center server security certificate. Doing so will help ensure the security of the connection between your client
and Cisco DNA Center.
Step 2 Enter the Cisco DNA Center username and password assigned to you by the system administrator. Cisco DNA
Center displays its home page.
If your user ID has the NETWORK-ADMIN-ROLE and no other user with the same role has logged in before,
you will see a first-time setup wizard instead of the home page. For details, see Log In for the First Time as
a Network Administrator, on page 4.
Step 3 To log out, click the Gear icon at the top-right corner and click Sign Out.
Procedure
Step 1 If you have not already done so, log in to Cisco DNA Center normally, as explained in Log In, on page 3.
Step 2 With the wizard displayed, click Get Started.
Step 3 In the fields on the following screens, enter the information listed in "Before You Begin" above.
Click Save & Next to continue, Back to return to the previous screen and revise your entries, or Skip to cancel
the wizard and display the Cisco DNA Center home page.
Step 4 When you are finished, click Begin Discovery. Cisco DNA Center displays the home page, which slowly
fills with network health information as discovery completes.
• Assurance: Provide proactive and predictive actionable insights about the performance and health of
the network infrastructure, applications, and end-user clients.
Tools: Use the Tools area to configure and manage your network.
Figure 1: Home Page
When discovery is in progress, you see a progress message with a link to the Discovery window.
When there are devices in the system, you see a network snapshot of discovered devices.
Click any icons in the main areas to launch the corresponding application or tool.
In addition to the Network Snapshot, Network Configuration, and Tool icons, you can click any icons at
the top-right corner of the home page to perform important common tasks:
• Software Updates: See a list of available software updates. Click the Go to Software Updates link
to view Platform and App updates.
• Search icon: Search for devices, users, hosts, and other items, anywhere they are stored in the Cisco
DNA Center database. For tips on using Search, see Use Global Search, on page 8.
• Applications icon: Return to the Cisco DNA Center home page from any other page and access the
applications and tools. You can do the same thing by clicking the Cisco DNA Center logo in the top-left
corner of the home page.
• Settings icon: View audit logs, configure Cisco DNA Center system settings, see the Cisco DNA
Center version you are using, and log out.
Finally, you can click the following icons, which appear at the right side of every page in Cisco DNA Center:
• Feedback icon: Submit your comments and suggestions to Cisco's Cisco DNA Center
product team.
• Help icon: Launch Cisco DNA Center's context-sensitive online help in a separate tab in your browser.
If you are new to Cisco DNA Center, see Where to Start, on page 9 for tips and suggestions on how to begin.
Note By default, the login name you provided is displayed in the Welcome text. To change the name, click the
name link; for example, admin. You are taken to Users > User Management, where you can edit the display
name.
To start a global Search, click the icon in the top-right corner of any Cisco DNA Center page.
Figure 2: Global Search Icon
When you click the icon, Cisco DNA Center displays a pop-up global search window, with a Search field
where you can begin entering identifying information about the item you are looking for.
You can enter all or part of the target item's name, address, serial number, or other identifying information.
The Search field is case-insensitive and can contain any character or combination of characters.
As you begin entering your search string, Cisco DNA Center displays a list of possible search targets that
match your entry. If more than one category of item matches your search string, Cisco DNA Center sorts them
by category, with a maximum of five items in each category. The first item in the first category is selected
automatically, and summary information for that item appears in the summary panel on the right.
You can scroll the list as needed, and click any of the suggested search targets to see information for that item
in the summary panel. If there are more than five items in a category, click View All next to the category
name in the list. To return to the categorized list from the complete list of search targets, click Go Back.
As you add more characters to the search string, global Search automatically narrows the displayed list of
categories and items.
The summary panel includes links to more information. The link varies as appropriate for each category and
item. For example, with Activities, the summary panel displays links to menu items and workflows elsewhere
in the Cisco DNA Center system. For Applications, there is the Application 360 view. You will see links to
Client 360 and Topology views for hosts and endpoints, and links to Device 360 and Topology views for
network devices. Click the link to see the appropriate menu item, workflow, or detail view.
Where to Start
To start using Cisco DNA Center, you must first configure the Cisco DNA Center settings so that the server
can communicate outside the network.
After you configure the Cisco DNA Center settings, your current environment determines how you start using
Cisco DNA Center:
• Existing infrastructure: If you have an existing infrastructure (brownfield deployment), start by running
Discovery. After you run Discovery, all your devices are displayed on the Inventory window. For
information about running Discovery, see Discover Your Network, on page 11.
• New or nonexisting infrastructure: If you have no existing infrastructure and are starting from scratch,
(greenfield deployment), create a network hierarchy.
About Discovery
The Discovery feature scans the devices in your network and sends the list of discovered devices to Inventory.
The Discovery feature can also work with the Device Controllability feature to configure the required network
settings on devices, if these settings are not already present on the device. For more information about Device
Controllability, see the Cisco Digital Network Architecture Center Administrator Guide.
There are three ways for you to discover devices:
• Use Cisco Discovery Protocol (CDP) and provide a seed IP address.
• Specify a range of IP addresses. (A maximum range of 4096 devices is supported.)
• Use Link Layer Discovery Protocol (LLDP) and provide a seed IP address.
When configuring the Discovery criteria, remember that there are settings that you can use to help reduce the
amount of time it takes to discover your network:
• CDP Level and LLDP Level—If you use CDP or LLDP as the Discovery method, you can set the CDP
or LLDP level to indicate the number of hops from the seed device that you want to scan. The default,
level 16, might take a long time on a large network. So, if fewer devices have to be discovered, you can
set the level to a lower value.
• Subnet Filters—If you use an IP address range, you can specify devices in specific IP subnets for
Discovery to ignore.
• Preferred Management IP—Whether you use CDP, LLDP, or an IP address range, you can specify
whether you want Cisco DNA Center to add any of the device's IP addresses or only the device's loopback
address.
Note For Software-Defined Access (SD-Access) Fabric and Cisco DNA Assurance,
we recommend that you specify the device's loopback address.
Regardless of the method you use, you must be able to reach the device from Cisco DNA Center and configure
specific credentials and protocols in Cisco DNA Center to discover your devices. These credentials can be
configured and saved in the Design > Network Settings > Device Credentials window or on a per-job basis
in the Discovery window.
Note If a device uses a first hop resolution protocol like Hot Standby Router Protocol (HSRP) or Virtual Router
Redundancy Protocol (VRRP), the device might be discovered and added to the inventory with its floating
IP address. Later, if HSRP or VRRP fails, the IP address might be reassigned to a different device. This
situation can cause issues with the data that Cisco DNA Center retrieves for analysis.
Discovery Prerequisites
Before you run Discovery, complete the following minimum prerequisites:
• Understand what devices will be discovered by Cisco DNA Center by viewing the Cisco DNA Center
Supported Devices List.
• Ensure at least one SNMP credential is configured on your devices for use by Cisco DNA Center. At a
minimum, this can be an SNMP v2C read credential. For more information, see Discovery Credentials,
on page 12.
• Configure SSH credentials on the devices you want Cisco DNA Center to discover and manage. Cisco
DNA Center discovers and adds a device to its inventory if at least one of the following two criteria are
met:
• The account that is being used by Cisco DNA Center to SSH into your devices has privileged EXEC
mode (level 15).
• You configure the device’s enable password as part of the CLI credentials configured in the Discovery
job. For more information, see Discovery Configuration Guidelines and Limitations, on page 15.
Discovery Credentials
Discovery credentials are the CLI, SNMPv2c, SNMPv3, HTTP(S), and NETCONF configuration values for
the devices that you want to discover. You need to specify the credentials based on the types of devices you
are trying to discover:
• Standard Cisco devices—CLI and SNMP credentials.
• NFVIS devices—HTTP(S) credentials.
• Both standard and NFVIS devices—CLI, SNMP, and HTTP(S) credentials
Because the various devices in a network can have different sets of credentials, you can configure multiple
sets of credentials in Cisco DNA Center. The Discovery process iterates through all sets of credentials that
are configured for the Discovery job until it finds a set that works for the device.
If you use the same credential values for the majority of devices in your network, you can configure and save
them to reuse in multiple Discovery jobs. To discover devices with unique credentials, you can add job-specific
Discovery credentials when you run Discovery jobs. You can define up to 5 saved and one job-specific
credential for each of the credential types.
For information on how to define Cisco ISE as a AAA server, see Add Cisco ISE or Other AAA Servers, on
page 144.
• If an ongoing Discovery polling cycle fails because of a device authentication failure, you can correct
the situation using one of following options:
• Use the Discovery tool to:
• Stop or delete the current Discovery job and run a new Discovery job with job-specific
credentials that match the device's credential.
• Stop or delete the current Discovery job, edit the existing Discovery job, and rerun the Discovery
job.
• Deleting a global credential does not affect previously discovered devices. The status of the previously
discovered devices does not indicate an authentication failure. However, the next Discovery job that tries
to use the deleted credential will fail. The Discovery job will fail before it tries to contact any devices.
For example, 25 minutes after you delete the credential, Discovery jobs that use it will fail.
Procedure
If you choose to use a device's loopback IP address as the preferred management IP address, Cisco DNA
Center determines the preferred management IP address as follows:
• If the device has one loopback interface, Cisco DNA Center uses that loopback interface IP address.
• If the device has multiple loopback interfaces, Cisco DNA Center uses the loopback interface with the
highest IP address.
• If there are no loopback interfaces, Cisco DNA Center uses the Ethernet interface with the highest IP
address. (Subinterface IP addresses are not considered.)
• If there are no Ethernet interfaces, Cisco DNA Center uses the serial interface with the highest IP address.
After a device is discovered, you can update the management IP address from the Inventory window. For
more information, see Update Device Resync Interval, on page 77.
Perform Discovery
Discover Your Network Using CDP
You can discover devices using Cisco Discovery Protocol (CDP), an IP address range, or LLDP. This procedure
shows you how to discover devices and hosts using CDP. For more information about the other discovery
methods, see Discover Your Network Using an IP Address Range, on page 21 and Discover Your Network
Using LLDP, on page 26.
Note • The Discovery function requires the correct SNMP Read Only (RO) community string. If an SNMP RO
community string is not provided, as a best effort, the Discovery function uses the default SNMP RO
community string, public.
• CLI credentials are not required to discover hosts; hosts are discovered through the network devices that
they are connected to.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 In the Discovery Name field, enter a name.
Step 3 Expand the IP Address/Ranges area if it is not already visible, and configure the following fields:
a) For Discovery Type, click CDP.
b) In the IP Address field, enter a seed IP address for Cisco DNA Center to start the Discovery scan.
c) (Optional) In the Subnet Filter field, enter an IP address or subnet to exclude from the Discovery scan.
You can enter addresses either as an individual IP address (x.x.x.x) or as a classless inter-domain routing
(CIDR) address (x.x.x.x/y), where x.x.x.x refers to the IP address and y refers to the subnet mask. The
subnet mask can be a value from 0 to 32.
d) Click .
Repeat Step c and Step d to exclude multiple subnets from the Discovery job.
e) (Optional) In the CDP Level field, enter the number of hops from the seed device that you want to scan.
Valid values are from 1 to 16. The default value is 16. For example, CDP level 3 means that CDP will
scan up to three hops from the seed device.
f) From the Preferred Management IP drop-down list, choose either None or Use Loopback.
Choose None to allow the device use any of its IP addresses or choose Use Loopback IP to specify the
device's loopback interface IP address. If you choose Use Loopback IP and the device does not have a
loopback interface, Cisco DNA Center chooses a management IP address using the logic described in
Preferred Management IP Address, on page 14.
Note To use the loopback interface IP address as the preferred management IP address, make sure
that the CDP neighbor's IP address is reachable from Cisco DNA Center.
Step 4 Expand the Credentials area and configure the credentials that you want to use for the Discovery job.
Choose any of the global credentials that have already been created or configure your own Discovery credentials.
If you configure your own credentials, you can save them for only the current job by clicking Save or you
can save them for the current and future jobs by checking the Save as global settings check box and then
clicking Save.
a) Make sure that the global credentials that you want to use are selected. If you do not want to use a credential,
deselect it.
b) To add additional credentials, click Add Credentials.
c) To configure CLI credentials, configure the following fields:
Field Description
Field Description
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Field Description
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Field Description
Name/Description Name or description of the SNMPv3 settings that you are adding.
Mode Security level that an SNMP message requires. Choose one of the following modes:
• noAuthNoPriv—Does not provide authentication or encryption.
• AuthNoPriv—Provides authentication, but does not provide encryption.
• AuthPriv—Provides both authentication and encryption.
Auth Type Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv
as the authentication mode.) Choose one of the following authentication types:
• SHA—Authentication based on HMAC-SHA.
• MD5—Authentication based on HMAC-MD5.
Auth Password SNMPv3 password used for gaining access to information from devices that use
SNMPv3. These passwords (or passphrases) must be at least 8 characters in length.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Field Description
Privacy Type Privacy type. (Enabled if you select AuthPriv as a the authentication mode.) Choose
one of the following privacy types:
• DES—DES 56-bit (DES-56) encryption in addition to authentication based
on the CBC DES-56 standard.
• AES128—CBC mode AES for encryption.
• None—No privacy.
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages that are exchanged with devices that support DES or AES128 encryption.
Passwords (or passphrases) must be at least 8 characters long.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Field Description
Field Description
Type Specifies the kind of HTTPS credentials you are configuring. Valid types are Read
or Write.
Field Description
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the
configuration.
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the
configuration.
h) (Optional) If you have network devices with NETCONF enabled, click NETCONF and enter a port
number in the Port field.
Note For an Evolved Converged Access (eCA) switch, enter the port number 830. If NETCONF is
not already enabled on the devices, you can set up Device Controllability to configure NETCONF
for you. For more information about Device Controllability, see the Cisco Digital Network
Architecture Center Administrator Guide
.
Step 5 (Optional) To configure the protocols to be used to connect with devices, expand the Advanced area and do
the following tasks:
a) Click the names of the protocols that you want to use. A green check mark indicates that the protocol is
selected.
Valid protocols are SSH (default) and Telnet.
b) Drag and drop the protocols in the order that you want them to be used.
Step 6 Click Start.
The Discoveries window displays the results of your scan.
The Discovery Details pane shows the status (active or inactive) and the Discovery configuration. The
Discovery Devices pane displays the host names, IP addresses, and status of the discovered devices.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 In the Discovery Name field, enter a name.
Step 3 Expand the IP Address/Ranges area, if it is not already visible, and configure the following fields:
a) For Discovery Type, click Range.
b) In the IP Ranges field, enter the beginning and ending IP addresses (IP address range) for Cisco DNA
Center to scan and click .
You can enter a single IP address range or multiple IP addresses for the discovery scan.
Note Cisco Wireless Controllers must be discovered using the Management IP address instead of the
Service Port IP address. If not, the related wireless controller 360 and AP 360 pages will not
display any data.
Step 4 Expand the Credentials area and configure the credentials that you want to use for the Discovery job.
Choose any of the global credentials that have already been created or configure your own Discovery credentials.
If you configure your own credentials, you can save them for only the current job by clicking Save, or you
can save them for the current and future jobs by checking the Save as global settings check box and then
clicking Save.
a) Make sure that the global credentials that you want to use are selected. If you do not want to use a credential,
deselect it.
b) To add additional credentials, click Add Credentials.
c) To configure CLI credentials, configure the following fields:
Field Description
Field Description
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Field Description
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Field Description
Name/Description Name or description of the SNMPv3 settings that you are adding.
Mode Security level that an SNMP message requires. Choose one of the following modes:
• noAuthNoPriv—Does not provide authentication or encryption.
• AuthNoPriv—Provides authentication, but does not provide encryption.
• AuthPriv—Provides both authentication and encryption.
Auth Type Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv
as the authentication mode.) Choose one of the following authentication types:
• SHA—Authentication based on HMAC-SHA.
• MD5—Authentication based on HMAC-MD5.
Auth Password SNMPv3 password used for gaining access to information from devices that use
SNMPv3. These passwords (or passphrases) must be at least 8 characters in length.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Field Description
Privacy Type Privacy type. (Enabled if you select AuthPriv as a the authentication mode.) Choose
one of the following privacy types:
• DES—DES 56-bit (DES-56) encryption in addition to authentication based
on the CBC DES-56 standard.
• AES128—CBC mode AES for encryption.
• None—No privacy.
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages that are exchanged with devices that support DES or AES128 encryption.
Passwords (or passphrases) must be at least 8 characters long.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Field Description
Field Description
Type Specifies the kind of HTTPS credentials you are configuring. Valid types are Read
or Write.
Field Description
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the
configuration.
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the
configuration.
h) (Optional) If you have network devices with NETCONF enabled, click NETCONF and enter a port
number in the Port field.
Note If NETCONF is not already enabled on the devices, you can set up Device Controllability to
configure NETCONF for you. For more information about Device Controllability, see the Cisco
Digital Network Architecture Center Administrator Guide.
Step 5 (Optional) To configure the protocols that are to be used to connect with devices, expand the Advanced area
and do the following tasks:
a) Click the protocols that you want to use. A green check mark indicates that the protocol is selected.
Valid protocols are SSH (default) and Telnet.
b) Drag and drop the protocols in the order that you want them to be used.
Step 6 Click Start.
Note • The Discovery function requires the correct SNMP Read Only (RO) community string. If an SNMP RO
community string is not provided, as a best effort, the Discovery function uses the default SNMP RO
community string, public.
• CLI credentials are not required to discover hosts; hosts are discovered through the network devices that
they are connected to.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 In the Discovery Name field, enter a name.
Step 3 Expand the IP Address/Range area if it is not already visible, and configure the following fields:
a) For Discovery Type, click LLDP.
b) In the IP Address field, enter a seed IP address for Cisco DNA Center to start the Discovery scan.
c) (Optional) In the Subnet Filter field, enter an IP address or subnet to exclude from the Discovery scan.
You can enter addresses either as an individual IP address (x.x.x.x) or as a classless inter-domain routing
(CIDR) address (x.x.x.x/y), where x.x.x.x refers to the IP address and y refers to the subnet mask. The
subnet mask can be a value from 0 to 32.
d) Click .
Repeat Step c and Step d to exclude multiple subnets from the Discovery job.
e) (Optional) In the LLDP Level field, enter the number of hops from the seed device that you want to scan.
Valid values are from 1 to 16. The default value is 16. For example, LLDP level 3 means that LLDP will
scan up to three hops from the seed device.
f) From the Preferred Management IP drop-down list, choose either None or Use Loopback.
Choose None to allow the device use any of its IP addresses, or choose Use Loopback IP to specify the
device's loopback interface IP address. If you choose Use Loopback IP and the device does not have a
loopback interface, Cisco DNA Center chooses a management IP address using the logic described in
Preferred Management IP Address, on page 14.
Note To use the loopback interface IP address as the preferred management IP address, make sure
that the LLDP neighbor's IP address is reachable from Cisco DNA Center.
Step 4 Expand the Credentials area and configure the credentials that you want to use for the Discovery job.
Choose any of the global credentials that have already been created, or configure your own Discovery
credentials. If you configure the credentials, you can choose to save them for future jobs by checking the Save
as global settings check box.
a) Make sure that the global credentials that you want to use are selected. If you do not want to use a credential,
deselect it.
b) To add additional credentials, click Add Credentials.
c) For CLI credentials, configure the following fields:
Field Description
Field Description
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Field Description
Name/Description Name or description of the SNMPv3 settings that you are adding.
Mode Security level that an SNMP message requires. Choose one of the following modes:
• noAuthNoPriv—Does not provide authentication or encryption.
• AuthNoPriv—Provides authentication, but does not provide encryption.
• AuthPriv—Provides both authentication and encryption.
Auth Type Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv
as the authentication mode.) Choose one of the following authentication types:
• SHA—Authentication based on HMAC-SHA.
• MD5—Authentication based on HMAC-MD5.
Field Description
Auth Password SNMPv3 password used for gaining access to information from devices that use
SNMPv3. These passwords (or passphrases) must be at least 8 characters in length.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Privacy Type Privacy type. (Enabled if you select AuthPriv as a the authentication mode.) Choose
one of the following privacy types:
• DES—DES 56-bit (DES-56) encryption in addition to authentication based
on the CBC DES-56 standard.
• AES128—CBC mode AES for encryption.
• None—No privacy.
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages that are exchanged with devices that support DES or AES128 encryption.
Passwords (or passphrases) must be at least 8 characters long.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Field Description
Field Description
Type Specifies the kind of HTTPS credentials you are configuring. Valid types are Read
or Write.
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the
configuration.
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the
configuration.
Step 5 (Optional) To configure the protocols to be used to connect with devices, expand the Advanced area and do
the following tasks:
a) Click the names of the protocols that you want to use. A green check mark indicates that the protocol is
selected. Valid protocols are SSH (default) and Telnet.
b) Drag and drop the protocols in the order that you want them to be used.
Step 6 Click Start.
The Discoveries window displays the results of your scan.
The Discovery Details pane shows the status (active or inactive) and the Discovery configuration. The
Discovery Devices pane displays the host names, IP addresses, and status of the discovered devices.
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 To stop an active Discovery job, perform these steps:
a) From the Discoveries pane, select the corresponding Discovery job.
b) Click Stop.
Step 3 To restart an inactive Discovery job, perform these steps:
a) From the Discoveries pane, select the corresponding Discovery job.
b) Click Start.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 From the Discoveries pane, select the Discovery job.
Step 3 Click Edit.
Step 4 Depending on the Discovery type, you can change the type of Discovery job, except for the following fields:
• CDP—Discovery name, Discovery type, IP address. For more information about the fields you can
change, see Discover Your Network Using CDP, on page 15.
• IP Range—Discovery name, Discovery type, IP address range (although you can add additional IP
address ranges). For more information about the fields you can change, see Discover Your Network
Using an IP Address Range, on page 21.
• LLDP—Discovery name, Discovery type, IP address. For more information about the fields you can
change, see Discover Your Network Using LLDP, on page 26.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 From the Discoveries pane, select the Discovery job.
Step 3 Click Edit.
Step 4 Expand the Credentials area.
Step 5 Deselect the credentials that you do not want to use.
Step 6 Configure the credentials that you want to use:
a) Click Add Credentials.
b) To configure CLI credentials, configure the following fields:
Field Description
Field Description
Field Description
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Note Passwords are encrypted for security reasons and are not displayed in
the configuration.
Field Description
Name/Description Name or description of the SNMPv3 settings that you are adding.
Mode Security level that an SNMP message requires. Choose one of the following modes:
• noAuthNoPriv—Does not provide authentication or encryption.
• AuthNoPriv—Provides authentication, but does not provide encryption.
• AuthPriv—Provides both authentication and encryption.
Field Description
Auth Type Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv
as the authentication mode.) Choose one of the following authentication types:
• SHA—Authentication based on HMAC-SHA.
• MD5—Authentication based on HMAC-MD5.
Auth Password SNMPv3 password used for gaining access to information from devices that use
SNMPv3. These passwords (or passphrases) must be at least 8 characters in length.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Privacy Type Privacy type. (Enabled if you select AuthPriv as a the authentication mode.) Choose
one of the following privacy types:
• DES—DES 56-bit (DES-56) encryption in addition to authentication based
on the CBC DES-56 standard.
• AES128—CBC mode AES for encryption.
• None—No privacy.
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages that are exchanged with devices that support DES or AES128 encryption.
Passwords (or passphrases) must be at least 8 characters long.
Note • Some wireless controllers require that passwords (or passphrases)
be at least 12 characters long. Be sure to check the minimum
password requirements for your wireless controllers. Failure to
ensure these required minimum character lengths for passwords
results in devices not being discovered, monitored, or managed by
Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed
in the configuration.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 From the Discoveries pane, select the Discovery job.
Step 3 Click Clone.
Cisco DNA Center creates a copy of the Discovery job, named Copy of Discovery_Job.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 From the Discoveries pane, select the Discovery job that you want to delete.
Step 3 Click Delete.
Step 4 Click OK to confirm.
Procedure
Step 1 From the Cisco DNA Center home page, click Discovery.
Step 2 From the Discoveries pane, select the Discovery job. Alternatively, use the Search function to find a Discovery
job by device IP address or name.
Step 3 Click the down arrow next to one of the following areas for more information:
• Discovery Details—Displays the parameters that were used to run the Discovery job. Parameters include
attributes such as the CDP or LLDP level, IP address range, and protocol order.
• Credentials—Provides the names of the credentials that were used.
• History—Lists each Discovery job that was run, including the status (completed or in progress), the time
it was run, its duration, and whether any devices were discovered. You can click View to display discovery
information per device, such as the status of the device and which device credentials were successful.
User the Filter function to display devices by any combination of IP addresses or ICMP, CLI, HTTPS,
or NETCONF values.
For more information on typical use cases and workflows, see Network Plug and Play Use Cases, on page
39.
To access the Network Plug and Play application after it is installed, from the Cisco DNA Center home
page, click the Network Plug and Play tool. Table 20: Network Plug and Play Dashboard Elements, on page
38 describes the elements in the Network Plug and Play dashboard.
Element Description
Add images, or Manage x images Shows the number of software images that are
available in the Cisco DNA Center image repository,
or shows Add, if there are none. Click the link to go
to the image repository. For more information, see
Manage Software Images, on page 83.
Add templates, or Manage x templates Shows the number of configuration templates that are
available in the Cisco DNA Center template editor,
or shows Add, if there are none. Click the link to go
to the template editor. For more information, see
Create Templates to Automate Device Configuration
Changes, on page 149.
Add workflows, or Manage x workflows Shows the number of Network Plug and Play
workflows that are defined, or shows Add, if there
are none. Click the link to go to the Workflows tab.
For more information, see Workflows Overview, on
page 47.
Manage Smart Account Sync Click Manage to go to Settings > Smart Accounts
to manage Smart Account synchronization. For more
information, see Manage Cisco Smart Accounts, on
page 55.
x devices are in error state Click the number to go to the Devices tab that is
filtered on devices in the Error state.
x planned devices not called in Click the number to go to the Devices tab that is
filtered on devices in the Planned state and that have
not been contacted.
x devices have been provisioned Click the number to go to the Devices tab that is
filtered on devices in the Provisioned state.
Element Description
Devices States chart Pie chart showing the number of devices in each of
the following states:
• Error—Device had an error and could not be
provisioned.
• Unclaimed—Device has not been assigned a
workflow.
• Planned—Device is added to Network Plug and
Play and has been assigned a workflow, but has
not yet contacted the server.
• Provisioned—Device is successfully onboarded
and added to inventory.
Device Sources chart Pie chart showing the number of devices from each
of the following sources:
• User—Devices added by a user.
• Network—Devices that appeared on the network
and were not added by a user.
• SmartAccount—Devices added through
synchronization with a Cisco Smart Account.
• Migrated—Devices that were migrated from
Cisco DNA Center 1.1.
Planned Provisioning
An administrator can plan the provisioning of a new site or other group of network devices as follows:
1. Upload software images to be deployed to devices. See Import Software Images, on page 85.
2. Define configuration templates or files to be applied to devices. See Create Templates to Automate Device
Configuration Changes, on page 149.
3. Create a workflow for the different types of devices to be deployed. See Create or Edit a Workflow, on
page 49.
4. Add details about planned devices one at a time or in bulk with a CSV file. See Add or Edit a Device, on
page 43 or Add Devices in Bulk, on page 44.
5. Devices boot up and are automatically provisioned according to their workflows.
Unclaimed Provisioning
If a new network device is added to the network before it can be planned, it is labeled as an unclaimed device.
An administrator can claim it by assigning it a workflow, or by directly provisioning it with a software image
and a configuration template, as follows:
1. Find the device on the unclaimed devices list. See View Devices, on page 43.
2. Claim the device by assigning a workflow or by directly assigning a software image and configuration
template. See Claim a Device, on page 45.
Note When provisioning Cisco Firepower Threat Defense Virtual through the NFV provisioning flow, the default
credential username is retained and the password is updated based on the settings in the credential profile
assigned to the site in Network Settings.
To manage devices, you can use the controls above the device list, shown in Table 21: Device Controls, on
page 41.
Note Not all options are available under each device tab. For example, the Edit and Claim options are available
only from the All Devices and Unclaimed tabs. Additionally, some of the options are available from the
device details window that opens when you click a device name.
Control Description
Edit Select one device and click Edit to edit the device.
For more information, see Add or Edit a Device, on
page 43.
Find Enter a search term in the Find field to find all the
devices that have that term in a column. Use the
asterisk (*) character as a wildcard anywhere in the
search string.
The Device table displays the information shown in Table 22: Device Information, on page 42 for each device.
All of the columns support sorting. Click the column header to sort the rows in ascending order. Click the
column header again to sort the rows in descending order.
Note Not all columns are used in each device tab. Additionally, some of the columns are hidden in the default
column view setting, which can be customized by clicking on the 3 dots ( ) at the right end of the column
headings.
Column Description
Name Name of the device. Click this link to open the device
details window. For more information, see View
Devices, on page 43. A stack icon indicates a switch
stack.
Last Contact Last date and time the device contacted Network Plug
and Play.
Added On Date and time when the device was added to Network
Plug and Play.
View Devices
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click the Devices tab.
The All Devices tab lists all of the devices. You can use the Filter or Find option to find a device, or click
the Unclaimed, Provisioned, or Errors tab to see specific types of devices.
Step 4 Click the Details, History, Workflow, and Stack tabs to view the different types of information for the device.
Some tabs have additional links that you can click for more information.
The Stack tab appears only for a switch stack device.
Step 5 Click the following actions at the top of the dialog box to perform specific tasks on the device. Available
actions depend on the device state.
• Refresh—Refreshes the device state information.
• Claim—Claims the device. See Claim a Device, on page 45.
• Edit—Edits the device. See Add or Edit a Device, on page 43.
• Reset—Resets the device. See Delete or Reset a Device, on page 47.
• Delete—Deletes the device. See Delete or Reset a Device, on page 47.
Field Description
Serial Number Device serial number (read only if you are editing a
device).
Field Description
SUDI Serial Numbers Devices that support SUDI have two serial numbers:
the chassis serial number and the SUDI serial number
(called the License SN on the device label). Enter one
or more comma-separated SUDI serial numbers in
this field when adding a device that uses SUDI
authentication. This field appears only if Enable
SUDI Authorization is checked.
This Device Represents a Stack Device represents a stack (this item is read only if you
are editing a device). Applicable only for supported
stackable switches that are being planned.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click the Devices tab.
The All Devices tab lists all of the devices. You can use the Filter or Find option to find a device, or click
the Unclaimed tab to see only the unclaimed devices.
Step 4 Set the fields as needed, referring to Table 23: Device Fields, on page 43 for more information.
Step 5 Save the settings by doing one of the following:
• If you are adding a device and will claim it later, click Add Device.
• If you are adding a device and want to claim it by assigning a workflow to it, click Add + Claim. For
more information, see Claim a Device, on page 45
• If you are editing a device, click Edit Device.
Note If you add a device that already exists in Network Plug and Play, there is no change to the existing device.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click the Devices tab.
Step 3 Click Add.
The Add Devices dialog is displayed.
Step 9 Check the box next to each device to import, or click the check box at the top to select all devices.
Step 10 Add the devices by doing one of the following:
• To add the devices and claim them later, click Add Devices.
• To add the devices and claim them by assigning one workflow to the whole group, click Add + Claim.
For more information, see Claim a Device, on page 45
Claim a Device
Claiming a device assigns a provisioning workflow to it. If you claim a device that has not yet booted for the
first time, then you are planning the device so that it is automatically provisioned when it boots.
This procedure shows how to claim a device from the Devices tab. Alternatively, you can claim a device from
the device details window by clicking Claim.
• Optionally, define one or more workflows that you want to use to provision devices. For more information,
see Create or Edit a Workflow, on page 49.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click the Devices tab.
The All Devices tab lists all of the devices. You can use the Filter or Find option to find a device, or click
the Unclaimed tab to see only the unclaimed devices.
Step 6 (Optional) From the Workflow drop-down list, optionally choose a workflow to assign to the devices.
Skip to Step 9 if you selected a workflow, or continue with the Step 7 if you want to directly assign a software
image or configuration.
Step 7 (Optional) In the Image area, choose a software image to apply to the devices, by doing one of the following:
• Click Image and choose an image that has been uploaded to the Cisco DNA Center image repository.
After you choose an image, you can view details about it by clicking Image Details.
• Click Import Image to open the Cisco DNA Center image repository in a new tab and import an image.
After you import an image, you can view details about it by clicking Image Details.
• Click URL and specify a TFTP or USB source from which the device can download the software image.
Step 8 (Optional) In the Configuration area, choose a configuration file or template to apply to the devices, by doing
one of the following:
• Click File and choose a configuration file that has been previously imported. After you choose a file,
you can view it by clicking View File.
• Click Import File and import a configuration file. After you import a file, you can view it by clicking
View File.
• Click Template and choose a template project and template that has been previously defined in the Cisco
DNA Center Template Editor tool. After you choose a template, you can view it by clicking View
Template.
• Click URL and specify a TFTP or USB source from which the device can download the configuration
file.
Step 9 If a configuration template is part of the selected workflow or was chosen directly, specify the values for the
parameters that were defined in the template.
A row for each device is displayed in a table and template parameter names are shown as column names.
Enter the values for each parameter in the fields for each device. A red asterisk indicates required fields.
Step 10 (Optional) Click Add Workflow if you want to add a new workflow.
For more information, see Create or Edit a Workflow, on page 49.
Step 11 Click Claim to claim the devices and start the provisioning process.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click the Devices tab.
The All Devices tab lists all of the devices. You can use the Filter or Find option to find a device, or click
the Unclaimed, Provisioned, or Errors tab to see specific types of devices.
Step 3 Check the check box next to one or more devices that you want to delete or reset.
Step 4 Click Delete or Reset.
A confirmation dialog box is displayed.
Step 5 If you are resetting a device, choose one of the following workflow options:
• Reset and keep current workflow—Current workflow remains and device goes to Planned state.
• Reset and remove current workflow—Workflow is removed and device goes to Unclaimed state.
Control Description
Find Enter a search term in the Find field to find all the
workflows that have that term in a column. Use the
asterisk (*) character as a wildcard anywhere in the
search string.
The Workflows table displays the fields shown in Table 25: Workflows Information, on page 48 for each
workflow. The Workflow column supports sorting. Click the column header to sort the rows in ascending
order. Click the column header again to sort the rows in descending order.
Note Some of the columns are hidden in the default column view setting, which can be customized by clicking the
3 dots ( ) at the right end of the column headings.
Column Description
Column Description
Modified Date and time when the workflow was last modified.
View a Workflow
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click the Workflows tab.
The Workflows tab lists all of the workflows. You can use the Filter or Find option to find a workflow.
Step 4 Click the arrow next to a task to expand the task and display the details.
Step 5 Click the Devices tab to see the devices that are using the workflow.
Step 6 Click the following actions at the top of the dialog to perform specific tasks on the workflow.
• Clone—Clones the workflow. See Clone a Workflow, on page 52.
• Edit—Edits the workflow. See Create or Edit a Workflow, on page 49.
• Delete—Deletes the workflow. See Delete a Workflow, on page 54.
Field Description
Field Description
Field Description
Tasks > Renumber Stack Renumbers a switch stack. A user is asked during the claim process to set
the device that is at the top of the stack. This task applies only to the Cisco
Catalyst 3650, 3850, and 9000 Series switches that support stacking, and only
if they use the following stack-cabling scheme:
Figure 3: Stack Cabling Required for Renumbering
Tasks > Stack License Specifies a switch stack license level. A user is asked during the claim process
to specify the license level of the stack. Applies only to the Cisco Catalyst
3650, 3850, and 9000 Series switches that support stacking.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click Workflows.
Step 3 You can add or edit a workflow:
• To add a new workflow, click Add.
• To edit an existing workflow, click the radio button next to the workflow name and click Edit.
Step 4 Set the fields as needed by referring to Table 26: Workflow Fields, on page 49.
Step 5 By default, Image and Configuration tasks are included in a new workflow. If you do not need a task, you
can delete it by clicking the trash can icon next to the task.
Step 6 Click New Task and optionally add one or more additional tasks to the workflow.
Step 7 To change the order of tasks in the workflow, click the up or down arrow icons next to a task to adjust its
order.
Step 8 Click Add to create the new workflow or Update to save an edited workflow.
Clone a Workflow
Cloning a workflow makes a copy of it and allows you to change the copy.
This procedure shows how to clone a workflow from the Workflows tab. Alternately, you can clone a workflow
from the workflow details pane by clicking Clone.
Field Description
Field Description
Tasks > Renumber Stack Renumbers a switch stack. A user is asked during the claim process to set
the device that is at the top of the stack. This task applies only to the Cisco
Catalyst 3650, 3850, and 9000 Series switches that support stacking, and only
if they use the following stack-cabling scheme:
Figure 4: Stack Cabling Required for Renumbering
Field Description
Tasks > Stack License Specifies a switch stack license level. A user is asked during the claim process
to specify the license level of the stack. Applies only to the Cisco Catalyst
3650, 3850, and 9000 Series switches that support stacking.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Click the Workflows tab.
The Workflows tab lists all of the workflows. You can use the Filter or Find option to find a workflow.
Delete a Workflow
You cannot delete a workflow that has devices assigned to it. You must first assign those devices to a different
workflow before deleting it.
Procedure
Step 1 From the Cisco DNA Center home page, click Network Plug and Play.
Step 2 Click Workflows.
Step 3 Click the radio button next to the workflow name and click Delete.
Step 4 Click Delete in the confirmation dialog.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Choose Settings > EULA Acceptance.
Step 3 To read the EULA, click the End User License Agreement link.
Step 4 Check the Accept EULA check box.
Step 5 Click Apply.
Field Description
Use as Default Controller Profile Check this check box to register this Cisco DNA
Center controller as the default controller in the Cisco
Plug and Play Connect cloud portal.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Choose Settings > Smart Accounts.
The table lists all of the registered virtual account profiles.
Step 4 Set the fields as needed by referring to Table 28: Virtual Account Fields, on page 56.
Step 5 Save the settings by doing one of the following:
• If you are registering a new virtual account profile, click Register.
• If you are editing a virtual account profile, click Change.
What to do next
Synchronize the device inventory from Cisco Plug and Play Connect to Network Plug and Play. For more
information, see View, Synchronize, and Deregister Smart Accounts, on page 57.
Control Description
Edit Profile Select a virtual account profile and click Edit Profile
to edit it. For more information, see Register or Edit
a Virtual Account, on page 55.
Find Enter a search term in the Find field to find all virtual
account profiles that have that term in a column. Use
the asterisk (*) character as a wildcard anywhere in
the search string.
The Virtual Accounts table displays the information shown in Table 30: Virtual Accounts Information, on
page 57 for each profile.
Column Description
Last Sync Time Last time the device inventory from the virtual account
was synchronized with Network Plug and Play.
Procedure
Step 1 From the Cisco DNA Center home page, choose Network Plug and Play.
Step 2 Choose Settings > Smart Accounts.
Step 3 Click the name of a virtual account profile to display detailed information.
Step 4 Click Sync to synchronize the device inventory from Cisco Plug and Play Connect in this virtual account to
Network Plug and Play.
Step 5 To remove this virtual account profile, click Deregister.
Step 6 In the confirmation dialog box, click Deregister.
What to do next
Claim the newly synchronized devices by assigning a workflow, or by directly assigning a software image
and configuration template. For more information, see Claim a Device, on page 45.
About Inventory
The Inventory function retrieves and saves details, such as host IP addresses, MAC addresses, and network
attachment points about devices in its database.
The Inventory feature can also work with the Device Controllability feature to configure the required network
settings on devices, if these settings are not already present on the device. For more information about Device
Controllability, see the Cisco Digital Network Architecture Center Administrator Guide.
Inventory uses the following protocols, as required:
• Link Layer Discovery Protocol (LLDP).
• IP Device Tracking (IPDT) or Switch Integrated Security Features (SISF). (IPDT or SISF must be enabled
on the device.)
• LLDP Media End-point Discovery. (This protocol is used to discover IP phones and some servers.)
• Network Configuration Protocol (NETCONF). For a list of devices, see Discovery Prerequisites, on page
12.
After the initial discovery, Cisco DNA Center maintains the inventory by polling the devices at regular
intervals. The default and minimum interval is every 25 minutes. However, you can change this interval up
to 24 hours, as required for your network environment. For more information, see Update Device Resync
Interval, on page 77. Polling occurs for each device, link, host, and interface. Only the devices that have been
active for less than a day are displayed. This prevents stale device data, if any, from being displayed. On an
average, polling 500 devices takes approximately 20 minutes.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Table 31: Inventory, on page 61 describes the information that is available.
Column Description
Column Description
Uptime Period of time that the device has been up and running.
Column Description
Device Role Role assigned to each discovered device during the scan process. The
device role is used to identify and group devices according to their
responsibilities and placement within the network. If Cisco DNA Center
is unable to determine a device role, it sets the device role to Unknown.
Note If you manually change the device role, the assignment remains
static. Cisco DNA Center does not update the device role even
if it detects a change during a subsequent device
resynchronization.
If required, you can use the drop-down list in this column to change the
assigned device role. The following device roles are available:
• Unknown
• Access
• Core
• Distribution
• Border Router
Site The site to which the device is assigned. For more information, see About
Network Hierarchy, on page 98.
Last Updated Most recent date and time that Cisco DNA Center scanned the device and
updated the database with new information about the device.
Device Family Group of related devices, such as routers, switches and hubs, or wireless
controllers.
Device Series Series number of the device, for example, Cisco Catalyst 4500 Series
Switches.
Resync Interval The polling interval for the device. This interval can be set globally in
Settings or for a specific device in Inventory. For more information, see
the Cisco Digital Network Architecture Center Administrator Guide.
Column Description
Last Sync Status Status of the last Discovery scan for the device:
• Managed—Device is in a fully managed state.
• Partial Collection Failure—Device is in a partial collected state
and not all the inventory information has been collected. Move the
cursor over the Information (i) icon to display additional information
about the failure.
• Unreachable—Device cannot be reached and no inventory
information was collected due to device connectivity issues. This
condition occurs when periodic collection takes place.
• Wrong Credentials—If device credentials are changed after adding
the device to the inventory, this condition is noted.
• In Progress—Inventory collection is occurring.
Step 2 (Optional) To change the layout, click and choose one of the following layouts, or customize your own
layout:
• Status—Layout shows the Device Name, IP Address, Reachability Status, Uptime, Last Updated
Time, Poller Time, and Last Inventory Collection Status.
• Hardware—Layout shows the Device Name, IP Address, MAC Address, IOS/Firmware, Platform,
Serial Number, Last Inventory Collection Status, Config, and Device Family.
• Tagging—Layout shows the Device Name, IP Address, MAC Address, Config, Device Role, Location,
and Device Tag.
Note For a complete list of supported devices, see the Cisco Digital Network Architecture Center Supported Devices
document.
• Network Devices—Supported network devices include Cisco routers, switches, and wireless devices
such as wireless controlers (WLCs) and access points (APs).
• Compute Devices—Supported compute devices include the Cisco Unified Computing System (UCS),
devices running Cisco Enterprise Network Functions Virtualization Infrastructure Software (NFVIS),
and other data center devices.
• Meraki Dashboard—Dashboard to the Cisco cloud management platform for managing Cisco Meraki
products.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Click Add.
The Add Device dialog box is displayed.
Field Description
Note Passwords are encrypted for security reasons and are not displayed in the
configuration.
Note Passwords are encrypted for security reasons and are not displayed in the
configuration.
Field Description
Name/Description Name or description of the SNMPv3 settings that you are adding.
Mode Security level that an SNMP message requires. Choose one of the following modes:
• noAuthNoPriv—Does not provide authentication or encryption.
• AuthNoPriv—Provides authentication, but does not provide encryption.
• AuthPriv—Provides both authentication and encryption.
Auth Type Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv as
the authentication mode.) Choose one of the following authentication types:
• SHA—Authentication based on HMAC-SHA.
• MD5—Authentication based on HMAC-MD5.
Auth Password SNMPv3 password used for gaining access to information from devices that use
SNMPv3. These passwords (or passphrases) must be at least 8 characters in length.
Note • Some wireless controllers require that passwords (or passphrases) be
at least 12 characters long. Be sure to check the minimum password
requirements for your wireless controllers. Failure to ensure these
required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in
the configuration.
Privacy Type Privacy type. (Enabled if you select AuthPriv as a the authentication mode.) Choose
one of the following privacy types:
• DES—DES 56-bit (DES-56) encryption in addition to authentication based on
the CBC DES-56 standard.
• AES128—CBC mode AES for encryption.
• None—No privacy.
Field Description
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages that are exchanged with devices that support DES or AES128 encryption.
Passwords (or passphrases) must be at least 8 characters long.
Note • Some wireless controllers require that passwords (or passphrases) be
at least 12 characters long. Be sure to check the minimum password
requirements for your wireless controllers. Failure to ensure these
required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in
the configuration.
Step 7 Expand the SNMP RETRIES AND TIMEOUT area, if it is not already expanded, and configure the following
fields.
Field Description
Retries Number of attempts allowed to connect to the device. Valid values are from 1 to 3. The
default is 3.
Timeout (in Number of seconds Cisco DNA Center waits for when trying to establish a connection
Seconds) with a device before timing out. Valid values are from 1 to 300 seconds in intervals of
5 seconds. The default is 5 seconds.
Step 8 Expand the CLI area, if it is not already expanded, and configure the following fields:
Field Description
Field Description
Step 9 Expand the NETCONF area, if it is not already expanded, and configure the Port field.
NETCONF requires that you configure SSH as the CLI protocol and define the SSH credentials.
Related Topics
Types of Devices in the Cisco DNA Center Inventory, on page 64
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Select the network devices that you want to update.
Step 3 From the Actions drop-down list, choose Update Credentials.
Step 4 From the Type drop-down field, select Network Device if it is not already selected.
Step 5 Expand the SNMP area, if it is not already expanded.
Step 6 From the Version field, choose the SNMP version (V2C or V3).
Note Because both the SNMP and CLI credentials are updated together, we recommend that you provide
both credentials. If you provide only SNMP credentials, Cisco DNA Center saves only the SNMP
credentials, and the CLI credentials are not updated.
Step 7 Depending on the whether you choose V2C or V3, enter information in the remaining fields, which are
described in the following tables.
Field Description
Note Passwords are encrypted for security reasons and are not displayed in the
configuration.
Note Passwords are encrypted for security reasons and are not displayed in the
configuration.
Field Description
Name/Description Name or description of the SNMPv3 settings that you are adding.
Mode Security level that an SNMP message requires. Choose one of the following modes:
• noAuthNoPriv—Does not provide authentication or encryption.
• AuthNoPriv—Provides authentication, but does not provide encryption.
• AuthPriv—Provides both authentication and encryption.
Auth Type Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv as
the authentication mode.) Choose one of the following authentication types:
• SHA—Authentication based on HMAC-SHA.
• MD5—Authentication based on HMAC-MD5.
Field Description
Auth Password SNMPv3 password used for gaining access to information from devices that use
SNMPv3. These passwords (or passphrases) must be at least 8 characters in length.
Note • Some wireless controllers require that passwords (or passphrases) be
at least 12 characters long. Be sure to check the minimum password
requirements for your wireless controllers. Failure to ensure these
required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in
the configuration.
Privacy Type Privacy type. (Enabled if you select AuthPriv as a the authentication mode.) Choose
one of the following privacy types:
• DES—DES 56-bit (DES-56) encryption in addition to authentication based on
the CBC DES-56 standard.
• AES128—CBC mode AES for encryption.
• None—No privacy.
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages that are exchanged with devices that support DES or AES128 encryption.
Passwords (or passphrases) must be at least 8 characters long.
Note • Some wireless controllers require that passwords (or passphrases) be
at least 12 characters long. Be sure to check the minimum password
requirements for your wireless controllers. Failure to ensure these
required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in
the configuration.
Step 8 Expand the SNMP RETRIES AND TIMEOUT area, if it is not already expanded, and complete the following
fields:
Field Description
Retries Number of attempts allowed to connect to the device. Valid values are from 1 to 3. The
default is 3.
Timeout (in Number of seconds Cisco DNA Center waits for when trying to establish a connection
Seconds) with a device before timing out. Valid values are from 1 to 300 seconds in intervals of
5 seconds. The default is 5 seconds.
Step 9 Expand the CLI area, if it is not already expanded, and complete the following fields:
Note Both the SNMP and CLI credentials are updated together, so you need to provide both credentials.
If you provide only SNMP credentials, Cisco DNA Center saves only the SNMP credentials. The
CLI credentials are not updated.
Field Description
Step 10 Expand the NETCONF area, if it is not already expanded, and configure the Port field.
NETCONF requires that you configure SSH as the CLI protocol and define the SSH credentials.
Related Topics
Types of Devices in the Cisco DNA Center Inventory, on page 64
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Click Add.
The Add Device dialog box is displayed.
Related Topics
Types of Devices in the Cisco DNA Center Inventory, on page 64
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Select the devices that you want to update.
Step 3 From the Actions drop-down list, choose Update Credentials.
Step 4 From the Type drop-down list, choose Compute Device.
Step 5 Expand the HTTP(S) area, if it is not already expanded.
Step 6 In the Username and Password fields, enter the username and password.
Related Topics
Types of Devices in the Cisco DNA Center Inventory, on page 64
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Click Add.
Step 3 In the Add Device dialog box, from the Type drop-down list, choose Meraki Dashboard.
Step 4 Expand the HTTP(S) area, if it is not already expanded.
Step 5 In the API Key / Password field, enter the API key and password credentials used to access the Meraki
dashboard.
Cisco DNA Center collects inventory data from the Meraki Dashboard and displays the information.
Related Topics
Types of Devices in the Cisco DNA Center Inventory, on page 64
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Select the devices that you want to update.
Step 3 From the Actions drop-down list, choose Update Credentials.
Step 4 From the Type drop-down list, choose Meraki Dashboard.
Step 5 Expand the HTTP(S) area, if it is not already expanded.
Step 6 In the API Key / Password field, enter the API key and password credentials used to access the Meraki
dashboard.
Related Topics
Types of Devices in the Cisco DNA Center Inventory, on page 64
Filter Devices
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Click Filters.
The following filters are displayed:
• Device Name
• IP Address
• MAC Address
• Reachability Status
• IOS/Firmware
• Platform
• Serial Number
• Up Time
• Last Updated Time
• Resync Interval
• Last Inventory Collection Status
• Device Role
• Location
• Device Family
• Device Series
Step 3 Enter the appropriate value in the selected filter field, for example, for the Device Name filter, enter the name
of a device.
Cisco DNA Center presents you with auto-complete values as you enter values in the other fields. Choose
one of the suggested values or finish entering the desired value.
You can also use a wildcard (asterisk) with these filters, for example, you can enter values with an asterisk
at the beginning, end, or in the middle of a string value.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Click and choose one of the following layout presets:
• Status—Displays general device status information, including Up Time, Update Frequency, and
Number of Updates.
• Hardware—Displays hardware information, including IOS/firmware, Serial Number, and Device
Role.
• Tagging—Displays tagging information, including Device Role, Location, and Tag.
Step 3 To customize your layout, select the columns that you want to display.
A blue check mark next to a column means that the column is displayed in the table.
map in the Topology tool. The top tier is the internet. The devices underneath are assigned one of the following
roles:
Tier 3 Core
Tier 4 Distribution
Tier 5 Access
Tier 6 Unknown
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Locate the device whose role you want to change and choose a new role from the Device Role drop-down
list. Valid choices are Unknown, Access, Core, Distribution, or Border Router.
Note If you manually change the device role, the assignment remains static. Cisco DNA Center does not
update the device role even if it detects a change during a subsequent device resynchronization.
Note You cannot update more than one device at a time. Also, you cannot update a Meraki device's management
IP address.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Select the devices that you want to update.
Step 3 From the Actions drop-down list, choose Update Management IP.
The Update Management IP dialog box is displayed.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Select the devices that you want to update.
Step 3 From the Actions drop-down list, choose Update Resync Interval.
The Update Resync Interval dialog box is displayed.
Step 4 In Select Resync Option, click the radio button that corresponds to the type of resynchronization option you
want to configure for the device. Valid choices are Custom, Global, and Disable.
Step 5 If you chose Custom, in the Resync Interval (in Mins) field, enter the time interval (in minutes) between
successive polling cycles. Valid values are from 25 to 1440 minutes (24 hours).
Step 6 Click Update.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Select the devices that you want to gather information about.
Step 3 From the Actions drop-down list, choose Resync.
Step 4 Confirm the action by clicking OK.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Check the check box next to the device or devices that you want to delete.
Note You can select multiple devices by checking additional check boxes, or you can select all the devices
by checking the check box at the top of the list.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Select the devices that you want to run commands on.
Step 3 From the Actions drop-down list, choose Launch Command Runner.
For information about the commands that you can run and how to run them, see Run Diagnostic Commands
on Devices, on page 161.
Note You must also provide values for the fields that correspond to the protocol you specify. For example, if you
specify SNMPv3, you must specify values for the SNMPv3 fields in the sample CSV file such as the SNMPv3
username and authorization password.
For partial inventory collection in Cisco DNA Center, you must provide the following values in the CSV file:
• Device IP address
• SNMP version
• SNMP read-only community strings
• SNMP write community strings
• SNMP retry value
• SNMP timeout value
For full inventory collection in Cisco DNA Center, you must provide the following values in the CSV file:
• Device IP address
• SNMP version
• SNMP read-only community strings
Procedure
Step 1 From the Cisco DNA Center Home page, click Inventory.
Step 2 Click Import Device(s) to import all of the devices from the CSV file into Inventory.
Step 3 Drag and drop the CSV file into the boxed area in the Bulk Import dialog box or click the dotted-line boxed
area and browse to the CSV file.
Step 4 In the Export Device dialog box, enter a password that will be used to encrypt the exported CSV file. (Users
will need to supply this password to open the exported file.)
Step 5 Click Import.
Caution Handle the CSV file with care because it contains sensitive information about the exported devices. Ensure
that only users with special privileges perform a device export.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 To export configuration information about only certain devices, check the check box next to the devices that
you want to include. To include all the devices, check the check box at the top of the device list.
Step 3 Click Export.
The Export dialog box appears.
Step 4 Check the check boxes next to the data that you want to include in the CSV file.
Step 5 Click Export.
Note Depending on your browser configuration, you can save or open the compressed file.
Caution Handle the CSV file with care because it lists all of the credentials for the exported devices. Ensure that only
users with special privileges perform a device export.
Procedure
Step 1 From the Cisco DNA Center home page, click Inventory.
Step 2 Check the check box next to the devices that you want to include in the CSV file. To include all the devices,
select the checkbox at the top of the list.
Step 3 Click Export to export the device credentials.
The Export dialog box appears.
Before using Image Repository features, you must enable Transport Layer Security protocol (TLS) on older
devices such as Catalyst 3K, 4K, and 6K. After any system upgrades, you must re-enable TLS again. For
more information, see “Configure Security for Cisco DNA Center” in the Cisco Digital Network Architecture
Center Administrator Guide.
On the Image Repository window, a message displays if the Integrity Verification application cannot verify
the selected software image using the current KGV file. For more information about the Integrity Verification
application and importing KGV files, see the Cisco Digital Network Architecture Center Administrator Guide.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Image Repository. Alternately, in the Cisco DNA
Centerclick Image Repository.
The software images are organized and displayed based on the device type. By default, software images for
physical devices are displayed. You can toggle to Virtual tab to view software images for virtual devices.
Step 2 In the Image Name column, click the downward arrow to view all the software images for the specified device
type family. The Using Image column indicates how many devices are using the specific image shown in the
Image Name field. Click the number link to view the devices that are using the image.
Step 3 In the Version column, click the Add On link to view the applicable SMUs and Sub-packages for the base
image. Sub-packages are the additional features that can be added to the existing base image. The sub-package
version that is same as the image family and the base image version is displayed here.
Note If you tag any SMU as golden, it will be automatically activated when the base image is installed.
You cannot tag a sub-package as golden.
Step 4 In the Device Role column, select a device role for which you want to indicate this is a "golden" software
image. For more information, see About Golden Software Images, on page 86 and Create Golden Software
Images, on page 86.
Procedure
Step 1 From the Cisco DNA Center home page, choose > System Settings > Settings > Cisco Credentials and
verify that you have entered the correct credentials to connect to Cisco.com.
Step 2 Choose Design > Image Repository, or click Image Repository from the Cisco DNA Center home page.
Cisco DNA Center displays the Cisco-recommended software images according to device type.
Step 3 Designate the recommended image as golden. See Create Golden Software Images, on page 86 for more
information.
After you designate the Cisco-recommended image as golden, Cisco DNA Center automatically downloads
the image from cisco.com.
Step 4 Push the recommended software image to the devices in your network. See Provision Software Images, on
page 87 for more information.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Image Repository or click Image Repository.
Step 2 Click Import Image/SMU.
Step 3 Click Choose File to navigate to a software image or software image update stored locally or Enter image
URL to specify an HTTP or FTP source from which to import the software image or software image update.
Step 4 If the image you are importing is for a third-party (not Cisco) vendor, select Third Party under Source. Then
select an Application Type, describe the device Family, and identify the Vendor.
Step 5 Click Import.
A window displays the progress of the import.
Step 6 Click Show Tasks to verify that the image was imported successfully.
If you imported a SMU, Cisco DNA Center automatically applies the SMU to the correct software image,
and an Add-On link appears below the corresponding software image.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Image Repository or click Image Repository.
Step 2 In the Image Name column, find the software image that is in Install Mode.
Step 3 Click Import to upload the binary software image file for the image that is in Install Mode.
Step 4 Click Choose File to navigate to a software image stored locally or Enter image URL to specify an HTTP
or FTP source from which to import the software image.
Step 5 Click Import.
A window displays the progress of the import.
Step 6 Click Show Tasks and verify that the software image you imported is green, indicating it has been successfully
imported and added to the Cisco DNA Center repository.
Step 7 Click Refresh.
The Image Repository window refreshes. Cisco DNA Center displays the software image, and the Golden
Image and Device Role columns are no longer greyed out.
What to do next
• Create Golden Software Images, on page 86
• Provision Software Images, on page 87
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Image Repository or click Image Repository.
Step 2 From the Family column, select a device family for which you want to specify a golden image.
Step 3 From the Image Name column, select the software image that you want to specify as golden.
Step 4 In the Device Role column, select a device role for which you want to specify a golden software image. Even
if you have devices from the same device family, you can specify a different golden software image for each
device role. You can select a device role for physical images only, not virtual images.
If the software image you specified as golden is not already uploaded into the Cisco DNA Center repository,
this process might take some time to complete. Under the Action column on the Image Repository page, if
the trash can icon is greyed out, the image is not yet uploaded to the Cisco DNA Center repository. Cisco
DNA Center must first upload the software image to its repository, and then it can mark the image as golden.
If the software image is already uploaded to the Cisco DNA Center repository, indicated by the active trash
can icon in the Action column, then the process to specify a golden image completes faster.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision.
Step 2 Select the device whose image you want to upgrade.
Note If the pre-checks are successful for a device, the Outdated link in the OS Image column will have
a green tick mark. If any of the upgrade readiness pre-checks fail for a device, the Outdated link
will have a red into mark, and you cannot update the OS image for that device. Click on the Outdated
link and correct any errors before proceeding further.
See List of Device Upgrade Readiness Prechecks, on page 88 for the list of pre-checks.
Step 3 From the Actions drop-down list, choose Update OS Image and do the following.
a) Distribute: Click Now to start the distribution immediately or click Later if you want to schedule the
distribution at a specific time.
Note If the image is already distributed for the selected device, the Distribute process will be skipped
and you will only be able to Activate the image.
b) Click Next.
c) Activate: Click Now to start the activation immediately or click Later if you want to schedule the activation
at a specific time.
Note You can skip this step, if you want to perform only the distribution process currently.
d) (Optional) Select the Schedule Activation after Distribution is completed checkbox as required.
e) Confirm: Click Confirm to confirm the update.
You can check the status of the update in the OS Update Status column. If this column is not displayed, click
and choose OS Update Status.
Step 4 (Optional) Click Upgrade Status to view the progress of the image upgrade.
Note If you have a device between Cisco DNA Center and another fabric device, such as an edge router,
the software update process might fail if the in between device reloads while the software image is
being provisioned to the other device.
Device management status Checks if the device is successfully managed in Cisco DNA
Center.
File transfer check Checks if the device is reachable through SCP and HTTPS. If
there is a connectivity problem, see Troubleshooting SCP and
HTTPS Connectivity.
NTP clock check Compares device time and Cisco DNA Center time to ensure
successful Cisco DNA Center certificate installation.
Flash check Verifies if there is enough disk space for the update. If there is
not enough disk space, a warning or error message is returned.
For information about the supported devices for Auto Flash
cleanup and how files are deleted, see Auto Flash Cleanup.
Crypto TLS check Checks whether the device supports TLS 1.2.
Precheck Description
Startup config check Checks whether the startup configuration exists for this device.
Procedure
Step 1 To verify that the device time is in sync with the Cisco DNA Center time zone, enter the show clock command.
For example:
ASR1001-X-149#show clock
Note A running image version later than 16.x supports TLS 1.2.
Step 3 To verify that the device is configured with "crypto key generate rsa modulus 1024," enter:
show crypto key mypubkey rsa
If the device is not configured with the crypto key, enter the following command to configure it:
config t
crypto key generate rsa
Step 4 To verify that the device is configured with an IP domain name, enter:
sh running-config | sec ip domain
For example:
ip domain name Cisco.com
Step 5 To validate the HTPPS communication between the device and Cisco DNA Center, enter:
copy https://10.104.240.95/core/img/cisco-bridge.png flash:cisco-bridge.png
Procedure
Step 1 For SCP connectivity, first you need to verify if SSH is configured, using the below command:
Show run | inc ssh
For example:
ASR1001-X-149#show running-config | sec ssh
If SSH is not configured, use the below commands to configure SSH on the device:
line vty 0 15
transport input all
ip ssh source-interface GigabitEthernet1/1
Step 2 To enable the ssh version 2 on the device, run the below command:
ip ssh version 2
Step 3 Next, verify if SCP is configured on the device using the below command:
show run | inc scp
For example:
ASR1001-X-149#show running-config | sec scp
Step 4 If SCP is not configured, use below command to configure SCP on the device:
Config t
ip scp server enable
Note Auto flash cleanup is supported on Cisco Catalyst 9300, 9400, and 9500 switches.
• For devices that do not support auto flash cleanup, the flash check fails with an error message. You
can delete files from device flash to create required space before starting the image upgrade.
About Topology
The Topology window displays a graphical view of your network. Using the Discovery settings that you have
configured, Cisco DNA Center discovers the devices in your network and assigns a device role to them. Based
on the device role assigned during discovery (or changed in Device Inventory), Cisco DNA Center creates a
physical topology map with detailed device-level data.
Using the topology map, you can do the following:
• Display the topology of a selected area, site, building, or floor.
• Display detailed device information.
• Display detailed link information.
• Filter devices based on a specific Layer 2 VLAN.
• Filter devices based on a Layer 3 protocol (such as Intermediate System - Intermediate System [IS-IS],
Open Shortest Path First [OSPF], Enhanced Interior Gateway Routing Protocol [EIGRP], or static routing).
• Filter devices with Virtual Routing and Forwarding (VRF) capability.
• Pin devices to the topology map.
• Save a topology map layout.
• Open a topology map layout.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 In the tree view menu, select the area, site, building, or floor that you are interested in.
Note Clicking the icon in the bottom right corner will open a legend that shows you the available shortcut
keys for the topology maps.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 Click Filter.
Step 3 Do one of the following:
• From the VLAN drop-down list, choose the VLAN that you want to view.
• From the Routing drop-down list, choose the protocol that interests you.
• From the VRF drop-down list, choose the VRF that you want to view.
Note The device information that is accessible in the Topology window is also accessible in the Device Inventory
window.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 In the tree view menu, select the area, site, building, or floor that you are interested in.
Step 3 In the topology area, hover your mouse over the device or device group that interests you.
Note A device group is labeled with the number and types of devices it contains.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 In the tree view menu, select the area, site, building, or floor that you are interested in.
Step 3 Hover your mouser over the link that interests you.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 Do one of the following:
• To pin a device, click the device group, and in the dialog box, click the pin icon to the left of the device
name.
• To pin all the devices, click the device group, and, in the dialog box, click Pin All.
Note Double click the group to unpin the devices in the group.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 Click Unassigned Devices in the left pane. All the unassigned devices will be displayed in the topology area.
Step 3 Click the device for which you want to assign a site. Device details will be displayed in a popup. In the Assign
devices to: section, click on choose the location drop-down list to select a location.
Step 4 (Optional) Uncheck the Auto-assign unclaimed downstream devices checkbox, if you want to assign the
site only for the selected device and not for the connected (downstream) devices.
Step 5 Click Assign.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 Click View Options.
Step 3 In the Enter View Title field, enter a name for your customized map.
Step 4 Click Save.
Step 5 (Optional) To set your customized map as the defult, click Make Default.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Step 2 Click View Options.
Step 3 Click the name of the map that you want to display.
Procedure
Step 1 From the Cisco DNA Center home page, click Topology.
Procedure
Step 1 Create your network hierarchy. For more information, see Create a Site in a Network Hierarchy, on page 98.
Step 2 Define global network settings. For more information, see About Global Network Settings, on page 131.
Step 3 Define network profiles.
You can:
• Create a new network hierarchy. See Create a Site in a Network Hierarchy, on page 98.
• Upload an existing network hierarchy from Cisco Prime Infrastructure. See Upload an Existing Site
Hierarchy, on page 99.
You can add more sites, buildings, and areas to your network hierarchy. You must create at least one site
before you can use the provision features.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
A world map is displayed.
Step 2 On the Network Hierarchy window, click + Add Site, or click the gear icon next to the parent site in the
left pane, and then select the appropriate option.
Step 3 You can also upload an existing hierarchy. For more information, see Upload an Existing Site Hierarchy, on
page 99.
Step 4 Enter a name for the site, and select a parent Node. By default, Global is the parent node.
Step 5 Click Add.
The site is created under the parent node in the left menu.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy, and then click Import >
Import Sites.
Step 2 Drag and drop your CSV file, or navigate to where your CSV file is located, then click Import to import the
Cisco Prime Infrastructure Groups CSV file.
If you do not have an existing CSV file, click Download Template to download a CSV file that you can edit
and upload.
Step 3 To import the Cisco Prime Infrastructure maps tar.gz archive file, click Import > Map Import.
Step 4 Drag and drop the map archive file into the boxed area in the Import Site Hierarchy Archive dialog box,
or click the click to select link and browse to the archive file.
Step 5 Click Save to upload the file.
The Import Preview window appears, which shows the imported file.
Procedure
Step 1 From the Cisco Prime Infrastructure user interface, choose Maps > Wireless Maps > Site Maps (New).
Step 2 From the Export drop-down list, choose Map Archive.
The Export Map Archive wizard opens.
Step 3 On the Select Sites window, configure the following. You can either select map information or calibration
information to be included in the maps archive.
• Map Information—Click the On or Off button to include map information in the archive.
• Calibration Information—To export calibration information, click the On or Off button. Click the
Calibration Information for selected maps or the All Calibration Information radio button. If you
select Calibration Information for selected maps, the calibration information for the selected site maps
is exported. If you select All Calibration Information, the calibration information for the selected map,
along with additional calibration information that is available in the system, is also exported.
• In the Sites left pane, check one or more check boxes of the site, campus, building floor, or outdoor area
that you want to export. Check the Select All check box to export all the maps.
Step 4 Click the Generate Map Archive. A message Exporting data is in progress is displayed.
A tar file is created and is saved to your local machine.
Step 5 Click Done.
Procedure
To search the tree hierarchy, in the Find Hierarchy search field in the left pane and enter either the partial
or full name of the site, building, or floor name that you are searching. The tree hierarchy is filtered based on
the text you enter in the search field.
Edit Sites
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, navigate to the corresponding site that you want to edit.
Step 3 Click the gear icon next to the site and select Edit Site.
Delete Sites
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, navigate to the site that you want to delete.
Step 3 Click the gear icon next to the corresponding site and select Delete Site.
Step 4 Confirm the deletion.
Add Buildings
Procedure
Step 1 From the Cisco DNA Centeru home page, choose Design > Network Hierarchy.
A world map is displayed.
Step 2 On the Network Hierarchy window, click + Add Site, or click the gear icon next to the parent site in the
left pane and select Add Building.
Step 3 You can also upload an existing hierarchy. See Upload an Existing Site Hierarchy, on page 99.
Step 4 Enter a name for the building.
Step 5 In the Address text field, enter an address. If you are connected to the Internet, as you enter the address, the
Design Application narrows down the known addresses to the one you enter. When you see that the correct
address appears in the window, select it. When you select a known address, the Longitude and Latitude
coordinates fields are automatically populated.
Step 6 Click Add.
The building that you created is added under the parent site in the left menu.
Step 7 To add another area or building, in the hierarchy frame, click the gear icon next to an existing area or
building that you want to be the parent node.
Edit a Building
Procedure
Step 3 Click the gear icon next to the building and select Edit Building.
Step 4 Make the necessary changes in the Edit Building window, and click Update.
Delete Buildings
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, navigate to the building that you want to delete.
Step 3 Click the gear icon next to the building and select Delete Building.
Step 4 Confirm the deletion.
Note Deleting a building deletes all its container maps. APs from the deleted maps are moved to
Unassigned state.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 Expand the Global site and the previously created area to see all the previously created buildings.
Step 3 Click the gear icon next to the building to which you want to add a floor, and then click Add Floor.
Step 4 Enter a name for the floor. The floor name has a 21-character limit. The floor name must start with a letter or
a hyphen (-) and the string following the first character can include one or more of the following:
• Upper or lower case letters or both
• Numbers
• Underscores (_)
• Hyphens (-)
• Periods (.)
• Spaces ( )
Step 5 Define the type of floor by choosing the Radio Frequency (RF) model from the Type (RF Model) drop-down
list: Indoor High Ceiling, Outdoor Open Space, Drywall Office Only, and Cubes And Walled Offices.
This defines if the floor is an open space or a drywall office, and so on. Based on the RF model selected, the
wireless signal strength and the distribution of heatmap is calculated.
Step 6 You can drag a floor plan on to the map or upload a file. Cisco DNA Center supports the following file types:
.jpg, .gif, .png, .dxf, and .dwg.
After you import a map, make sure that you mark the Overlay Visibility as On (Floor > View Option >
Overlays). By default, overlays are not displayed after you import a map.
Figure 5: Example of a Floor Plan
Edit a Floor
After you add a floor, you can edit the floor map so that it contains obstacles, areas, and APs on the floor.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 Expand the network hierarchy to find the floor that you want to edit, or enter the floor name in the Search
Hierarchy text field in the left pane.
Step 3 Make the necessary changes in the Edit Floor dialog window, and click Update.
• Click the icon at the top-right corner of the floor map window to:
• Export a floor plan as a PDF.
• Click the icon at the bottom-right of the floor map window to zoom in on a location. The zooming
levels depend upon the resolution of an image. A high-resolution image might provide more zoom levels.
Each zoom level comprises of a different style map shown at different scales, each one showing the
corresponding details. Some maps are of the same style, but at a smaller or larger scale.
AP Mode
L Local
F FlexConnect
B Bridge
Health Score
Good Health
Fair Health
Poor Health
AP Status
Covered by sensor
Se Sensor
M Monitor 5 GHz
R Rogue Detector
... Other
Radio Status
Ok
Minor Fault
Down
Admin Disable
Icons
Access Points
Sensor
Markers
Rx Neighbors Line
2.4 GHz
5 GHz
• Sensors
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, select the floor.
Step 3 Click Edit, which is located above the floor plan in the middle pane.
Step 4 In the Floor Elements panel, next to Access Points, click Add.
Access points that are not assigned to any floors appear in the list.
Step 5 On the Add APs window, check the check boxes of the access points to select APs in bulk, and click Add
Selected. Alternatively click Add adjacent an access point.
Note You can search for access points using the search option available. Use the Filter field to search
for access points using the AP name, MAC address, model, or Cisco Wireless Controller. The search
is case-insensitive. The search result appear in a table. Click Add to add one or more of these APs
to the floor area.
Step 6 Close the Add APs window after assigning APs to the floor area.
Step 7 Newly added APs appear on the top-right corner of the floor map.
Step 8 In the Floor Elements pane, next to Access Points, click Position to position the APs correctly on the map.
• To position the APs, click an AP and drag and drop it to the appropriate location on the floor map.
Alternatively you can update the x and y coordinates and AP Height in the Selected AP Details window.
When you drag an access point on the map, its horizontal (x) and vertical (y) position appears in the text
field. When selected, the access point details are displayed in the right pane. The Selected AP Details
window displays the following:
• Position by 3 points—You can draw 3 points on the floor map and position APs using the points
created. To do this:
1. Click Position by 3 points.
2. To define the points, click anywhere on the floor map to start drawing the first point. Click again
to finish drawing a point. A dialog box appears to set the distance to first point. Enter the distance,
in meters, and click Set Distance.
3. Define the second and third points similarly, and click Save.
• Position by 2 Walls—You can define 2 walls on the floor map and position APs between the defined
walls. This helps you to know the position of APs between the two walls. This helps you to understand
the AP position between the walls.
1. Click Position by 2 walls.
2. To define the first wall, click anywhere on the floor map to start drawing the line. Click again
to finish drawing a line. A dialog box appears to set the distance to the first wall. Enter the
distance in meters and click Set Distance.
3. Define the second wall similarly and click Save.
The AP is placed automatically as per the defined distance between the walls.
Step 9 After you have completed placing and adjusting access points, click Save.
Heatmap is generated based on the new position of the AP.
If a Cisco Connected Mobile Experiences (CMX) is synchronized with Cisco DNA Center, then you can view
the location of clients on the heatmap. See Create Cisco CMX Settings, on page 128.
Step 10 In the Floor Elements panel, next to Access Points, click Delete.
The Delete APs window appears which lists all the assigned and places access points, appears.
Step 11 Check the check boxes next to the access points that you want to delete, and click Delete Selected.
• To delete all the access points, click Select All, and click Delete Selected.
• To delete an access point from the floor, click the Delete icon.
• Use Quick Filter and search using the AP name, MAC address, Model, or Controller. The search is
case-insensitive. The search result appears in the table. Click the Delete icon to delete the APs from the
floor area.
• Click the Rx Neighbors radio button to view the immediate Rx neighbors for the selected AP on the
map with a connecting line. The floor map also shows whether the AP is associated or not along with
the AP name.
• Click Device 360 to get a 360° view of a specific network element (router, switch, AP, or Cisco Wireless
Controller). See the Monitor and Troubleshoot the Health of a Device topic in the Cisco DNA Assurance
User Guide.
Note For Device 360 to open, you must have the Assurance application installed.
Note Make sure you have Cisco AP 1800S sensor in your inventory. The Cisco AP 1800S sensor needs to be
provisioned using Plug and Play (Pnp) for it to show up in the Inventory. See the Provision the Wireless Cisco
Aironet 1800s Active Sensor topic in the Cisco DNA Assurance User Guide.
Note Sensor Device—A dedicated AP 1800S sensor. The AP 1800S sensor gets
bootstrapped using PnP. After it obtains Assurance server reachability details, it
directly communicates with the Assurance server.
• On-Demand Sensor—An AP is temporarily converted into a sensor to run tests. After the tests are
complete, the sensor changes back into AP mode.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, select the floor.
Step 3 Click Edit, which is located above the floor plan.
Step 4 In the Floor Elements panel, next to Sensors, click Add.
Step 5 On the Add Sensors window, choose the check boxes of the sensors that you want to add. Alternatively click
Add next to the sensor row to add sensors.
Note You can search for specific sensors using the search option. Use the Filter field and search using
the Name, MAC address, or Model of a sensor. The search is case-insensitive. The search are
displayed in the table. Click Add to add one or more these sensors to the floor area.
Step 6 Close the Add Sensors window after assigning sensors to the floor map.
Step 7 Newly added sensors appear on the top-right corner of the floor map.
Step 8 To position the sensors correctly, in the Floor Elements pane, next to Sensors, click Position to place them
correctly on the map.
Step 9 After you have completed placing and adjusting sensors, click Save.
Step 10 To delete a sensor, in the Floor Elements pane, next to Sensors, click Delete.
The Delete Sensors window appears which lists all the assigned and placed sensors, appears.
Step 11 Select the check boxes of the sensors that you want to delete, and click Delete Selected.
• To delete all the sensors, click Select All, and click Delete Selected.
• To delete a sensor from the floor, click the Delete icon next to that sensor.
• Use Quick Filter and search using the Name, MAC address, or Model. The search is case-insensitive.
The search results are displayed in a table. Click the Delete icon to delete one or more these sensors from
the floor area.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, select the floor.
Step 3 Click Edit, which is located above the floor plan in the middle pane.
Step 4 In the Overlays panel, next to Coverage Areas, click Add.
The Coverage creation dialog-box appears.
Step 5 To draw a coverage area, from the Type drop-down list, choose Coverage Area.
1. Enter the name of the area you are defining, and click Add Coverage. The coverage area must be a
polygon with at least 3 vertices.
2. Move the drawing tool to the area you want to outline.
3. Click the tool to start and stop a line.
4. After you have outlined the area, double-click the area, which results in the area getting highlighted.
Note The outlined area must be a closed object for it to be highlighted on the map.
Step 6 To draw a polygon-shaped area, from the Type drop-down list, choose Perimeter.
1. Enter the name of the area you are defining, and click Ok.
Step 7 To edit a coverage area, in the Overlays panel, next to Coverage Areas, click Edit.
The available coverage areas are highlighted on the map.
Step 8 Make the changes and click Save after the changes.
Step 9 To delete a coverage area, in the Overlays panel, next to Coverage Areas, click Delete.
The available coverage areas are highlighted on the map.
Step 10 Hover your cursor over the coverage area and click to delete.
Step 11 Click Save after the deletion.
Create Obstacles
You can create obstacles so that they can be considered while computing Radio Frequency (RF) prediction
heatmaps for access points.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, select the floor.
Step 3 Click Edit, which is located above the floor plan in the middle pane.
Step 4 In the Overlays panel, next to Obstacles, click Add.
Step 5 In the Obstacle Creation dialog box, choose an obstacle type from the Obstacle Type drop-down list. The
type of obstacles that you can create are Thick Wall, Light Wall, Heavy Door, Light Door, Cubicle, and
Glass.
The estimated signal loss for the obstacle type you selected is automatically populated. The signal loss is used
to calculate RF signal strength near these objects.
Step 6 Click Add Obstacle.
Step 7 Move the drawing tool to the area where you want to create an obstacle.
Step 8 Click the drawing tool to start and stop a line.
Step 9 After you have outlined the area, double-click the area, which results in the area getting highlighted.
Step 10 Click Done in the Obstacle Creation window that appears.
Step 11 Click Save to save the obstacle on the floor map.
Step 12 To edit an obstacle, in the Overlays panel, next to Obstacles, click Edit.
All the available obstacles are highlighted on the map.
Step 15 Hover your cursor over the obstacle and click to delete.
Step 16 Click Save.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, select the floor.
Step 3 In the Overlays panel, next to Location Regions, click Add.
Step 4 In the Location Region Creation dialog window, from the Inclusion Type drop-down list, choose an option.
Step 5 Click Add Location Region.
A drawing icon appears to outline the inclusion area.
Step 6 To begin defining the inclusion area, move the drawing tool to a starting point on the map and click once.
Step 7 Move the cursor along the boundary of the area you want to include and click to end a border line.
Click again to define the next boundary line.
Step 8 Repeat Step 7 until the area is outlined and then double-click the drawing icon.
A solid aqua line defines the inclusion area.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 2 In the left pane, select the floor.
Step 3 Click Edit, which is located above the floor plan in the middle pane.
Step 4 In the Overlays panel, next to Location Regions, click Add.
Step 5 In the Location Region Creation window, from the Exclusion Type drop-down list, choose a value.
Step 6 Click Location Region.
A drawing icon appears to outline the exclusion area.
Step 7 To begin defining the exclusion area, move the drawing icon to a starting point on the map and click once.
Step 8 Move the drawing icon along the boundary of the area you want to exclude.
Click once to start a boundary line, and click again to end the boundary line.
Step 9 Repeat Step 8 until the area is outlined and then double-click the drawing icon. The defined exclusion area is
shaded in purple when the area is fully defined.
Step 10 To define more exclusion regions, repeat Step 5 to Step 9.
Step 11 When all the exclusion areas are defined, click Save.
Procedure
Procedure
Rail Creation
You can define a rail line on a floor that represents a conveyor belt. Also, you can define an area around the
rail area known as the snap-width to further assist location calculations. This represents the area in which you
expect clients to appear. Any client located within the snap-width area is plotted on the rail line (majority) or
outside of the snap-width area (minority).
The snap-width area is defined in feet or meters (user-defined) and represents the distance that is monitored
on either side (east and west or north and south) of the rail.
Procedure
Step 1 From the Cisco DNA Center home page, hoose Design > Network Hierarchy.
Step 2 In the left pane, select the floor.
Step 3 Click Edit, which is located above the floor plan in the middle pane.
Step 4 In the Overlays panel, next to Rails, click Add.
Step 5 Enter a snap-width (feet or meters) for the rail and then click Add Rail.
A drawing icon appears.
Step 6 Click the drawing icon at the starting point of the rail line. Click again when you want to stop drawing the
line or change the direction of the line.
Step 7 Click the drawing icon twice when the rail line is drawn on the floor map. The rail line appears on the map
and is bordered on either side by the defined snap-width region.
Step 8 Click Save.
Step 9 In the Overlays panel, next to Rails, click Edit.
The available rails are highlighted on the map.
Step 12 Hover your cursor over the rail line that you want to delete, and click to delete.
Step 13 Click Save
Place Markers
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Hierarchy.
Step 5 Enter the name for the markers, and then click Add Marker.
Step 6 Click the drawing icon and place the marker on the map.
Step 7 Click Save.
Step 8 In the Overlays panel, next to Markers, click Edit.
The available markers are highlighted on the map.
Step 11 Hover your cursor on the marker that you want to delete, and click to delete.
Step 12 Click Save.
• Coverage Holes—Percentage of clients whose signal has become weaker until the client lost its
connection. It shows Unavailable for access points that are not connected and MonitorOnly for
access points that are in monitor-only mode.
• TX Power—Current Cisco Radio transmit power level (with 1 being high) or Unavailable (if the
access point is not connected). If you change the radio band, the information on the map changes
accordingly.
The power levels differ depending on the type of access point. The 1000 series APs accept a value
between 1 and 5, the 1230 access points accept a value between 1 and 7, and the 1240 and 1100
series access points accept a value between 1 and 8.
• Channel and Tx Power—Channel and transmit power level (or Unavailable if the access point is
not connected).
• Utilization—Percentage of bandwidth used by the associated client devices (including receiving,
transmitting, and channel utilization). Displays Unavailable for disassociated access points and
MonitorOnly for access points in monitor-only mode.
• Tx Utilization—Transmitted (Tx) utilization for the specified interface.
• Rx Utilization—Received (Rx) utilization for the specified interface.
• Ch Utilization—Channel utilization for the specified access point.
• Assoc. Clients—Total number of clients associated.
• Dual-Band Radios—Identifies and marks the XOR dual-band radios on the Cisco Aironet 2800
and 3800 Series Access Points.
• Health Score—AP health score.
• Issue Count
• Coverage Issues
• AP Down Issues
• Heatmap Type—Heatmap is a graphical representation of Radio Frequency (RF) wireless data where
the values taken by variable are represented in maps as colors. The current heatmap is computed based
on the RSSI prediction model, antenna orientation, and AP transmit power. From the Heatmap Type
drop-down list, select the heatmap type: None, or Coverage.
• None
• Coverage—If you have monitor mode access points on the floor plan, you can select coverage
heatmap. A coverage heatmap excludes monitor mode access points.
• Heatmap Opacity (%)—Drag the slider between 0 to 100 to set the heatmap opacity.
• RSSI Cut off (dBm)—Drag the slider to set the RSSI cutoff level. The RSSI cutoff ranges from -60
dBm to -90 dBm.
• Map Opacity (%)—Drag the slider to set the map opacity.
The AP details are reflected on the map immediately. Hover your cursor over the AP icon on the map to view
AP details and RX neighbor information.
Data Filtering
Filtering Access Points Data
Click Access Point under the Filters panel in the right pane. The filtering options for access points include
the following:
• Choose the radio type from the drop-down list, located above the floor map in the middle pane: 2.4 GHz,
5 GHz, or 2.4 GHz & 5 GHz.
• Click + Add Rule to add a query:
• Choose the access point identifier you want to view on the map: Name, MAC Address, Tx Power,
Channel, Avg Air Quality, Min. Air Quality, Controller IP, Coverage Holes, Tx Utilization, Rx
Utilization, Profiles, CleanAir Status, Associated Clients, Dual-Band Radios, Radio, or Bridge
Group Name.
• Choose the parameter by which you want to filter access points.
• Enter the specific filter criteria in the text box for the applicable parameters, and click Go. The
search results appear in a tabular format.
• Click Apply Filters to List to view the filter results on the map. To view a particular access point
on the map, check the check box of the access point in the table that is displayed, and click Show
Selected on Maps.
When you hover your mouse cursor over the search result in the table, the location of the AP gets pointed
with a line on the map.
When you hover your mouse cursor over the search result in the table, the location of the Sensor gets pointed
with a line on the map.
Note Creating wireless interfaces and wireless radio frequency is applicable only for nonfabric deployments.
Creating the wireless sensor device profile is applicable only for the AP 1800S sensor device.
The following sections provide information about how to define global wireless network settings:
• Create SSIDs for an Enterprise Wireless Network, on page 119
• Create SSIDs for a Guest Wireless Network, on page 121
• Create a Wireless Interface, on page 124
• Create a Wireless Radio Frequency Profile, on page 124
• Create a Wireless Sensor Device Profile, on page 127
Note All SSIDs are created at the Global level. The site, building, and floor inherit settings from the Global level.
Procedure
• 5 GHz only—The WLAN is created for 5 GHz and band select is disabled.
• Check the Fast Transition check box to enable 802.11r protocol. You can select Enable or Disable
mode. By default, it is in Adaptive mode.
• Under the Level of Security area, select the encryption and authentication type for this network. The
security options are:
• WPA2 Enterprise—Provides a higher level of security using Extensible Authentication Protocol
(EAP) (802.1x) to authenticate and authorize network users with a remote RADIUS server.
• WPA2 Personal—Provides good security using a passphrase or a preshared key (PSK). Allows
anyone with the passkey to access the wireless network. If you select WPA2 Personal, enter the
passphrase in the Passphrase text box.
Note You can override a preshared key (PSK) at the site, building, or floor level. If you override
a PSK at the building level, the subsequent floor inherits the new settings. For more
information, see Preshared Key Override, on page 121.
• Open—Provides no security. Allows any device to access the wireless network without any
authentication.
Step 3 Click Next. The Wireless Profiles window is displayed. You can associate this SSID with the corresponding
wireless profile.
Step 4 In the Wireless Profiles window, click +Add to create a new wireless profile.
Step 5 Configure the following in the Create a Wireless Profile window:
• Enter the profile name in the Wireless Profile Name text box.
• Specify whether the SSID is Fabric or Non-Fabric by selecting Yes or No. If you select No, configure
the following parameters:
• From the Select Interface drop-down list, select the interface. This is the VLAN ID that is associated
with the wireless interface.
• Check the Flex Connect check box to enable FlexConnect mode. This is Flex Group profile, where
the traffic is split locally, except for traffic that has specific rules. Based on the following
configurations, the profile is applied to a site and a flex group is created internally.
• To assign this profile to a site, enter the full or partial name of the site in the Site Selector text box.
The available sites are auto populated and you can select the site you want from the drop-down list.
Step 6 Click Add. The created profile appears in the Wireless Profiles page.
Step 7 To associate the SSID to wireless profile, do the following:
• On the Wireless Profile page, check the Profile Name check box(es) to associate the SSID you created
in Step 2.
• Click Finish.
What to do next
1. Perform discovery of devices. You can discover devices using CDP or using an IP address range. For
more information, see Discover Your Network Using CDP, on page 15 and Discover Your Network
Using an IP Address Range, on page 21.
2. Automatically add and onboard new devices with Network Plug and Play.
3. Configure policies for your network. See Configure Policies, on page 167.
4. Add a Cisco Wireless Controller to a site. See Add Devices to Sites, on page 219.
5. Provision the Cisco Wireless Controller and Cisco APs. See Provision a Cisco Wireless Controller, on
page 222 and Provision a Cisco AP—Day 1 AP Provisioning, on page 224.
6. Add the Cisco Wireless Controller to a fabric domain. See Add Devices to a Fabric, on page 236.
7. Configure settings for the various kinds of devices ("hosts") that can access the fabric domain. See
Configure Host Onboarding.
Procedure
Step 5 To reset the PSK override, check the check box of the PSK SSID on the site, building, or floor and click
Delete. The PSK is reset to the global passphrase value.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Wireless.
Step 2 Under Guest Wireless, click +Add to create new SSIDs.
The Create a Guest Wireless Network window is displayed.
Step 3 In the Wireless Network Name (SSID) text box, enter a unique name for the guest SSID that you are creating.
Step 4 Under Level of Security, select the encryption and authentication type for this guest network: Web Auth
and Open.
Note For an External Web Authentication (EWA), select Web Auth as the Level of Security and External
Authentication as the Authentication Server.
Note For a Central Web Authentication (CWA), select Web Auth as the Level of Security and ISE
Authentication as the Authentication Server.
Step 5 The Web Auth encryption and authentication type provides a higher level of Layer 3 security.
Step 6 The Open encryption and authentication type provides no security. Allows any device to connect to the
wireless network without any authentication.
Step 7 If you choose Web Auth, you must configure the authentication server: ISE Authentication or External
Authentication.
• If you choose External Authentication, enter the redirect URL in the Web Auth URL text box.
• If you choose ISE Authentication, select the type of portal you want to create from the drop-down list:
• Self Registered—The guests are redirected to the Self-Registered Guest portal to register by providing
information to automatically create an account.
• HotSpot—The guests can access the network without providing any credentials.
Step 8 To redirect the guests after successful authentication, select from the drop-down list:
• Success Page—The guests are redirected to an Authentication Success window.
• Original URL—The guests are redirected to the URL they had originally requested.
• Custom URL—The guests are redirected to the custom URL that is specified here. Enter a redirect URL
in the Redirect URL text box.
Now that you have created an SSID, you must associate it with a wireless profile. This profile helps you to
construct a topology, which is used to deploy devices on a site.
Step 10 If you do not have an existing wireless profile, in the Wireless Profiles window, click +Add to create a new
wireless profile.
Step 11 Enter a profile name in the Wireless Profile Name text box.
Step 12 Specify whether the SSID is fabric or not by clicking the Yes or No radio button next to Fabric.
Fabric SSID is a wireless network, which is part of Software Defined-Access (SD-Access). SD-Access is a
solution that automates and simplifies configuration, policy, and troubleshooting of wired and wireless
networks. With fabric SSID, it is mandatory to have SDA. Non-fabric is a traditional wireless network that
does not require SD-Access.
Step 13 If you want the guest SSID to be a guest anchor, click the Yes or No radio button next to Do you need a
Guest Anchor for this guest SSID.
Step 14 If you want your guest SSID to be a guest anchor, select Yes.
Step 15 If you select No, then enable the FlexConnect mode by checking the Flex Connect Local Switching check
box.
The selection of FlexConnect mode switches the traffic locally. Based on your configuration, the profile is
applied to a site and a flex group is created internally.
Step 16 From the Select Interface drop-down list, select the interface or click + create a new wireless interface to
create a new wireless interface.
This is the VLAN ID that is associated with the wireless interface.
Step 17 To assign this profile to a site, enter the full or partial name of the site in the Site Selector text box.
The available sites are auto populated and you can select the site that you want from the drop-down list.
Step 19 To associate the SSID to a wireless profile, in the Wireless Profiles window, configure the following.
Step 20 Check the Profile Name check box to associate the SSID.
Step 21 Click Next.
The Portal Customization window appears, where you can assign the SSID to a guest portal.
Step 22 In the Portal Customization window, click + Add to create the guest portal.
The Portal Builder window appears.
Step 23 Expand Page Content in the left menu to include various variables.
Step 24 Drag and drop variables into the portal template window and edit them.
• The list of variables for the Login page are: Access Code, Header Text, AUP, and Text Fields.
• The list variables for the Registration page are: First Name, Last Name, Phone Number, Company,
Sms Provider, Person being visited, Reason for a visit, Header text, User Name, Email Address,
and AUP.
• The list of variables for the Registration Success page are: Account Created and Header texts.
• The variable for the Success page is: Text fields.
Step 25 To customize the default color scheme in the portal, expand Color in the left menu and change the color.
Step 26 To customize the font, expand Font in the left menu and change the font.
Step 27 Click Save.
The created portal appears in the Portal Customization window.
Step 28 Under Portals, click the radio button next to the corresponding Portal Name to assign the SSID to that guest
portal.
Step 29 Click Finish.
What to do next
1. Perform discovery of devices. You can discover devices using CDP or an IP address range. See Discover
Your Network Using CDP, on page 15 and Discover Your Network Using an IP Address Range, on page
21.
2. Automatically add and onboard new devices with Network Plug and Play. See About Network Plug and
Play, on page 37.
3. Configure policies for your network. See Configure Policies, on page 167.
4. Add a Cisco Wireless Controller to a site. See Add Devices to Sites, on page 219.
5. Provision Cisco Wireless Controller and Cisco APs. See Provision a Cisco Wireless Controller, on page
222 and Provision a Cisco AP—Day 1 AP Provisioning, on page 224.
6. Add the Cisco Wireless Controller to a fabric domain. See Add Devices to a Fabric, on page 236.
7. Configure settings for the various kinds of devices (hosts) that can access the fabric domain. See Configure
Host Onboarding.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Wireless.
Step 2 Under Wireless Interfaces, click +Add.
The New Interfaces window appears.
Step 3 In the Interfaces Name text box, enter the dynamic interface name.
Step 4 (Optional) In the VLAN ID text box, enter the VLAN ID for the interface. The valid range is from 0 to 4094.
Step 5 Click Ok.
The new interface appears under Wireless Interfaces.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Wireless.
Step 2 Under Wireless Radio Frequency Profile, click +Add RF.
The Wireless Radio Frequency window appears.
Step 3 In the Profile Name text box, enter the RF profile name.
Step 4 Use the On/Off button to select the radio band: 2.4 GHz or 5 GHz. If you have disabled one of the radios,
the base radio of the AP that you are going to configure this AP profile into will be disabled.
Step 5 Configure the following for the 2.4 GHz radio type:
• From the Parent Profile drop-down list, choose High, Medium (Typical), Low, or Custom. (The Data
Rate and Tx Configuration fields change depending on the parent profile selected. For example, if you
select High, it populates the profile configurations available in the device for 2.4 GHz. If you change
any settings in the populated Data Rate and Tx Configuration, the Parent Profile automatically changes
to Custom.) Note that a new RF profile is created only for the select custom profiles.
Note Low, Medium (Typical), and High are the pre-canned RF profiles. If you select any of the
pre-canned RF profiles, the respective RF profiles which are there in the device is used and
the new RF profile is not be created on the Cisco DNA Center.
• DCA dynamically manages channel assignment for an RF group and evaluates the assignments on a per
AP radio basis.
• Check the Select All check box to select DCA channels 1, 6, and 11. Alternatively, check the
individual check boxes adjacent the channel numbers.
• Click Show Advanced to select the DCA channel numbers under the Advanced Options. Check
the Select All check box to select DCA channels that are under Advanced Options, or check the
check box adjacent the individual channel numbers. The channel numbers that are available for B
profile are 2, 3, 4, 5, 7, 8, 9, 10, 12, 13, and 14.
Note You need to configure these channels globally on Cisco Wireless Controller.
• Use the Data Rate slider to set the rates at which data can be transmitted between an access point and
a client. The available data rates are 1, 2, 5.5, 6, 9, 11, 12, 18, 24, 36, 48, and 54.
• Under Tx Power Configuration, you can set the power level and power threshold for an AP.
• Power Level—To determine whether the power of an AP needs to be reduced or not. Reducing the
power of an AP helps mitigate co-channel interference with another AP on the same channel or in
close proximity. Use the Power Level slider to set the minimum and maximum power level. The
range is -10 to 30 dBm and the default is -10 dBM.
• Power Threshold—It is the cutoff signal level used by Radio Resource Management (RRM) to
determine whether to reduce the power of an AP or not. Use the Power Threshold slider to increase
and decrease the power value which causes the AP to operate at higher or lower transmit power
rates. The range is -50 dBM to 80 dBM and the default threshold is -70 dBM.
• RX SOP—Receiver Start of Packet Detection Threshold (RX SOP) determines the Wi-Fi signal
level in dBm at which an APs radio demodulates and decodes a packet. From the RX SOP drop-down
list, choose High, Medium, Low, or Auto threshold values for each 802.11 band.
• From the Channel Width drop-down list, choose one of the channel bandwidth options: Best, 20 MHz,
40 MHz, 80 MHz, or 160 MHz, or Best.
• Set the DCA Channel to manage channel assignments:
Note You must configure the DCA channels globally on Cisco Wireless Controller.
• UNNI-1 36-48—The channels available for UNII-1 band are: 36, 40, 44, and 48. Check the UNII-1
36-48 check box to include all channels or check the check box of the channels to select them
individually.
• UNII-2 52-144—The channels available for UNII-2 band are: 52, 56, 60, 64, 100, 104, 108, 112,
116, 120, 124, 128, 132, 136, 140, and 144. Check the UNII-2 52-144 check box to include all
channels or check the check box of the channels to select them individually.
• UNII-3 149-165—The channels available for UNII-3 band are: 149, 153, 157, 161, and 165. Check
the UNII-3 149-165 check box to include all channels or check the check box of the channels to
select them individually.
• Use the Data Rate slider to set the rates at which data can be transmitted between an access point and
a client. The available data rates are 6, 9, 12, 18, 24, 36, 48, and 54.
• Under Tx Power Configuration, you can set the power level and power threshold for an AP.
• Power Level—To determine whether the power of an AP needs to be reduced or not. Reducing the
power of an AP helps mitigate co-channel interference with another AP on the same channel or in
close proximity. Use the Power Level slider to set the minimum and maximum power level. The
range is -10 to 30 dBm and the default is -10 dBM.
• Power Threshold—It is the cutoff signal level used by Radio Resource Management (RRM) to
determine whether to reduce the power of an AP or not. Use the Power Threshold slider to increase
and decrease the power value which causes the AP to operate at higher or lower transmit power
rates. The range is -50 dBM to 80 dBM and the default threshold is -70 dBM.
• RX SOP—Receiver Start of Packet Detection Threshold (RX SOP) determines the Wi-Fi signal
level in dBm at which an APs radio demodulates and decodes a packet. From the RX SOP drop-down
list, choose High, Medium, Low, or Auto threshold values for each 802.11 band.
Step 8 To mark a profile as a default RF profile, check the Profile Name check box and click Mark Default.
Procedure
Note To provision the Cisco Aironet 1800s Active Sensor with wired connection, enter any proxy name
and SSID (for example wired_xyz), and in the Level of Security area, choose Open.
Procedure
Step 4 In the IP Address field, enter the valid IP address of the CMX web UI.
Step 5 In the User Name and Password fields, enter the CMX web UI user name and password credentials.
Step 6 In the Admin User and Admin Password fields, enter the CMX admin user name and password credentials.
Note Make sure that CMX is reachable.
Step 8 If the CMX was down at the time you made changes, then you must synchronize manually. To do that, on
the Network Hierarchy page, click the gear icon next to the building or floor on which you made the changes
in the left tree pane, and then select Sync with CMX to push the changes manually.
If Clients Do not Appear on the Cisco DNA Center Center Floor Map
• Check if the Cisco Wireless Controller on the particular floor is configured with CMX and is active.
• Check if the CMX UI shows clients on the floor map.
• Use the Cisco DNA Center Maps API to list the clients on the floor: curl -k -u
<user>:<password> -X GET /api/v1/dna-maps-service/domains/<floor group
id>/clients?associated=true
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Wireless.
Step 2 In the left pane, choose Global if you are configuring native VLAN at the global level.
Step 3 Under Native VLAN, enter a value for the VLAN ID in the VLAN text box. The valid range is from 1 to
4094.
Step 4 Click Save.
Step 5 Configure the SSID and create a wireless network profile. Make sure that the FlexConnect Local Switching
check box on the Design > Network Settings > Wireless page is enabled. For more information, see the
Create SSIDs for an Enterprise Wireless Network, on page 119 and Create SSIDs for a Guest Wireless Network,
on page 121.
Step 6 For the saved VLAN ID to get configured on the wireless controller, you must provision the wireless controller
on the Provision page. For more information, see Provision a Cisco Wireless Controller, on page 222.
Step 7 After provisioning the wireless controller, you must provision the AP that is associated with the controller.
For more information, see Provision a Cisco AP—Day 1 AP Provisioning, on page 224.
Step 8 To override the native VLAN at the site, building, or floor level, in the left tree view menu, select the site,
building, or floor.
Step 9 Under Native VLAN, enter a value for the VLAN ID.
Step 10 Reprovision the wireless controllers and the associated access point.
Procedure
• Select L2 or L3 services.
• If you select L2, select the Type from the drop down list, enter the VLAN ID/Allowed VLAN and the
Description.
• If you select L3, select the Protocol Routing from the drop down list
and enter the Protocol Qualifier.
• Click Next.
What to do next
1. Add Cisco WLC to a site. See Add Devices to Sites, on page 219.
2. Unclaimed Provisioning. See Network Plug and Play Use Cases, on page 39.
• Global settings—Settings defined here affect your entire network and include settings for servers such
as NTP, Syslog, SNMP Trap, NetFlow Collector, and so on, IP address pools, and device credential
profiles.
• Site settings—Settings define here override global settings and can include settings for servers, IP address
pools, and device credential profiles.
Note Changes in network settings that are being used by the active fabric are not supported. These network settings
include site hierarchy, renaming IP pools and few other features.
Note Certain network settings can be configured on devices automatically using the Device Controllability feature.
When Cisco DNA Center configures or updates devices, the transactions are captured in the Cisco DNA
Center audit logs. You can use the audit logs to help you track changes and troubleshoot issues. For more
information about Device Controllability and Audit Logs, see the Cisco Digital Network Architecture Center
Administrator Guide.
You can define the following global network settings by choosing Design > Network Settings > Network.
• Network servers, such as AAA, DHCP, and DNS—For more information, see Configure Global Network
Servers, on page 143.
• Device credentials, such as CLI, SNMP, and HTTP(S)—For more information, see Configure Global
CLI Credentials, on page 134, Configure Global SNMPv2c Credentials, on page 136, Configure Global
SNMPv3 Credentials, on page 137, and Configure Global HTTPS Credentials, on page 138.
• IP address pools—For more information, see Configure IP Address Pools, on page 142.
• Wireless settings as SSIDs, wireless interfaces, and wireless radio frequency profiles—For more
information, see Configure Global Wireless Settings, on page 119.
CLI Credentials
You need to configure the CLI credentials of your network devices in Cisco DNA Center before you can run
a Discovery job.
These credentials are used by Cisco DNA Center to log in to the CLI of a network device. Cisco DNA Center
uses these credentials to discover and gather information about network devices. During the discovery process,
Cisco DNA Center logs in to the network devices using their CLI usernames and passwords and runs show
commands to gather device status and configuration information, and clear commands and other commands
to perform actions that are not saved in a device's configuration.
Note In Cisco DNA Center's implementation, only the username is provided in cleartext.
SNMPv2c Credentials
Simple Network Management Protocol (SNMP) is an application-layer protocol that provides a message
format for communication between SNMP managers and agents. SNMP provides a standardized framework
and a common language to monitor and manage network devices.
SNMPv2c is the community string-based administrative framework for SNMPv2. SNMPv2c does not provide
authentication or encryption (noAuthNoPriv level of security). Instead, it uses a community string as a type
of password that is typically provided in cleartext.
Note In Cisco DNA Center's implementation, SNMP community strings are not provided in cleartext for security
reasons.
You need to configure the SNMPv2c community string values before you can discover your network devices
using the Discovery function. The SNMPv2c community string values that you configure must match the
SNMPv2c values that have been configured on your network devices. You can configure up to five read
community strings and five write community strings in Cisco DNA Center.
If you are using SNMPv2 in your network, specify both the Read Only (RO) and Read Write (RW) community
string values to achieve the best outcome. If you cannot specify both, we recommend that you specify the RO
value. If you do not specify the RO value, Cisco DNA Center attempts to discover devices using the default
RO community string, public. If you specify only the RW value, Discovery uses the RW value as the RO
value.
SNMPv3 Credentials
The SNMPv3 values that you configure to use Discovery must match the SNMPv3 values that have been
configured on your network devices. You can configure up to five SNMPv3 values.
The security features provided in SNMPv3 are as follows:
• Message integrity—Ensures that a packet has not been tampered with in transit.
• Authentication—Determines if a message is from a valid source.
• Encryption—Scrambles a packet's contents to prevent it from being seen by unauthorized sources.
SNMPv3 provides for both security models and security levels. A security model is an authentication strategy
that is set up for a user and a user's role. A security level is the permitted level of security within a security
model. A combination of a security model and a security level determines which security mechanism is
employed when handling an SNMP packet.
The security level determines if an SNMP message needs to be protected from disclosure and if the message
needs to be authenticated. The various security levels that exist within a security model are as follows:
The following table describes the security model and level combinations:
HTTPS Credentials
HTTPS is a secure version of HTTP that is based on a special PKI certificate store. In Cisco DNA Center,
HTTPS is used to discover Cisco Enterprise Network Function Virtualization Infrastructure Software (NFVIS)
devices only.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Device Credentials.
Step 2 With the Global site selected, in the CLI Credentials area, click Add.
Step 3 Enter information in the following fields:
Field Description
Step 5 If you are changing existing credentials, you are prompted to update the new credentials on devices now or
schedule the update for a later time.
• To update the new credentials now, click the Now radio button and click Apply.
• To schedule the update for a later time, click the Later radio button, define the date and time of the
update and click Apply.
Note Use the Time Zone check box to indicate whether you want the update to happen according
to the site time zone or according to a specified time zone.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Device Credentials.
Step 2 With the Global site selected, in the SNMP Credentials area, click Add.
Step 3 For the Type, click SNMP v2c and enter the following information:
Field Description
Note Passwords are encrypted for security reasons and are not displayed in the
configuration.
Note Passwords are encrypted for security reasons and are not displayed in the
configuration.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Device Credentials.
Step 2 With the Global site selected, in the SNMP Credentials area, click Add.
Step 3 For the Type, click SNMP v3 and enter the following information:
Field Description
Name/Description Name or description of the SNMPv3 settings that you are adding.
Mode Security level that an SNMP message requires. Choose one of the following modes:
• noAuthNoPriv—Does not provide authentication or encryption.
• AuthNoPriv—Provides authentication, but does not provide encryption.
• AuthPriv—Provides both authentication and encryption.
Auth Type Authentication type to be used. (Enabled if you select AuthPriv or AuthNoPriv as
the authentication mode.) Choose one of the following authentication types:
• SHA—Authentication based on HMAC-SHA.
• MD5—Authentication based on HMAC-MD5.
Auth Password SNMPv3 password used for gaining access to information from devices that use
SNMPv3. These passwords (or passphrases) must be at least 8 characters in length.
Note • Some wireless controllers require that passwords (or passphrases) be
at least 12 characters long. Be sure to check the minimum password
requirements for your wireless controllers. Failure to ensure these
required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in
the configuration.
Field Description
Privacy Type Privacy type. (Enabled if you select AuthPriv as a the authentication mode.) Choose
one of the following privacy types:
• DES—DES 56-bit (DES-56) encryption in addition to authentication based on
the CBC DES-56 standard.
• AES128—CBC mode AES for encryption.
• None—No privacy.
Privacy Password SNMPv3 privacy password that is used to generate the secret key for encrypting
messages that are exchanged with devices that support DES or AES128 encryption.
Passwords (or passphrases) must be at least 8 characters long.
Note • Some wireless controllers require that passwords (or passphrases) be
at least 12 characters long. Be sure to check the minimum password
requirements for your wireless controllers. Failure to ensure these
required minimum character lengths for passwords results in devices
not being discovered, monitored, or managed by Cisco DNA Center.
• Passwords are encrypted for security reasons and are not displayed in
the configuration.
Step 1 From the Cisco DNA Center Home page, select Design > Network Settings > Device Credentials.
Step 2 With the Global site selected, in the HTTPS Credentials area, click Add.
Step 3 Enter the following information:
Field Description
Type Specifies the kind of HTTPS credentials you are configuring. Valid types are Read or
Write.
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the configuration.
Note The password must contain at least one lower case, one upper case, one
digit, and a special character and must not contain < > @ ' , : ; ! or spaces.
For security reasons, enter the password again as confirmation. Passwords
are encrypted for security reasons and are not displayed in the configuration.
GuidelinesandLimitationsforEditingGlobalDeviceCredentials
The following are guidelines and limitations for editing existing global device credentials:
• When you edit global device credentials and then apply those changes, there are some device types for
which Cisco DNA Center does not support this operation. For a list of devices on which you can apply
edited global device credentials, click the Learn More link on the top of any Edit window from Design
> Network Settings > Device Credentials.
• Cisco DNA Center uses the following process when you edit, save, and then apply a global device
credential:
1. Cisco DNA Center pushes the credential to the device.
2. After successfully pushing the credential to the device, Cisco DNA Center confirms it can reach the
device using the new credential.
Note If this step fails, Inventory uses the old credentials to manage the device even
though Cisco DNA Center pushed the new credentials to the device. In this case,
the Provision > Devices > Inventory screen might indicate that the device is
Unmanaged if you updated an existing credential.
3. After successfully reaching the device using the new credential, the Cisco DNA Center Inventory
starts managing the device using the new credential.
• Sites can contain devices that use SNMPv2c and SNMPv3 credentials. When you edit and save global
SNMPv2c or SNMPv3 credentials, Cisco DNA Center pushes those changes to devices and enables that
credential. For example, if you have a device that uses SNMPv2c, but you edit and save the SNMPv3
global credential, Cisco DNA Center pushes the new SNMPv3 credential to all devices in the associated
site and enables it, meaning that all devices will be managed using SNMPv3, even the devices that
previously had SNMPv2c enabled.
• To avoid any possible disruptions, modify the User Name when you edit CLI Credentials. This creates
a new CLI credential and leaves any existing CLI credentials unchanged.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Device Credentials.
Step 2 With the Global site selected, select the device credential you want to change, then under the Actions column
on the right, click Edit.
Note When you edit global device credentials and then apply those changes, there are some device types
for which Cisco DNA Center does not support this operation. For a list of devices on which you
can apply edited global device credentials, click the Learn More link on the top of any Edit window
from Design > Network Settings > Device Credentials.
A status message appears indicating whether the device credential change was successful or if it failed.
Step 5 To view the status of the credential change, from the Cisco DNA Center home page, choose Provision >
Devices > Inventory.
The Credential Status column displays one of the following statuses:
• Success—Cisco DNA Center successfully applied the credential change.
• Failed—Cisco DNA Center was unable to apply the credential change. Hover your cursor over the icon
to display additional information about which credential change failed and why.
• Not Applicable—The credential is not applicable to the device type.
If you edited and saved more than one credential (for example, CLI, SNMP, and HTTPS), the Credential
Status column displays Failed if Cisco DNA Center was unable to apply any of the credentials. Hover your
cursor over the icon to display additional information about which credential change failed.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Device Credentials.
Step 2 Select a site from the hierarchy in the left pane.
Step 3 Select the credential you want to associate with the selected site, then click Save.
A success message appears at the bottom of the screen indicating the device credential was successfully
associated with the site.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > IP Address Pools.
Step 2 Click Add IP Pool and complete the required fields. If you have configured Cisco DNA Center to communicate
with an external IP address manager, you cannot create an IP pool that overlaps an existing IP address pool
in the external IP address manager.
Step 3 Click Overlapping to specify overlapping IP address pool groups to allow different address spaces and
concurrently, use the same IP addresses in different address spaces.
Step 4 Click Save.
Note When you edit an IP address pool and make DHCP changes, you do not need to reprovision devices
using that IP address pool.
Note The IP address pools cannot have subpools and cannot have any assigned IP addresses from the IP address
pool.
You must configure Cisco DNA Center to communicate with an external IP Address Manager. For more
information, see the Cisco Digital Network Architecture Center Administrator Guide.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > IP Address Pools.
Procedure
Step 1 From the Cisco DNA Center home page, select Design > Network Settings > SP Profiles.
Step 2 In the QoS area, click Add.
Step 3 In the Profile Name field, enter a name for the SP profile.
Step 4 From the WAN Provider drop-down list, choose a service provider.
Step 5 From the Model drop-down list, choose one of four class models: 4 class, 5 class, 6 class, and 8 class.
For a description of these classes, see Service Provider Profiles, on page 185.
Note You can override global network settings on a site by defining site-specific settings.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Network.
Step 2 In the DHCP Server field, enter the IP address of a DHCP server.
Note You must define at least one DHCP server in order to create IP address pools.
Step 3 In the DNS Server field, enter the domain name of a DNS server.
Note You must define at least one DNS server in order to create IP address pools.
Step 4 (Optional) You can enter Syslog, SNMP Trap, and NetFlow Collector server information. Click Add Servers
to add an NTP server.
Step 5 Click Save.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Network.
Step 2 Click Add Servers to add a AAA server.
Step 3 In the Add Servers window, check the AAA check box, and click OK.
Step 4 You can set the AAA server for network users or client/endpoint users or both.
Step 5 Check the Network and/or Client/Endpoint check boxes and configure servers and protocols for AAA server.
• Choose the Servers for authentication and authorization: ISE or Non-ISE.
• If you select ISE, configure the following:
Note AAA settings for a physical and managed site for a particular WLC should match, otherwise
the provisioning will fail.
From the Network drop-down list, select the IP address of the ISE server. The Network drop-down
list contains all the IP addresses of the Cisco ISE servers that are registered in System Settings on
the Cisco DNA Center Home page. Selecting an ISE IP populates primary and additional IP address
drop-down lists with Policy Service Nodes (PSN) IP addresses for the selected ISE. You can either
enter an IP address for the AAA server or select the PSN IP address from the IP Address (Primary)
and IP Address (Additional) drop-down lists.
• Note TACACS protocol is supported only for network users. If TACACS is selected for
clients/endpoint users, provisioning will fail.
Configuring Cisco Wireless Controller High Availability from Cisco DNA Center
Procedure
Step 1 From the Cisco DNA Center home page, choose Provision > Devices.
Step 2 Click WLC-1 to configure the device as a primary controller.
Step 3 Click the High Availability tab.
Step 4 Choose the Select Secondary WLC drop-down list.
Step 5 Enter the Redundancy Management IP and Peer Redundancy Management IP addresses in the respective
text boxes.
Note The IP addresses used for redundancy management IP and peer redundancy management IP should
be configured in the same subnet as the management interface of the Cisco Wireless Controller.
Ensure that these IP addresses are unused IP addresses within that subnet range.
• The management port of the active wireless controller is shared by both the active and standby wireless
controllers and points to the active wireless controller. The user interface, Telnet, and SSH do not work
on the standby wireless controller. You can use the console and service port interface to control the
standby wireless controller.
3. The management port of the active wireless controller is shared by both the controllers and will be pointing
to active controller. The user interface, Telnet, and SSH on the stand by wireless controller will not work.
You can use the console and service port interface to control the stand by wireless controller.
Following are the commands that are sent to wireless controller 2 from the Cisco DNA Center:
• config interface address redundancy-management 198.51.100.yy peer-redundancy-management
198.51.100.xx
• config redundancy unit secondary
• config port adminmode all enable
• config redundancy mode sso
Use the following commands to verify the high availability configurations from wirless controller:
• Run the config redundancy mode sso command to check the HA-related details.
• Run the show redundancy summary command to check the configured interfaces.
Create Projects
Projects are a logical grouping to a set of templates.
Procedure
Step 1 From the Cisco DNA Center home page, choose Tools > Template Editor.
Step 2 In the left pane, click > Create Project.
Step 3 In the Add New Project window that is displayed, enter a name, description, and tags for the project in the
respective text boxes.
Step 4 Click Add to add the project.
The created project appears in the left pane.
What to do next
1. Create templates. See Create a Regular Template, on page 150.
Create Templates
Cisco DNA Center provides the following type of configuration templates. CLI templates allow you to choose
the elements in the configurations. Cisco DNA Center provides variables that you can replace with actual
values and logic statements.
• Regular templates
• Composite templates
• Make sure that you have Cisco WLC in your inventory. If not, discover Cisco WLC using the Discovery
function. For more information, see About Discovery, on page 11.
• Make sure that Cisco WLC is added to a site. For more information, see Add Devices to Sites, on page
219.
Procedure
Step 1 From the Cisco DNA Center home page, choose Tools > Template Editor.
Step 2 In the tree pane, select the project under which you are creating templates, and click the gear icon > Add
Templates or click > Add Templates located at the top of the left pane.
Step 3 In the Add New Template window that is displayed, click the Regular Template radio button.
Step 4 In the Name text box, enter a unique name for the template.
Step 5 In the Project Name text box, enter a unique name for the project.
The text box is enabled if you are navigating from the > Add Templates path. The text box is disabled if
you select a project, and click the gear icon > Add Templates in the tree pane.
Step 6 In the Description text box, enter a description for the template.
Step 7 In the Tags text box, enter an intuitive name to tag the templates . Tagging a configuration template helps
you to:
• Search a template using the tag name in the search field.
• Use the tagged template as a reference to configure more devices.
Step 8 If you are creating a template that applies only to a particular device type, from the Device Type drop-down
list, choose the device. The device types are displayed depending on your selection in the in the Device Type
drop-down list.
Step 9 From the Software Type drop-down list, choose the software type. You can select the specific software type
such as IOS-XE, IOS-XR, or NX-OS if there are commands specific to these software types. If you select the
software type as IOS, then the commands are applicable to all software types including IOS-XE, IOS-XR,
and NX-OS. This is used at the provisioning time to check whether the selected device is conforming to the
selection in the template.
Step 10 In the Software Version text box, enter the software version . During the provisioning, Cisco DNA Center
checks to see if the selected device has the similar software version as mentioned in the template. If there is
a mismatch, then the provision skips the template.
Step 11 Click Add to add the template. The template is created and is listed in the tree view menu under the project
you selected.
Step 12 You can edit the template content by selecting the template that you created in the left menu. To edit the
template content, see Edit Templates, on page 154.
Step 13 The Template Editor window opens where you can enter content for the template.
Step 14 To validate the template, from the Actions drop-down list, choose Check for errors.
The Cisco DNA Center checks for these errors and reports them:
• Velocity syntax error
• Conflicts with blacklisted commands
Step 15 To save the template content, from the Actions drop-down list, choose Save. You can use the Velocity
Template Language (VTL) to write the content in the template. For more information about using VTL, see
http://velocity.apache.org/engine/devel/vtl-reference.html.
After saving the template, Cisco DNA Center checks for any errors in the template. If there are any velocity
syntax errors, then the template content is not saved and all the input variables that are defined in the template
is automatically identified during the save process. The local variables (variables that are used in for loops,
assigned though a set, and so on) are ignored.
Step 16 To commit the template, from the Actions drop-down list, choose Commit. You can see only the committed
templates in the network profile section.
,
at the top-right corner of the page to enter additional information to variables in the template.
What to do next
1. Edit Templates. For more information about editing templates, see Edit Templates, on page 154
2. Assign templates to profiles. For more information on assigning templates to profiles, see Create and
Associate Templates to Wireless Profiles, on page 158
Blacklisted Commands
The blacklisted commands are the ones which are added to the blacklisted category. You can use these
commands only through the Cisco DNA Center applications. If you use blacklisted commands in your templates,
it shows a warning in the template that it may potentially conflict with some of the Cisco DNA Center
provisioning applications.
Use this query to find out the blacklisted commands which are part of the Cisco DNA Center: select commands
from cliconfigtree where sdnconfig_id in (selectid from SDNConfig where classname like
'SPFServiceConfig').
Sample Templates
Configure Hostname
hostname$name
Configure Interface
interface $interfaceName
description $description
Procedure
Step 1 From the Cisco DNA Center home page, choose Tools > Template Editor.
Step 2 In the left pane, select the project under which you are creating the templates. Click the gear icon > Add
Templates or click > Add Templates located at the top of the left pane.
Step 3 In the Add New Template window that is displayed, click the Composite Template radio button to create
composite sequential templates.
Step 4 In the Name text box, enter a unique name for the template.
Step 5 In the Project Name text box, enter a unique name for the project .
The text box is enabled if you are navigating from the > Add Templates path. The text box is disabled if
you select a project, and click the gear icon > Add Templates in the tree pane.
Step 6 Enter a description for the template in the Description text box.
Step 7 Enter an intuitive name to tag the templates in the Tags text box. Tagging a configuration template helps you
to:
• Search a template using the tag name in the search field.
• Use the tagged template as a reference to configure more devices.
Step 8 If you are creating a template that applies only to a particular device type, from the Device Type drop-down
list, choose a device. The device types are displayed depending on what you select in the Device Type
drop-down list.
Step 9 From the Software Type drop-down list, choose the software type. You can select the specific software type
such as IOS-XE, IOS-XR, or NX-OS if there are commands specific to these software types. If you select the
software type as IOS, then the commands are applicable to all software types including IOS-XE, IOS-XR,
and NX-OS. This is used at the provisioning time to check whether the selected device is conforming to the
selection in the template.
Step 10 Enter the software version in the Software Version text box. During the provisioning,Cisco DNA Center
checks to see if the selected device has the similar software version as mentioned in the template. If there is
a mismatch, then the provision skips the template.
Step 11 Click Add. The composite template is created and is listed in the left menu under the project you selected.
Step 12 Click the composite template that you created in the tree view pane.
Step 13 The Template Editor window opens where you can drag and drop templates from the tree view pane to create
a sequence. The templates are deployed based on the order in which they are sequenced. You can change the
order of templates in the Template Editor window.
Note You can drag and drop those templates that have the same device type, software type, and software
version as that of the composite template.
Step 14 To abort the deployment process upon failure of the first template, select the first template in the Template
Editor window and check the Abort sequence on targets if deployment fails checkbox.
Step 15 From the Actions drop-down list, choose Commit to commit the template content.
What to do next
1. Assign templates to profiles. See Create and Associate Templates to Wireless Profiles, on page 158.
Edit Templates
After creating a template, you can edit the template to include content to it.
Procedure
Step 1 From the Cisco DNA Center home page, choose Tools > Template Editor.
Step 2 Select the template that you want to edit in the left tree pane.
The Template Editor window appears in the right pane.
Step 3 In the Template Editor window, enter the template content. You can have a template with a single-line
configuration or a multi-select configuration.
Note Velocity template framework restricts the use of variables starting with a number. Hence, you must
ensure that the variable name starts with a letter and not with a number.
Step 4 Validate the template by selecting Check for errors from the Actions drop-down list.
Cisco DNA Center checks for these errors and reports them:
• Velocity syntax error
• Conflicts with blacklisted commands
,
which is located in the top-right corner to bind variables in the template to network settings.
• Select the variables in the Input Form pane and click the Required check box to bind variables to the
network settings.
• From the Display drop-down list, choose the type of UI widget you want to create at the time of
provisioning: Text Field, Single Select, or Multi Select.
• To bind variables to network settings, select each variable in the Input Form, and check the Bind to
Source check box under Content in the right pane.
• Choose the Source, Entity, and Attributes from the respective drop-down lists.
• For the source type CommonSettings, you can choose one of these entities: dhcp.server,
syslog.server, snmp.trap.receiver, ntp.server, timezone.site, device.banner, dns.server,
netflow.collector.
• For the source type NetworkProfile, you can choose the entity type as SSID. The SSID entity that
is populated is defined under the Design > Network Profile page. The binding generates a
user-friendly SSID name, which is a combination of SSID name, site, and SSID category. From the
Attributes drop-down list, select the attribute for SSID:wlanid. This attribute is used during the
advanced CLI configurations at the time of template provisioning.
• For the source type Inventory, you can choose one of these entities: Device or Interface. For the
entity type Device and Interface the Attribute drop-down list shows the device or interface attributes.
• For the source type Inventory, you can choose one of these entities: Device, Interface, APGroup,
or FlexGroup. For the entity type Device and Interface the Attribute drop-down list shows the
device or interface attributes. The variable resolves to the APGroup and FlexGroup name that is
configured on the device to which the template is applied.
After binding variables to a common setting, when you assign templates to a wireless profile and provision
the template, whatever network settings that you have defined under Network Settings > Network,
appears in the drop-down list. You must define these attributes under Network Settings > Network at
the time of designing your network.
Step 6 From the Actions drop-down list, choose Save to save the template content.
Step 7 From the Actions drop-down list, choose Commit to commit the template content.
What to do next
1. Assign templates to profiles and provision the template. See Create and Associate Templates to Wireless
Profiles, on page 158.
Template Simulation
The interactive template simulation allows you to simulate the CLI generation of templates by specifying test
data for variables before sending them to devices. You can save the test simulation result and use them in
future if required.
Procedure
,
which is located in the top-right corner to run simulation on commands.
• From the Actions drop-down list, choose New Simulation. In the New Simulation window, enter a
name for the simulation, and click Submit.
• In the Simulation Input form, complete the required fields, and click Run. The results are displayed in
the Template Preview window.
Step 1 Select the template in the left tree pane. The template window opens.
Step 2 Click the Form Editor icon that is located in the top-right corner to add additional metadata to the template
variables. All the variables that are identified in the template are displayed. You can configure the following
metadata:
• Check the Required check box if this is a required variable during the provisioning. All the variables
by default are marked as Required, which means you must enter the value for this variable at the time
of provisioning. If the parameter is not marked as Required and if you do not pass any value to the
parameter, then it results in substituting with an empty string at run time. A lack of variable can lead to
command failure which may not be syntactically correct. If you want to make an entire command optional
based on a variable not marked as Required, then you should use if-else block in the template.
• Enter the field name in the Field Name text box. This is the label that is used for the UI widget of each
variable during the provisioning.
• Enter the tooltip text that is displayed for each variable in the Tooltip text box.
• Enter the default value in the Default Value text box. This value appears during the provisioning as the
default value.
• Enter any instructional text in the Instructional Text text box. Instructional text appears within the UI
widget (for example, Enter the hostname here). The text within the widget is cleared when the user
clicks the widget to enter any text.
• Choose the data type from the Data Type drop-down list: String, Integer, IP Address, or Mac Address.
• Choose the type of UI widget you want to create at the time of provisioning from the Display Type
drop-down list: Text Field, Single Select, or Multi Select.
• Enter the number of characters that are allowed in the Maximum Characters text box. This is applicable
only for string data type.
Step 3 After configuring additional metadata information, from the Actions drop-down list, choose Save.
Step 4 After saving the template, you must version the template. You must version the template every time you make
changes to the template. To do that, from the Actions drop-down list, choose Commit. The Commit window
appears. You can enter a commit note in the Commit Note text box. However, the version numbers are
automatically generated by the system.
Step 5 To view the history, from the Actions drop-down list, select Show History to view previously created and
versioned templates. A pop-up window appears.
• Click View in the pop-up window to see the content of the old version.
• Click Edit in the pop-up window to edit the template.
Step 6 To view the old versions, from the Actions drop-down list, select
Variable Binding
While creating a template, it is possible to specify variables that is contextually substituted. Many of these
variables are available in the drop-down list in the template editor. In Cisco DNA Center Release 1.1, you
had to manually enter values for every variable that is defined in the template.
From Release 1.2 onwards, template editor provides an option to bind or use variables in the template with
the source object values either while editing or through the input form enhancements. For example, DHCP
server, DNS server, Syslog server, and so on.
The pre-defined object values can be one of the following:
• Inventory
• Device object
• Interface object
• Common Settings—Settings available under the Design > Network Settings > Network page. The
common settings variable binding resolves values that are based on the site to which the device belongs.
Special Keywords
All commands executed through templates are always in the config t mode. Therefore, you do not have to
specify the enable or config t commands explicitly in the template.
Interactive Commands
Specify #INTERACTIVE if you want to execute a command where user input is required.
An interactive command contains the input that must be entered following the execution of a command. To
enter an interactive command in the CLI Content area, use the following syntax:
CLI Command<IQ>interactive question 1 <R> command response 1 <IQ>interactive question
2<R>command response 2
Where <IQ> and <R> tags are case-sensitive and must be entered in uppercase.
#INTERACTIVE
crypto key generate rsa general-keys <IQ>yes/no<R> no
#ENDS_INTERACTIVE
Note In response to the interactive command question after providing a response, if the newline character is not
required, you must enter the <SF> tag. Include one space before the <SF> tag. When you enter the <SF> tag,
the </SF> tag pops up automatically. You can delete the </SF> tag because it is not needed.
For example:
#INTERACTIVE
config advanced timers ap-fast-heartbeat local enable 20 <SF><IQ>Apply(y/n)?<R>y
#ENDS_INTERACTIVE
#MODE_ENABLE
#INTERACTIVE
mkdir <IQ>Create directory<R>xyz
#ENDS_INTERACTIVE
#MODE_END_ENABLE
Multiline Commands
If you want multiple lines in the CLI template to wrap, use the MLTCMD tags. Otherwise, the command is
sent line by line to the device. To enter multiline commands in the CLI Content area, use the following syntax:
<MLTCMD>first line of multiline command
second line of multiline command
...
...
last line of multiline command</MLTCMD>
Procedure
Step 1 Choose Design > Network Profiles, and click Add Profile.
There are three types of profiles available:
• Routing & NFV—Select this to create a routing and NFV profile. See Routing &NFC for more
information.
• Switching—Select this to create a switching profile.
• Enter the Profile Name.
• Click +Add and select the device type and template from the Device Type and Template drop-down
lists.
Note If you do not see the template that you need, create a new template in Template Editor as
described in Create a Regular Template, on page 150.
• Click Save.
• Wireless—Select this to create a wireless profile. Before assigning wireless network profile to a template,
ensure that you have created wireless SSIDs.
• Enter the Profile Name.
• Click + Add SSID. Those SSIDs that were created under Network Settings > Wireless gets
populated.
• Under Attach Template(s) area, select the template you want to provision from the Template
drop-down list.
• Click Save to save the profile.
• Click Next.
• The Advanced Configuration window appears. The templates associated with the site through the
network profile appears in the advanced configuration.
• Use the Find feature to quickly search for the device by entering the device name or exapnd the
templates folder and select the template in the left pane. In the right pane, select values for those
attributes which are bound to source from the drop-down lists .
• To export the template variables into a CSV file while deploying the template, click Export in the
right pane. You can use the CSV file to make necessary changes in the variable configuration and
import it into DNA Center at a later time by clicking Import in the right pane.
• Click Next to deploy the template. You are prompted to deploy the template now or to schedule it to a
later time.
• To deploy the template now, click the Now radio button and click Apply. To schedule the template
deployment for a later date and time, click the Later radio button and define the date and time of the
deployment.
The Status column in the Device Inventory window shows SUCCESS after a successful deployment
Procedure
Step 1 From the Cisco DNA Center home page, click Command Runner in Tools.
The Command Runner window appears.
Step 2 From the Select one or more device(s) drop-down list, choose a device or devices on which to run diagnostic
CLI commands.
A Device List with your selection appears.
Step 3 Either select another device to add to the list or click your selected device or devices to close them.
Note Although the device list displays everything available in inventory, Command Runner is not supported
for wireless access points and Cisco Meraki devices. If you choose an access point device or Cisco
Meraki device, a warning message appears, stating that no commands will be executed on them.
Step 4 In the Add a Command field, enter a CLI command and click Add.
Step 5 Click Run Command(s).
If successful, a Command(s) executed successfully message appears.
Step 6 Click the command displayed underneath the device to view the command output.
The complete command output is then displayed in the Command Runner window.
Step 7 Click Copy CLI to copy the command output to your clipboard so that you can paste it to a text file, if
necessary.
Step 8 Click Previous Page to return to the previous window.
Note If necessary, click the x symbol next to a device name to remove the device from the device list.
Similarly, click the x symbol next to a command to remove the command from the command list.
About Telemetry
The Telemetry tool allows you to configure and apply profiles on devices for monitoring and assessing their
health.
Note By default, the Disable-Telemetry profile is configured by Network Data Platform (NDP) on all the interfaces
on all the capable devices.
Procedure
Step 1 From the Cisco DNA Center home page, choose Telemetry from the Tools area.
The Telemetry window appears.
Step 2 Click the Site View tab and check to see if network devices are listed in this window.
Note After configuring telemetry profiles, you will have to return to this window and apply the telemetry
profiles to your devices.
What to do next
Proceed to apply the telemetry profile or profiles to your network devices. Use the Telemetry Site View
options and fields to accomplish this task.
Procedure
Step 1 From the Cisco DNA Center home page, choose Telemetry from the Tools area.
The Telemetry window appears.
Step 4 Check the check box next to the Device Name of a device to add a telemetry profile to that device.
Step 5 From the Actions drop-down list, choose a telemetry profile.
Step 6 From the Show drop-down list, choose the telemetry profile that you applied in Step 5.
The device should appear in the filtered list, along with any other devices that have also been configured with
the same telemetry profile.
What to do next
Access the Cisco DNA Assurance application and review both Assurance Health and Assurance Issues to
check the health of your network devices.
Policy Overview
Cisco DNA Center enables you to create policies that reflect your organization's business intent for a particular
aspect of the network, such as network access. Cisco DNA Center takes the information collected in a policy
and translates it into network-specific and device-specific configurations required by the different types,
makes, models, operating systems, roles, and resource constraints of your network devices.
Using Cisco DNA Center, you can create virtual networks, access control policies, and traffic copy policies.
Policy Dashboard
The Policy Dashboard window shows the number of virtual networks, group-based access control policies,
IP-based access control policies, traffic copy policies, scalable groups, and IP network groups that you have
created. In addition, it shows the number of policies that have failed to deploy.
The Policy Dashboard window provides a list of policies and the following information about each policy:
• Policy Name—Name of policy.
• Policy Type—Type of policy. Valid types are Access Control and Traffic Copy.
• Policy Version—Iteration of policy. Each time a policy is changed and saved, it is incremented by one
version. For example, when you create a policy and save, the policy is at Version 1. If you change the
policy and save it again, the version of the policy is incremented to Version 2.
• Modified By—User who modified the particular version of a policy.
• Description—Word or phrase that identifies a policy.
Note Cisco DNA Center does not support access control policies with logging as an action. Therefore, Cisco ISE
does not propagate any such policies to Cisco DNA Center.
Depending on your organization's configuration and its access requirements and restrictions, you can segregate
the scalable groups into different virtual networks to provide further segmentation.
A group-based access control policy has two main components:
• Scalable Groups—Scalable groups comprise a grouping of users, end-point devices, or resources that
share the same access control requirements. These groups (known in Cisco ISE as security group) are
defined in Cisco ISE. A scalable group may have as few as one item (one user, one end-point device, or
one resource) in it.
• Access Contract—An access contract is a common building block that is used in both group-based and
IP-based access control policies. It defines the rules that make up the access control policies. These rules
specify the actions (permit or deny) performed when traffic matches a specific port or protocol and the
implicit actions (permit or deny) performed when no other rules match.
Before you can create group-based access control policies, make sure that Cisco ISE is integrated with Cisco
DNA Center. Verify that the scalable groups have been propagated to Cisco DNA Center from Cisco ISE.
To do this, from the Cisco DNA Center home page, choose Policy > Group-Based Access Control > Scalable
Groups. You should see scalable groups populated under the Scalable Groups tab. If you do not see any
scalable groups, verify if Cisco ISE is integrated correctly. For more information, see the Cisco Digital Network
Architecture Center Installation Guide.
After you create a group-based access control policy, Cisco DNA Center translates the policy into an SGACL,
which is ultimately deployed on a device.
The following sample procedure describes the process of authentication and access control that a user
experiences after logging in to the network:
1. A user connects to a port on a switch and provides credentials.
2. The switch contacts Cisco ISE.
3. Cisco ISE authenticates the user and downloads the SGACLs to the port to which the user is connected.
4. The user is granted or denied access to specific users or devices (servers) based on the access granted in
the SGACLs.
Procedure
Step 1 (Optional) Create virtual networks. Depending on your organization's configuration and its access requirements
and restrictions, you can segregate your groups into different virtual networks to provide further segmentation.
For more information, see Create a Virtual Network, on page 217.
Step 2 (Optional) Create scalable groups. After you integrate Cisco DNA Center with Cisco ISE, the scalable groups
that exist in Cisco ISE are propagated to Cisco DNA Center. If a scalable group that you need does not exist,
you can create it in Cisco ISE.
For more information, see Create a Group-Based Scalable Group, on page 169.
Step 3 Create an access control contract. A contract defines a set of rules that dictate the action (allow or deny) that
network devices perform based on the traffic matching particular protocols or ports.
For more information, see Create a Group-Based Access Control Contract, on page 170.
Step 4 Create a group-based access control policy. The access control policy defines the access control contract that
governs traffic between source and destination scalable groups.
For information, see Create a Group-Based Access Control Policy, on page 171
Note You cannot edit or delete scalable groups from Cisco DNA Center; you need to perform these tasks from
Cisco ISE. After you delete a scalable group from Cisco ISE, the scalable group name is not removed from
the Cisco DNA Center policy dashboard. Instead, the Cisco DNA Center policy dashboard displays the scalable
group in red text to indicate that it has been deleted.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Group-Based Access Control > Scalable Groups.
All of the scalable groups that have been created in Cisco ISE are displayed.
Step 3 In Cisco ISE, create scalable groups (called security groups in Cisco ISE).
For more information, see the Cisco Identity Services Engine Administrator Guide.
Step 1 From the Cisco DNA Center home page, choose Policy > Group-Based Access Control > Access Contract.
Step 2 Click Add Contract.
Step 3 In the dialog box, enter a name and description for the contract.
Step 4 From the Implicit Action drop-down list, choose either Deny or Permit.
Step 5 From the Action drop-down list in the table, choose either Deny or Permit.
Step 6 From the Port/Protocol drop-down list, choose a port or protocol.
a) If Cisco DNA Center does not have the port or protocol that you need, click Add Port/Protocol to create
your own.
b) In the Name field, enter a name for the port or protocol.
c) From the Protocol drop-down list, choose UDP, TDP, or TCP/UDP as the protocol.
d) In the Port Range field, enter the port range.
e) If you want Cisco DNA Center to configure the port or protocol as defined, and not report any conflicts,
check the Ignore Conflict check box.
Step 7 (Optional) To include more rules in your contract, click Add and repeat Step 5 and Step 6.
Step 8 Click Save.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Group-Based Access Control > Access Contracts.
Step 2 Check the check box next to the contract that you want to edit or delete, and do one of the following tasks:
• To make changes to the contract, click Edit, make the changes, and, click Save. For field definitions,
see Create a Group-Based Access Control Contract, on page 170.
Note If you make changes to a contract that is used in a policy, you need to deploy the modified
policy by choosing Policy > Group-Based Access Control > Group-Based Access Control
Policies, checking the check box next to the policy name, and clicking Deploy.
Step 1 From the Cisco DNA Center home page, choose Policy > Group-Based Access Control > Group-Based
Access Control Policies.
Step 2 Click Add Policy. The Add Policy dialog box is displayed.
Step 3 In the Policy Name field, enter the name of the policy. The name can be up to 255 alphanumeric characters
in length, including hyphens (-) and underscore (_) characters.
Step 4 In the Description field, enter a word or phrase that identifies the policy.
Step 5 In the Contract field, click Add Contract.
Contract field has rules that govern the network interaction between the source and destination scalable
groups.
Step 6 In the dialog box, click the radio button next to the contract that you want to use.
Step 7 Alternatively, you can select the permit (permit all traffic) or deny (deny all traffic) contract.
Step 8 Check the Enable Policy check box, if the policy is not active.
If you uncheck the Enable Policy check box, the policy is disabled and it is saved only to Cisco DNA Center.
The policy is not synchronized with Cisco ISE or deployed in the network.
Step 9 Check the Enable Bi-directional check box, to enable the contract for traffic flowing in both directions (from
the source to the destination and from the destination to the source).
If you want the traffic to flow only from the source to the destination, uncheck the Enable Bi-directional
check box.
Step 10 To define the source-scalable groups, drag and drop the scalable groups from the Available Security Groups
area to the Source Scalable Groups area.
Step 11 To define the destination scalable groups, drag and drop the scalable groups from the Available Security
Groups area to the Destination Scalable Groups area.
Step 12 Click Save.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Group-Based Access Control > Group-Based
Access Control Policies.
Step 2 Check the check box next to the policy that you want to edit or delete.
Step 3 Do one of the following tasks:
• To make changes, click Edit, make the changes, and click Save. For field definitions, see Create a
Group-Based Access Control Policy, on page 171.
Note If you make changes to the policy, deploy the modified policy by checking the check box next
to the policy name, and clicking Deploy.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Group-Based Access Control > Group-Based
Access Control.
Step 2 Locate the policy that you want to deploy.
Step 3 Check the check box next to the policy.
Step 4 Click Deploy.
You are prompted to deploy your policy immediately or to schedule it for a later time.
Note The site time zone setting is not supported for scheduling application policy deployments.
Note Editing an IP network group on the Policy > IP Based Access Control window
is possible without Cisco ISE. But the creation of IP network groups from the IP
Based Access Control window requires Cisco ISE.
• Make sure you have defined the following global network settings and provision the device:
• Network servers, such as AAA, DHCP, and DNS Servers—(See Configure Global Network Servers,
on page 143.)
• Device credentials such as CLI, SNMP, HTTP, and HTTPS credentials—(See About Global Device
Credentials, on page 134.)
• IP address pools—(See Configure IP Address Pools, on page 142.)
• Wireless settings as SSIDs, wireless interfaces, and wireless radio frequency profiles—(See Configure
Global Wireless Settings, on page 119.)
• Provision devices—(See Provisioning, on page 219.)
Procedure
Step 3 Create an IP-based access control policy. The access control policy defines the access control contract that
governs traffic between the source and destination IP network groups.
For more information, see Create an IP-Based Access Control Policy, on page 176.
Note You can override global network settings on a site by defining site-specific settings.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > Network.
Step 2 In the DHCP Server field, enter the IP address of a DHCP server.
Note You must define at least one DHCP server in order to create IP address pools.
Step 3 In the DNS Server field, enter the domain name of a DNS server.
Note You must define at least one DNS server in order to create IP address pools.
Step 4 (Optional) You can enter Syslog, SNMP Trap, and NetFlow Collector server information. Click Add Servers
to add an NTP server.
Step 5 Click Save.
Step 1 From the Cisco DNA Center home page, choose Policy > IP Based Access Control > IP Network Groups.
Step 2 Click Add Groups.
Step 3 In the Name field, enter a name for the IP network group.
Step 4 In the Description field, enter a word or phrase that describes the IP network group.
Step 5 In the IP Address or IP/CIDR field, enter the IP addresses that make up the IP network group.
Step 6 Click Save.
Step 1 From the Cisco DNA Center home page, choose Policy > IP Based Access Control > IP Network Groups.
Step 2 In the IP Network Groups table, check the check box next to the group that you want to edit or delete.
Step 3 Do one of the following tasks:
• To make changes to the group, click Edit. For field definitions, see Create an IP Network Group, on
page 175.
• To delete the group, click Delete and then click Yes to confirm.
Step 1 From the Cisco DNA Center home page, choose Policy > IP Based Access Control > Access Contract.
Step 2 Click Add Contract.
Step 3 In the dialog box, enter a name and description for the contract.
Step 4 From the Implicit Action drop-down list, choose either Deny or Permit.
Step 5 From the Action drop-down list in the table, choose either Deny or Permit.
Step 6 From the Port/Protocol drop-down list, choose a port or protocol.
a) If Cisco DNA Center does not have the port or protocol that you need, click Add Port/Protocol to create
your own.
b) In the Name field, enter a name for the port or protocol.
c) From the Protocol drop-down list, choose UDP, TDP, or TCP/UDP as the protocol.
d) In the Port Range field, enter the port range.
e) If you want Cisco DNA Center to configure the port or protocol as defined, and not report any conflicts,
check the Ignore Conflict check box.
Step 7 (Optional) To include more rules in your contract, click Add and repeat Step 5 and Step 6.
Step 8 Click Save.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > IP-Based Access Control > Access Contract.
Step 2 Check the check box next to the contract that you want to edit or delete and do one of the following tasks:
• To make changes to the contract, click Edit, make the changes, and, click Save. For field definitions,
see Create an IP-Based Access Control Contract, on page 175.
Note If you make changes to a contract that is used in a policy, you need to deploy the modified
policy by choosing Policy > IP-Based Access Control > IP-Based Access Control Policies,
checking the check box next to the policy name, and clicking Deploy.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > IP Based Access Control > IP Based Access
Control Policies.
Step 2 Click Add Policy.
Step 3 Complete the following fields:
Field Description
SSID Lists FlexConnect SSIDs and non-FlexConnect SSIDs that were created during
the design of SSIDs. If the selected SSID is configured in a FlexConnect mode,
then the access policy is configured in FlexConnect mode. Otherwise, it will be
configured in a regular way.
Note If an SSID is part of one policy, that SSID will not be available for
another policy.
A valid site-SSID combination is required for policy deployment. You
will not be able to deploy a policy if the selected SSID is not
provisioned under any devices.
Site Scope Sites to which a policy is applied. If you configure a wired policy, the policy is
applied to all wired devices in the site scope. Likewise, if you configure a wireless
policy for a selected service set identifier (SSID), the policy is applied to all of
the wireless devices with the SSID defined in the scope. For more information,
see Site Scope, on page 180.
Source Origin of the traffic that is affected by the contract. From the SearchSource
drop-down list, choose an IP network group. If the IP network that you want is
not available, click +Group to create one.
Contract Rules that govern the network interaction between the source and destination in
an ACL. Click Add Contract to define the contract for the policy. In the dialog
box, click the radio button next to the contract that you want to use. Alternatively,
you can select the permit (permit all traffic) or deny (deny all traffic) contract.
Destination Target of the traffic that is affected by the contract. Click the SearchDestination
drop-down list, choose an IP network group. If the IP network that you want is
not available, click +Create IP Network Group to create one.
Direction Configures the relationship of the traffic flow between the source and destination.
To enable the contract for traffic flowing from the source to the destination, select
One-Way. To enable the contract for traffic flowing in both directions (from the
source to the destination and from the destination to the source), select
Bi-directional.
Step 6 (Optional) To reorder the sequence of the rules, drag and drop a rule in the order you want.
Step 7 Click Deploy.
The success message "IP-Based Access Control Policy has been created and deployed successfully"
is displayed. Depending on the SSID selected, either a FlexConnect policy or a standard policy is created with
different levels of mapping information and deployed. The Status of the policy is shown as DEPLOYED.
A wireless icon next to the Policy Name shows that the deployed access policy is a wireless policy.
Note If you edit a policy, the policy's state changes to MODIFIED on the IP Based Access Control Policies
window. A modified policy is considered to be stale because it is inconsistent with the policy that was deployed
in the network. To resolve this situation, you need to redeploy the policy to the network.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > IP Based Access Control > IP Based Access
Control Policies.
Step 2 Check the check box next to the policy that you want to edit or delete and do one of the following tasks:
• To make changes, click Edit. When you are done, click Save.For field definitions, see Create an IP-Based
Access Control Policy, on page 176.
• To delete the policy, click Delete.
Step 3 If you make changes to the policy, deploy the modified policy by checking the check box next to the policy
name and clicking Deploy.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > IP Based Access Control > IP Based Access
Control Policy.
Step 2 Locate the policy that you want to deploy.
Step 3 Check the check box next to the policy.
Step 4 Click Deploy.
You are prompted to deploy your policy immediately or to schedule it for a later time.
• To schedule the policy deployment for a later date and time, click the Schedule Later radio button and
define the date and time of the deployment.
Note The site time zone setting is not supported for scheduling application policy deployments.
Application Policies
Quality of Service (QoS) refers to the ability of a network to provide preferential or deferential service to
selected network traffic. By configuring QoS, you can ensure that network traffic is handled in such a way
that makes the most efficient use of network resources while still adhering to the objectives of the business,
such as guaranteeing that voice quality meets enterprise standards, or ensuring a high Quality of Experience
(QoE) for video.
You can configure QoS in your network using application policies in Cisco DNA Center. Application policies
comprise these basic parameters:
• Application Sets—Sets of applications with similar network traffic needs. Each application set is assigned
a business relevance group (business relevant, default, or business irrelevant) that defines the priority of
its traffic. QoS parameters in each of the three groups are defined based on Cisco Validated Design
(CVD). You can modify some of these parameters to more closely align with your objectives. For more
information, see Applications and Application Sets, on page 180.
• Site Scope—Sites to which an application policy is applied. If you configure a wired policy, the policy
is applied to all the wired devices in the site scope. Likewise, if you configure a wireless policy for a
selected service set identifier (SSID), the policy is applied to all of the wireless devices with the SSID
defined in the scope. For more information, see Site Scope, on page 180.
Cisco DNA Center takes all of these parameters and translates them into the proper device CLI commands.
When you deploy the policy, Cisco DNA Center configures these commands on the devices defined in the
site scope.
Note Cisco DNA Center configures QoS policies on devices based on the QoS feature set available on the device.
For more information about a device’s QoS implementation, see the corresponding device's product
documentation.
http://www.ciscopress.com/store/end-to-end-qos-network-design-quality-of-service-for-9781587143694. For
additional information, see the following Cisco documentation:
• Cisco Validated Designs
• Enterprise Medianet Quality of Service Design 4.0
• Medianet Campus QoS Design 4.0
• Medianet WAN Aggregation QoS Design 4.0
Site Scope
A site scope defines the sites to which an application policy is applied. When defining a policy, you configure
whether a policy is for wired or wireless devices. You also configure a site scope. If you configure a wired
policy, the policy is applied to all the wired devices in the site scope. Likewise, if you configure a wireless
policy for a selected service set identifier (SSID), the policy is applied to all of the wireless devices in the site
scope with the SSID defined in the scope.
This allows you to make tradeoffs as necessary to compensate for differences in the behaviors between wired
and wireless network segments. For example, wireless networks typically have lower bandwidth, lower speed,
and increased packet loss in comparison to wired networks. Individual wireless segments may exhibit further
variation due to local conditions of RF interference, congestion, and other factors, such as the varying
capabilities of network devices. The ability to apply per-segment policies to individual wireless segments
enables the adjustment of traffic-handling rules to ensure that the highest-priority traffic is least affected by
degradation of the wireless network.
Business-Relevance Groups
A business-relevance group classifies a given application set according to how relevant it is to your business
and operations.
The business-relevance groups are business relevant, default, and business irrelevant, and they essentially
map to three types of traffic: high priority, neutral, and low priority.
• Business Relevant—(High-priority traffic) The applications in this group directly contribute to
organizational objectives and, as such, may include a variety of applications, including voice, video,
streaming and collaborative multimedia applications, database applications, enterprise resource
applications, email, file-transfers, content distribution, and so on. Applications designated as
business-relevant are treated according to industry best-practice recommendations, as prescribed in
Internet Engineering Task Force (IETF) RFC 4594.
• Default—(Neutral traffic) This group is intended for applications that may or may not be business-relevant.
For example, generic HTTP/HTTPS traffic may contribute to organizational objectives at times, while
at other times such traffic may not. You may not have insight into the purpose of some applications (for
instance, legacy applications or even newly deployed applications), so the traffic flows for these
applications should be treated with the Default Forwarding service, as described in IETF RFC 2747 and
4594.
• Business Irrelevant—(Low-priority traffic) This group is intended for applications that have been
identified to have no contribution towards achieving organizational objectives. They are primarily
consumer- and/or entertainment-oriented in nature. We recommend that this type of traffic be treated as
a "Scavenger" service, as described in IETF RFC 3662 and 4594.
Applications are grouped into application sets and sorted into business-relevance groups. You can include an
application set in a policy as-is, or you can modify it to meet the needs of your business objectives and your
network configuration.
For example, YouTube is member of the consumer-media application set, which is business-irrelevant (by
default), because most customers typically classify this application this way. However, this classification may
not be the true for all companies; for example, some businesses may be using YouTube for training purposes.
In such cases, an administrator can move the YouTube application into the streaming-video application set,
which is business relevant by default.
Setting up this relationship allows you to configure specific service levels for traffic matching this scenario.
Relevant VoIP1 Expedited Priority Queuing VoIP telephony (bearer-only) traffic, for
Forwarding (PQ) example, Cisco IP phones.
(EF)
Signaling CS3 BW Queue and Control-plane traffic for the IP voice and
DSCP video telephony infrastructure.
Custom Applications
Custom applications are applications that you add to Cisco DNA Center. An orange bar is displayed next to
custom applications to distinguish them from the standard NBAR2 applications and application sets. For wired
devices, you can define applications based on server name, IP address and port, or URL. You cannot define
custom applications for wireless devices.
When you define an application according to its IP address and port, you can also define a DSCP value and
port classification.
To simplify the configuration process, you can define an application based on another application that has
similar traffic and service-level requirements. Cisco DNA Center copies the other application's traffic class
settings to the application that you are defining.
Cisco DNA Center does not configure ACLs for port numbers 80, 443, and 8080 even if they are defined as
part of a custom application. If the custom application has a transport IP defined, Cisco DNA Center configures
the application on the devices.
Note For a custom application to be programmed on devices when a policy is deployed, you must assign the custom
application to one of the application sets defined in the policy.
Favorite Applications
Cisco DNA Center allows you to flag applications that you want to configure on devices before all other
applications, except custom applications. Flagging an application as a favorite helps to ensure that the QoS
policies for your favorite applications get configured on devices. For more information, see Processing Order
for Devices with Limited Resources, on page 188.
Although there is no limit to the number of applications that you can mark as favorite, designating only a
small number of favorite applications, for example, less than 25, helps to ensure that these applications are
treated correctly from a business-relevance perspective in deployments with network devices that have limited
ternary content addressable memory (TCAM).
Favorite applications can belong to any business-relevance group or traffic class and are configured
system-wide, not on a per-policy basis. For example, if you flag the Cisco Jabber video application as a
favorite, the application is flagged as a favorite in all policies.
Keep in mind that not only can business-relevant applications be flagged as favorites, even business irrelevant
applications can be flagged as such. For example, if an administrator notices a lot of unwanted Netflix traffic
on his network, the administrator might chose to flag Netflix as a favorite application (despite it being assigned
as business irrelevant). In this case, Netflix will be programmed into the device policies before other
business-irrelevant applications, ensuring that the business intent of controlling this application is realized.
Voice EF Yes 10 —
Default 0 — — 31
Voice EF Yes 10 —
Video AF41 — — 34
Voice EF Yes 10 —
Default 0 — — 30
Network-Control CS6 — — 5
Management
Scavenger CS1 — — 1
Voice EF Yes 10 —
Default 0 — — 25
Queuing Profiles
Queuing profiles allow you to define an interface's bandwidth allocation based on the interface speed and the
traffic class.
Note Queueing profiles do not apply to WAN-facing interfaces that are connected to a service provider profile.
If the speed of an interface falls between two interface speeds, Cisco DNA Center treats the interface at the
lower interface speed.
Note Cisco DNA Center attempts to detect the operational speed of the interface in order to apply the correct policy.
However, if a switch port is administratively down, Cisco DNA Center cannot detect the speed. In this case,
Cisco DNA Center uses the interface's supported speed.
You define a queuing policy as part of an application policy. When you deploy the application policy, the
devices in the sites that are selected in the site scope are configured with the assigned LAN queuing policy.
If no LAN queuing policy is assigned, the application policy uses the default CVD queuing policy.
If you change the queuing policy in an application policy that has already been deployed, the policy becomes
stale, and you need to redeploy the policy for the changes to be configured on the devices.
Note the following additional guidelines and limitations of queuing policies:
• You cannot delete a LAN queuing profile if it is used in a policy.
• If you update a queuing profile that is associated with a policy, the policy is marked as stale. You need
to redeploy the policy to provision the latest changes.
• Traffic class queuing customization does not affect interfaces on Cisco service provider switches and
routers. You should continue to configure these interfaces without using Cisco DNA Center.
Voice 10%
Network control 3%
Signaling 2%
OAM 2%
Bulk Data 4%
Scavenger 1%
1. Rank—Number assigned to custom and favorite applications, but not to existing, default NBAR
applications. The lower the rank number, the higher the priority. For example, an application with rank
1 has a higher priority than an application with rank 2, and so on. Having no rank is the lowest priority.
2. Traffic Class—Priority based on the following order: Signaling, Bulk Data, Network Control, Operations
Administration Management (Ops Admin Mgmt), Transactional Data, Scavenger, Multimedia Streaming,
Multimedia Conferencing, Real Time Interactive, Broadcast Video, and VoIP Telephony
3. Popularity—Number (1–10) that is based on CVD criteria. The popularity number cannot be changed.
An application with a popularity of 10 has a higher priority than an application with a popularity of 9,
and so on.
4. Alphabetization—If two or more applications have the same rank and popularity number, they are sorted
alphabetically by the application’s name, and assigned a priority accordingly.
For example, let us assume that you define a policy that has the following applications:
• Custom application, custom_realtime, which has been assigned rank 1 and popularity 10 by default.
• Custom application, custom_salesforce, which has been assigned rank 1 and popularity 10 by default.
• Application named corba-iiop, which is in the transactional data traffic class, and you have designated
as a favorite, giving that application a ranking of 10,000 and popularity of 9 (based on CVD).
• Application named gss-http, which is in the Ops Admin Mgmt traffic class, and you have designated as
a favorite, giving that application a ranking of 10,000 and popularity of 10 (based on CVD).
• All other, default NBAR applications, which have no rank, but will be processed according to their traffic
class and default popularity (based on CVD).
According to the prioritization rules, the applications are configured on the device in this order:
1. Custom application, custom_realtime Custom applications are given highest priority. Given
that the custom_salesforce and custom_realtime
2. Custom application, custom_salesforce applications have the same rank and popularity, they
are sorted alphabetically, custom_realtime before
custom_salesforce.
5. All other, default NBAR applications All other applications are next and are prioritized
according to traffic class and then popularity, with
the applications having the same popularity being
alphabetized according to the application’s name.
Policy Drafts
When you create a policy, you can save it as a draft without having to deploy it. Saving it as a draft allows
you open the policy later and make changes to it. You can also make changes to a deployed policy, and save
it as a draft.
Note After you save or deploy a policy, you cannot change its name.
Draft policies and deployed policies are related to one another, but they have their own versioning, as follows:
When you save a policy as a draft, Cisco DNA Center appends the policy name with (Draft), and increments
the version number. When you deploy a policy, Cisco DNA Center increments the version number of the
deployed policy.
For example, as shown in the figure below, you create a policy named testPolicy1 and save it as a draft. The
policy is saved as testPolicy1 (Draft), version number 1. You make a change to the draft and save it again.
The policy has the same name, testPolicy1 (Draft), but its version number is incremented to 2.
You decide you like the policy, and you deploy it to the network. The policy is deployed with the name
testPolicy1 and its version number is 1. You make a change to the deployed policy and save it as a draft. The
draft policy, testPolicy1 (Draft) is incremented to version number 3. When you ultimately deploy that version,
testPolicy1 is incremented to version 2.
Any time you modify and save either a draft policy or a deployed policy, the draft policy version number is
incremented. Similarly, any time you deploy either a draft policy or a modified deployed policy, the deployed
policy version is incremented.
Just as with deployed policies, you can display the history of draft policies and roll them back to previous
versions.
For more information about viewing the history of policy versions and rolling back to a previous version, see
Policy Versioning, on page 192.
Policy Preview
Before you deploy a policy, you can generate the CLI that will be applied to a device.
The Preview operation generates the CLI commands for a policy, compares them with the CLI commands in
the running configuration on the device, and returns only the remaining CLI commands that are required to
configure the policy on the device.
After reviewing the preview output, you can deploy the policy to all of the devices in the scope, or you can
continue to make changes to the policy.
Policy Precheck
When you create an application policy, you can verify if it will be supported on the devices in the site scope
before you deploy it. The precheck function verifies if the device type, model, line cards, and software images
support the application policy that you created. If any of these components are not supported, Cisco DNA
Center reports a failure for the device. Cisco DNA Center also provides possible ways to correct the failures.
If these remedies do not fix the failure, you can remove the device from the site scope.
If you deploy the application policy as-is, the policy will fail to deploy on the devices that reported a failure
during the precheck process. To avoid the failure, you can remove the device from the site scope or update
the device components to a level that the application policy supports. For a list of supported devices, see the
Cisco Digital Network Architecture Center Supported Devices document.
Policy Scheduling
After you create or change a policy, you can deploy or redeploy the policy to the devices associated with it.
You can deploy or redeploy a policy immediately or at a specific date and time, for example, on a weekend
during off-peak hours. You can schedule a policy deployment for wired or wireless devices.
After you have scheduled a policy to be deployed, the policy and site scope are locked. You can view the
policy, but you cannot edit it. If you change your mind about deploying the policy, you can cancel it.
Note When the scheduled event occurs, the policy is validated against the various policy components, for example,
applications, application sets, and queuing profiles. If this validation fails, the policy changes are lost.
Policy Versioning
Policy versioning allows you to do the following tasks:
• Compare a previous version to the current (latest) one to see the differences.
• Display previous versions of a policy and select a version to reapply to the devices in a site scope.
Editing one version of a policy does not affect other versions of that policy or the components of the policy,
such as the application sets that the policy manages. For example, deleting an application set from a policy
does not delete the application set from Cisco DNA Center, other versions of that policy, or even other policies.
Because policies and application sets exist independent of each other, it is possible to have a policy version
that contains application sets that no longer exist. If you attempt to deploy or roll back to an older version of
a policy that references an application set that no longer exists, an error occurs.
Note Policy versioning does not capture changes to applications (such as rank, port, and protocol), application set
members, LAN queuing profiles, and sites.
Note Because the Modular QoS CLI policies are not deleted from the device, if you remove these policies, you will
not be able to restore them using the Cisco DNA Center original policy restore feature.
When you restore the original policy configuration onto a device, Cisco DNA Center removes the existing
policy configuration that you deployed and reverts to the original configuration that was on the device.
Any Modular QoS CLI policy configurations that existed before you deployed application policies are reattached
to the interfaces. However, queuing policies, such as multilayer switching (MLS) configurations, are not
restored; instead, the devices retain the MLS configurations that were last applied through Cisco DNA Center.
After you restore the original policy configuration to the device, the policy that is stored in Cisco DNA Center
is deleted.
Note the following additional guidelines and limitations for this feature:
• If the first attempt to deploy a policy to a device fails, Cisco DNA Center automatically attempts to
restore the original policy configurations onto the devices.
• If a device is removed from an application policy after that policy has been applied to the device, the
policy remains on the device. Cisco DNA Center does not automatically delete the policy or restore the
QoS configuration on the device to its original (pre-Cisco DNA Center) configuration.
a second device has the same WLAN, but it is configured as a fabric SSID. When you perform a
Learn Config, only one SSID name is learned. The other SSID name from the other device is
discarded. This behavior can cause conflicts especially if the second device supports only fabric
SSID names, but Cisco DNA Center is trying to perform operations on the device with non-fabric
SSID names.
• IPACL Policy—When deploying an IPACL policy, Cisco DNA Center randomly applies the policy
to only one of the duplicate SSIDs. In addition, scenarios involving Flex Connect are also impacted.
• Cisco DNA Center does not recommend out-of-band (OOB) changes to device configurations. If you
make OOB changes, the policy in Cisco DNA Center and the one configured on the device become
inconsistent. The two policies remain inconsistent until you deploy the policy from Cisco DNA Center
to the device again.
• The QoS trust functionality cannot be changed.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Applications.
Step 2 Use the Search, Show, or View By fields to locate the application that you want to change.
Step 3 Click the application name.
Step 4 In the dialog box, change one or both settings:
• Traffic Class—Choose a traffic class from the drop-down list. Valid traffic classes are
BROADCAST_VIDEO, BULK_DATA, MULTIMEDIA_CONFERENCING,
MULTIMEDIA_STREAMING, NETWORK_CONTROL, OPS_ADMIN_MGMT,
REAL_TIME_INTERACTIVE, SIGNALING, TRANSACTIONAL_DATA, VOIP_TELEPHONY.
• Application Set—Choose an application set from the drop-down list. Valid application sets are
authentication-services, backup-and-storage, collaboration-apps, consumer-browsing,
consumer-file-sharing, consumer-gaming, consumer-media, consumer-misc, consumer-social-networking,
database-apps, desktop-virtualization, email, enterprise-ipc, file-sharing, generic-browsing, generic-media,
generic-misc, generic-tunneling, intranet-apps, naming-services, network-control, network-management,
remote-access, saas-apps, signaling, software-development-tools, software-updates, streaming-media.
Procedure
Step 1 From the Cisco DNA Center home page, click Policy > Application > Applications.
Step 2 Click Add Application.
Step 3 In the dialog box, complete the following fields:
Field Description
Application name Name of the custom application. The name can contain up to 24 alphanumeric
characters, including underscores and hyphens. The underscore and hyphen
characters are the only special character allowed in the application name.
Type Method by which users access the application. Choose Server Name for
applications that are accessible through a server.
Similar To Application with the similar traffic-handling requirements. Click the radio-button
to select this option, then select an application from the drop-down field. Cisco
DNA Center copies the other application's traffic class to the application that you
are defining.
Traffic Class Traffic class to which the application belongs. Valid values are BULK_DATA,
TRANSACTIONAL_DATA, OPS_ADMIN_MGMT, NETWORK_CONTROL,
VOIP_TELEPHONY, MULTIMEDIA_CONFERENCING,
MULTIMEDIA_STREAMING, BROADCAST_VIDEO,
REAL_TIME_INTERACTIVE, and SIGNALING.
Application Set Application set that you want the application to reside. Valid application sets are
authentication-services, backup-and-storage, collaboration-apps,
consumer-browsing, consumer-file-sharing, consumer-gaming, consumer-media,
consumer-misc, consumer-social-networking, database-apps,
desktop-virtualization, email, enterprise-ipc, file-sharing, generic-browsing,
generic-media, generic-misc, generic-tunneling, intranet-apps, naming-services,
network-control, network-management, remote-access, saas-apps, signaling,
software-development-tools, software-updates, streaming-media.
Procedure
Step 1 From the Cisco DNA Center home page, click Policy > Application > Applications.
Step 2 Click Add Application.
Step 3 In the dialog box, provide the necessary information in the following fields:
Field Description
Application name Name of the custom application. The name can contain up to 24 alphanumeric
characters, including underscores and hyphens. The underscore and hyphen
characters are the only special character allowed in the application name.
Type Method by which users access the application. Choose Server IP/Port for
applications that are accessible through an IP address and port.
DSCP Differentiated Services Code Point (DSCP) value. Check the DSCP check box
and define a DSCP value. If you do not define a value, the default value is Best
Effort. Best-effort service is essentially the default behavior of the network device
without any QoS.
IP/Port Classifiers Classification of traffic based on IP address, protocol, and port number. Check
the IP/Port Classifiers check box to define the IP address or subnet, protocol,
and port or port range for an application. Valid protocols are IP, TCP, UDP, and
TCP/UDP. If you select the IP protocol, you do not define a port number or range.
Click to add more classifiers.
Similar To Application with the similar traffic-handling requirements. Click the radio-button
to select this option, then select an application from the drop-down field. Cisco
DNA Center copies the other application's traffic class to the application that you
are defining.
Traffic Class Traffic class to which the application belongs. Valid values are BULK_DATA,
TRANSACTIONAL_DATA, OPS_ADMIN_MGMT, NETWORK_CONTROL,
VOIP_TELEPHONY, MULTIMEDIA_CONFERENCING,
MULTIMEDIA_STREAMING, BROADCAST_VIDEO,
REAL_TIME_INTERACTIVE, and SIGNALING.
Application Set Application set that you want the application to reside. Valid application sets are
authentication-services, backup-and-storage, collaboration-apps,
consumer-browsing, consumer-file-sharing, consumer-gaming, consumer-media,
consumer-misc, consumer-social-networking, database-apps,
desktop-virtualization, email, enterprise-ipc, file-sharing, generic-browsing,
generic-media, generic-misc, generic-tunneling, intranet-apps, naming-services,
network-control, network-management, remote-access, saas-apps, signaling,
software-development-tools, software-updates, streaming-media.
Procedure
Step 1 From the Cisco DNA Center home page, click Policy > Application > Applications.
Step 2 Click Add Application. The dialog box is displayed.
Field Description
Application name Name of the custom application. The name can contain up to 24 alphanumeric
characters, including underscores and hyphens. The underscore and hyphen
characters are the only special character allowed in the application name.
Type Method by which users access the application. Choose URL for applications that
are accessible through a URL.
Similar To Application with the similar traffic-handling requirements. Click the radio-button
to select this option, then select an application from the drop-down field. Cisco
DNA Center copies the other application's traffic class to the application that you
are defining.
Traffic Class Traffic class to which the application belongs. Valid values are BULK_DATA,
TRANSACTIONAL_DATA, OPS_ADMIN_MGMT, NETWORK_CONTROL,
VOIP_TELEPHONY, MULTIMEDIA_CONFERENCING,
MULTIMEDIA_STREAMING, BROADCAST_VIDEO,
REAL_TIME_INTERACTIVE, and SIGNALING.
Application Set Application set that you want the application to reside. Valid application sets are
authentication-services, backup-and-storage, collaboration-apps,
consumer-browsing, consumer-file-sharing, consumer-gaming, consumer-media,
consumer-misc, consumer-social-networking, database-apps,
desktop-virtualization, email, enterprise-ipc, file-sharing, generic-browsing,
generic-media, generic-misc, generic-tunneling, intranet-apps, naming-services,
network-control, network-management, remote-access, saas-apps, signaling,
software-development-tools, software-updates, streaming-media.
Note You cannot delete a custom application that is directly referenced by an application policy. Application policies
typically reference application sets and not individual applications. However, if a policy has special definitions
for an application (such as a consumer or producer assignment or bidirectional bandwidth provisioning), the
policy has a direct reference to the application. As such, you must remove the special definitions or remove
the reference to the application entirely before you can delete the application.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Applications.
Step 2 Use the Search, Show, or View By fields to locate the application that you want to change.
Step 3 To edit the application:
a) Click the application name and make the required changes. For information about the fields, see Create
a Server Name-Based Custom Application, on page 195, Create an IP Address and Port-Based Custom
Application, on page 195, or Create a URL-Based Custom Application, on page 197.
b) Click OK
Step 4 To delete the application: Click in the application box and then click OK to confirm.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Sets.
Step 2 Use the Search, Show, or View By fields to locate the applications or application sets that you want to change.
Step 3 Click the down arrow to display the applications in the set. Use the scroll bar to view all of the applications.
Step 4 Drag and drop applications from one application set to another.
Note You can select, drag, and drop multiple applications at a time.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Sets.
Step 2 Click Add Application Set.
Step 3 In the dialog box, enter a name for the new application set.
Cisco DNA Center creates the new application set; however, it will have no applications in it.
Note You cannot delete a custom application set that is referenced by an application policy. You must remove the
application set from the policy before you delete the application set.
Procedure
Step 1 From the Cisco DNA Center Home page, choose Policy > Application > Application Sets.
Step 2 Use the Search, Show, or View By fields to locate the application set that you want to change.
Step 3 Do one of the following:
• To edit the application set, drag and drop applications into or out of the application set. Click OK to
confirm each change.
• To delete the application set, click in the application set box and then click OK to confirm.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Applications.
Step 2 Locate the application that you want to mark as a favorite.
Step 3 Click .
Prerequisites
To configure Application policies, make sure that you address the following requirements:
• Cisco DNA Center supports most of the Cisco LAN, WAN, WLAN devices. To verify whether the
devices and software versions in your network are supported, see Cisco Digital Network Architecture
Center Supported Devices.
• Make sure that your Cisco network devices, such as the ISR-G2, the ASR 1000, and Wireless LAN
Controller, have the AVC (Application Visibility and Control) feature license installed. For information,
see the NBAR2 (Next Generation NBAR) Protocol Pack FAQ.
• For Cisco DNA Center to identify the WAN interfaces that need policies, you must specify the interface
type (WAN), and optionally, its subline rate and service-provider Class-of-Service model. For more
information, see Assign a Service Provider Profile to a WAN Interface, on page 211.
• Verify that the device roles that were assigned to devices during the Discovery process are appropriate
for your network. If necessary, change the device roles that are not appropriate. For more information,
see Change Device Role (Inventory), on page 75.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Click Add Policy.
Step 3 In the Application Policy Name field, enter a name for the policy.
Step 4 Click either the Wired or Wireless radio button.
Step 5 Click Site Scope and check the check box next to the sites where you want to deploy the policy.
Note For policies of wired devices, you cannot select a site that is already assigned to another policy. For
policies of wireless devices, you cannot select a site that is already assigned to another policy with
the same SSID.
Step 6 For policies of wired devices, you can exclude devices or specific interfaces from being configured with the
policy:
a) From the Site Scope pane, click next to the site you are interested in.
A list of devices in the selected scope is displayed.
b) Locate the device that you want to exclude and click the toggle button in the corresponding Policy
Exclusions column.
c) To exclude specific interfaces, click Exclude Interfaces and .
d) From the list of interfaces, click the toggle button in the Exclude from Policy column next to the interfaces
that you want to exclude.
e) Click < Back to Devices in Site-Name.
f) Click < Back to Site Scope.
Step 7 For WAN devices, you can configure specific interfaces:
a) From the Site Scope pane, click next to the site you are interested in.
b) From the list of devices in the site, click Configure in the SP Profile Settings column next to the device
you are interested in.
Note This option is only available for routers.
c) In the WAN Interface column, from the Select Interface drop-down list, choose an interface.
d) In the Role column, from the Select Role drop-down list, choose a role according to the type of interface
you are configuring:
• Physical interface—Choose WAN. This role is the only valid role for a physical interface.
• Tunnel interface—Choose either DMVPN Branch or DMVPN Hub. If you choose DMVPN Hub,
you can also define the bandwidth to its corresponding branches.
Note Make sure that the tunnel interfaces have been created on the devices before deploying
these policy settings.
e) In the Service Provider Profile column, from the Select Profile drop-down list, choose an SP profile.
f) (Optional) If necessary, in the Sub-Line Rate (Mbps) column, enter the upstream bandwidth that the
interface requires.
g) (Optional) To configure additional WAN interfaces, click + and repeat Step c through Step f.
h) Click Save.
Step 12 (Optional) Customize applications by creating consumers and assigning them to applications, or by marking
an application as bidirectional:
a) Expand the application group.
b) Click the gear icon next to the application that you are interested in.
c) From the Traffic Direction field, click the Unidirectional or Bi-directional radio button.
d) To choose an existing consumer, click the Consumer field and choose the consumer that you want to
configure. To create a new consumer, click + Add Consumer and define the Consumer Name, IP/Subnet,
Protocol, and Port/Range.
e) Click OK.
Step 13 Configure host tracking. Click the Host Tracking toggle button to turn host tracking on or off.
When deploying an application policy, Cisco DNA Center automatically applies ACL entries to the switches
to which collaboration end points (such as Telepresence units or Cisco phones) are connected.
The ACE matches the voice and video traffic generated by the collaboration end point, ensuring that the voice
and video traffic are correctly marked.
When host tracking is turned on, Cisco DNA Center tracks the connectivity of the collaboration end points
within the site scope and to automatically reconfigure the ACL entries when the collaboration end points
connect to the network or move from one interface to another.
When host tracking is turned off, Cisco DNA Center does not automatically deploy policies to the devices
when a collaboration end point moves or connects to a new interface. Instead, you need to redeploy the policy
for the ACLs to be configured correctly for the collaboration end points.
Step 14 (Optional) Preview the CLI commands that will be sent to devices. For more information, see Preview an
Application Policy, on page 207.
Step 15 (Optional) Precheck the devices on which you plan to deploy the policy. For more information, see Precheck
an Application Policy, on page 208.
Step 16 Do one of the following tasks:
• Save the policy as a draft by clicking Save Draft. For more information, see Policy Drafts, on page 190.
• Deploy the policy by clicking Deploy. You can deploy the policy now or schedule it for a later time.
To deploy the policy now, click the Now radio button and click Apply.
To schedule the policy deployment for a later date and time, click the Later radio button and define the
date and time of the deployment. For more information, see Policy Scheduling, on page 192.
Note Site time zone setting is not supported for scheduling application policy deployments.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Sort the policies by name, or filter them by name, status, or queuing profile.
Step 3 View the list of policies and the following information about each:
• Policy Name—Name of the policy.
• Version—Iteration of the policy. Each time a policy is deployed or saved as a draft, it is incremented
by one version. For example, when you create a policy and deploy it, the policy is at version 1. If you
change the policy and deploy it again, the version of the policy is incremented to version 2. For more
information, see Policy Drafts, on page 190 and Policy Versioning, on page 192
• Policy Status—State of the policy.
• Deployment Status—State of the last deployment (per device). Presents a summary of the following
• Devices that were successfully provisioned.
• Devices that failed to be provisioned.
• Devices that were not provisioned due to the deployment being aborted.
Clicking the state of the last deployment displays the Policy Deployment window, which provides a
filterable list of devices on which the policy is deployed. For each device, the following information is
displayed:
• Device details (name, site, type , role, and IP address)
• Success deployment status. Clicking the gear icon next to the status displays the details of the
effective marking policy that was deployed to the device. For devices that have limited TCAM
resources or an old NBAR protocol pack, only a subset of the applications that are included in the
policy can be provisioned, and they are shown in the view.
• Failure status shows the reason for the failure.
• Scope—Number of sites (not devices) that are assigned to the policy. For policies of wireless devices,
the name of the SSID to which the policy applies is included.
• LAN Queuing Profile—Name of the LAN queuing profile that is assigned to the policy.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to edit.
Step 3 Click the radio button next to corresponding policy.
Step 4 From the Actions drop-down list, choose Edit.
Step 5 Make changes to the application policy, as needed. For information about the application policy settings, see
Create an Application Policy, on page 200.
Step 6 Do one of the following tasks:
• Save the policy as a draft by clicking Save Draft. For more information, see Policy Drafts, on page 190.
• Deploy the policy by clicking Deploy. You can deploy the policy now or schedule it for a later time.
To deploy the policy now, click the Run Now radio button and click Apply.
To schedule policy deployment for a later date and time, click the Schedule Later radio button and
define the date and time of the deployment. For more information, see Policy Scheduling, on page 192.
Note Site time zone setting is not supported for scheduling application policy deployments.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Create an Application Policy, Edit an Application Policy, or Clone an Application Policy a policy.
Step 3 Click Save Draft.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to deploy.
Step 3 Click the radio button next to the policy that you want to deploy.
Step 4 From the Actions drop-down list, choose Deploy.
You are prompted to deploy your policy now or to schedule it for a later time.
Procedure
During a policy deployment, click Abort to cancel the policy configuration process.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to delete.
Step 3 Click the radio button next to the policy that you want to delete.
Step 4 From the Actions drop-down list, choose Delete.
Step 5 To confirm the deletion, click Ok. Otherwise, click Cancel.
Step 6 When the deletion confirmation message appears, click Ok again.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to clone.
Step 3 Click the radio button next to the policy that you want to clone.
Step 4 From the Actions drop-down list, choose Clone.
Step 5 Configure the application policy, as needed. For information about the application policy settings, see Create
an Application Policy, on page 200.
Step 6 Do one of the following tasks:
• Save the policy as a draft by clicking Save Draft. For more information, see Policy Drafts, on page 190.
• Deploy the policy by clicking Deploy. You can deploy the policy now or schedule it for a later time.
To deploy the policy now, click the Run Now radio button and click Apply.
To schedule the policy deployment for a later date and time, click the Schedule Later radio button and
define the date and time of the deployment. For more information, see Policy Scheduling, on page 192.
Note Site time zone setting is not supported for scheduling application policy deployments.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to reset.
Step 3 Click the radio button next to the policy.
Step 4 From the Actions drop-down list, choose Restore.
Step 5 Click OK to confirm the change or Cancel to abort it.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to reset.
Step 3 Click the radio button next to the policy.
Step 4 From the Actions drop-down list, choose Edit.
Step 5 Click Reset to Cisco Validated Design.
Step 6 Click OK to confirm the change or Cancel to abort it.
Step 7 Do one of the following tasks:
• To save a draft of the policy, click Save Draft.
• To deploy the policy, click Deploy.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Create or edit a policy, as described in Create an Application Policy, on page 200 or Edit an Application Policy,
on page 204.
Step 3 Before deploying the policy, click Preview.
A list of the devices in the scope appears.
Step 4 Click Generate next to the device that you are interested in.
Step 5 Click View to view the CLIs or copy them to the clipboard.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Create or edit a policy, as described in Create an Application Policy, on page 200 or Edit an Application Policy,
on page 204.
Step 3 Before deploying the policy, click Preview.
A list of the devices within the scope appears.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Click the radio button next to the policy that interests you.
Step 3 From the Actions drop-down list, choose History.
Step 4 From the Policy History dialog box, you can do the following:
• To compare a version with the current version, click Difference next to the version that interests you.
• To roll back to a previous version of the policy, click Rollback next to the version that you want to roll
back to.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Click the radio button next to the policy that interests you.
Step 3 From the Actions drop-down list, choose Show History.
Previous versions of the selected policy are listed in descending order, with the newest version (highest
number) at the top of the list and the oldest version (lowest number) at the bottom.
Step 4 (Optional) To view the differences between the selected version and the latest version of a policy, click
Difference in the View column.
Step 5 When you determine the policy version that you want to roll back to, click Rollback for that policy version.
Note If the selected site scope changed between policy versions, rollback is not done on the current (latest)
selected site. Only the policy content is rolled back.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Queuing Profile.
Step 2 Click Add Profile.
Step 3 In the Profile Name field, enter a name for the profile.
Step 4 Configure the bandwidth for each traffic class by using the slider, clicking the plus (+) or minus (-) sign, or
entering a specific number in the field.
The number indicates the percentage of the total interface bandwidth that will be dedicated to the selected
application class. Because the total bandwidth equals 100, adding bandwidth to one application class subtracts
bandwidth from another application class.
An open lock icon indicates that you can edit the bandwidth for the application class. A closed lock indicates
that you cannot edit it.
If you make a mistake, you can return to the CVD settings by clicking Reset to Cisco Validated Design.
The graph in the middle helps you visualize the amount of bandwidth that you are setting for each application
class.
Step 5 (For advanced users) To customize the DSCP code points that Cisco DNA Center uses for each of the traffic
classes, from the Show drop-down list, choose DSCP Values and configure the value for each application
class by entering a specific number in the field.
To customize the DSCP code points required within an SP cloud, configure an SP profile.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Queuing Profile.
Step 2 From the Queuing Profile pane, click the radio button next to the queuing profile that you want to edit or
delete.
Step 3 Do one of the following tasks:
• To edit the profile, change the field values, except the profile name, and click Save. For information
about the fields, see Create a Queuing Profile, on page 209.
• To delete the profile, click Delete.
Note You cannot delete a queuing profile if it is referenced in an application policy.
Note After creating your custom SP profile, configure the WAN interfaces with the SP profile. For information,
see Configure Service Provider Profiles on WAN Interfaces.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to change.
Step 3 Select the radio button next to the policy.
Step 4 From the Actions drop-down list, choose Edit.
Step 5 Click SP Profiles and select an SP profile.
Step 6 You can modify the information in the following fields:
• DSCP—Differentiated Services Code Point (DSCP) value. Valid values are from 0 to 63.
• Expedited Forwarding (EF)
• Class Selector (CS)—CS1, CS2, CS3, CS4, CS5, CS6
• Assured Forwarding—AF11, AF21, AF41
• Default Forwarding (DF)
For more information about these DSCP values, see Marking, Queuing, and Dropping Treatments, on
page 182.
• SP Bandwidth %—Percentage of bandwidth allocated to a specific class of service.
• Queuing Bandwidth %—Percentage of bandwidth allocated to each of the traffic classes. You can
make one of the following changes:
• To customize the queuing bandwidth, unlock the bandwidth settings by clicking the lock icon and
adjust the bandwidth percentages.
• To calculate the queuing bandwidth automatically from the SP bandwidth, lock the queuing bandwidth
settings by clicking the lock icon and then clicking OK to confirm. By default, Cisco DNA Center
automatically distributes the queuing bandwidth percentage such that the sum of the queuing
bandwidth for all of the traffic classes in an SP class aligns with the SP bandwidth percentage of
that class.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Application > Application Policies.
Step 2 Use the Filter field to locate the policy that you want to edit.
Step 3 Click the radio button next to the policy.
Step 4 From the Actions drop-down list, choose Edit.
Step 5 From the Site Scope pane, click the gear icon next to the site you are interested in.
Step 6 Click Configure in the SP Profile Settings column for the device you are interested in.
Step 7 In the WAN Interface column, from the Select Interface drop-down list, choose an interface.
Step 8 In the Role column, from the Select Role drop-down list, choose a role according to the type of interface you
are configuring:
• Physical interface—Choose WAN. This role is the only valid role for a physical interface.
• Tunnel interface—Choose either DMVPN Branch or DMVPN Hub. If you choose DMVPN Hub,
you can also define the bandwidth to its corresponding branches.
Note Make sure that the tunnel interfaces have been created on the devices before deploying these
policy settings.
Step 9 In the Service Provider Profile column, click the Select Profile drop-down field and choose an SP profile.
Step 10 If necessary, in the Sub-Line Rate (Mbps) column, enter the upstream bandwidth that the interface requires.
Step 11 To configure additional WAN interfaces, click + and repeat Step 7 through Step 10.
Step 12 Click Save.
Step 13 Click < Back to Site Scope.
Step 14 Click OK.
Step 15 Click Deploy.
You are prompted to deploy your policy now or to schedule it for a later time.
To configure ERSPAN using Cisco DNA Center, create a traffic copy policy that defines the source and
destination of the traffic flow that you want to copy. You can also define a traffic copy contract that specifies
the device and interface where the copy of the traffic is sent.
Note Because traffic copy policies can contain either scalable groups or IP network groups, throughout this guide,
we use the term groups to refer to both scalable groups and IP network groups, unless specified otherwise.
Note At the destination, we recommend that you use a network analyzer, such as a
Switch Probe device, or other Remote Monitoring (RMON) probe, to perform
traffic analysis.
The interface type can be Ethernet, Fast Ethernet, Gigabit Ethernet, or 10-Gigabit Ethernet interfaces
only. When configured as a destination, the interface can be used to receive only the copied traffic. The
interface can no longer receive any other type of traffic and cannot forward any traffic except that required
by the traffic copy feature. You can configure trunk interfaces as destinations. This configuration allows
the interfaces to transmit encapsulated traffic.
Note There can be only one traffic copy destination per traffic copy contract.
• Cisco DNA Center does not show a status message to indicate that a traffic copy policy has been changed
and is no longer consistent with the one that is deployed in the network. However, if you know that a
traffic copy policy has changed since it was deployed, you can redeploy the policy.
• You cannot configure a management interface as a source group or traffic copy destination.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Traffic Copy > Traffic Copy Destination.
Step 2 Enter a name and description for the traffic copy destination.
Step 3 Select the device and one or more ports.
Step 4 Click Save.
Step 1 From the Cisco DNA Center home page, choose Policy > Traffic Copy > Traffic Copy Destination.
Step 2 Check the check box next to the destination that you want to edit or delete.
Step 3 Do one of the following:
• To make changes, click Edit, make the necessary changes, and click Save.
• To delete the destination, click Delete.
Step 1 From the Cisco DNA Center home page, choose Policy > Traffic Copy > Traffic Copy Contracts.
Step 2 Click Add.
Step 3 In the dialog box, enter a name and description for the contract.
Step 4 From the Copy Destination drop-down list, choose a copy destination.
Note You can have only one destination per traffic copy contract.
If no copy destinations are available for you to choose, you can create one. For more information, see Create
a Traffic Copy Destination, on page 214.
Step 1 From the Cisco DNA Center home page, choose Policy > Traffic Copy > Traffic Copy Contracts.
Step 2 Check the check box next to the contract that you want to edit or delete.
Step 3 Do one of the following:
• To make changes, click Edit, make the necessary changes, and click Save.
• To delete the contract, click Delete.
Step 1 From the Cisco DNA Center home page, choose Policy > Traffic Copy > Traffic Copy Policies.
Step 2 Click Add Policy.
Step 3 In the Policy Name field, enter a name.
Step 4 In the Description field, enter a word or a phrase that identifies the policy.
Step 5 In the Contract field, click Add Contract.
Step 6 Click the radio button next to the contract that you want to use and then click Save.
Step 7 Drag and drop groups from the Available Groups area to the Source area.
Step 8 Drag and drop groups from the Available Groups area to the Destination area.
Step 9 Click Save.
Step 1 From the Cisco DNA Center home page, choose Policy > Traffic Copy > Traffic Copy Policies.
Step 2 Check the check box next to the policy that you want to edit or delete.
Step 3 Do one of the following:
• To make changes, click Edit, make the necessary changes, and click Save.
• To delete the policy, click Delete.
Virtual Networks
Virtual networks are isolated routing and switching environments. You can use virtual networks to segment
your physical network into multiple logical networks.
Only the assigned user groups are allowed to enter a virtual network. Within a virtual network, users and
devices can communicate with each other unless explicitly blocked by an access policy. Users across different
virtual networks cannot communicate with each other. However, an exception policy can be created to allow
some users to communicate across different virtual networks.
A typical use case is building management, where the user community needs to be segmented from building
systems, such as lighting; heating, ventilation, and air conditioning (HVAC) systems; and security systems.
In this case, you segment the user community and the building systems into two or more virtual networks to
block unauthorized access of the building systems.
A virtual network may span across multiple site locations and across network domains (wireless, campus,
and WAN).
By default, Cisco DNA Center has a single virtual network, and all users and endpoints belong to this virtual
network. If Cisco DNA Center is integrated with Cisco Identity Services Engine (ISE), the default virtual
network is populated with user groups and endpoints from Cisco ISE.
In Cisco DNA Center, the concept of virtual network is common across wireless, campus, and WAN networks.
When a virtual network is created, it can be associated with sites that have any combination of wireless, wired,
or WAN deployments. For example, if a site has a campus fabric deployed, which includes wireless and wired
devices, the virtual network creation process triggers the creation of the Service Set Identifier (SSID) and
Virtual Routing and Forwarding (VRF) in the campus fabric. If the site also has WAN fabric deployed, the
VRF extends from the campus to WAN as well.
During site design and initial configuration, you can add wireless devices, wired switches, and WAN routers
to the site. Cisco DNA Center detects that the virtual network and the associated policies have been created
for the site, and applies them to the different devices.
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Virtual Network.
Step 2 Click and enter the following information:
Field Description
Guest Virtual Network Devices that are configured with special rules, which allow guests limited
access. Check this check box to configure the virtual network as a guest
network. You can create only one guest virtual network.
Available Groups Scalable groups that you can choose to include in the virtual network. Drag
and drop groups from the Available Groups area to the Groups in the
Virtual Network area.
Field Description
Groups in the Virtual Scalable groups that are in the virtual network. Drag and drop groups from
Network the Available Groups area to the Groups in the Virtual Network area.
Related Topics
Edit or Delete a Virtual Network, on page 218
Guidelines and Limitations for Virtual Networks, on page 217
Virtual Networks, on page 216
Procedure
Step 1 From the Cisco DNA Center home page, choose Policy > Virtual Network.
Step 2 Do one of the following tasks:
• To edit the virtual network, click the name of the virtual network from the left navigation pane and modify
the information in the following table, except the virtual network name:
Field Description
Guest Virtual Network Devices that are configured with special rules, which allow guests limited
access. Check this check box to configure the virtual network as a guest
network. You can create only one guest virtual network.
Available Groups Scalable groups that you can choose to include in the virtual network.
Drag and drop groups from the Available Groups area to the Groups
in the Virtual Network area.
Groups in the Virtual Scalable groups that are in the virtual network. Drag and drop groups
Network from the Available Groups area to the Groups in the Virtual Network
area.
Provisioning
After you have configured the policies for your network in Cisco DNA Center, you can provision your devices.
In this stage, you deploy the policies across your devices.
There are three aspects to provisioning devices:
• Assign devices to the inventory and deploy the required settings and policies.
• Add devices to sites.
• Create fabric domains and add devices to the fabric.
Step 1 From the Cisco DNA Center home page, click Provision. The Inventory page displays device information
gathered during the discovery process.
Step 2 Check the check boxes next to the devices that you want to associate to a site.
Tag Devices
A device tag allows you to group devices based on an attribute or a rule. A single device can have multiple
tags; similarly, a single tag can be applied to multiple devices.
You can add tags to or remove tags from devices in the Provision window.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision. The Device Inventory page displays device
information gathered during the discovery process.
Step 2 Check the check box next to the device(s) for which you want to apply a tag, then click Tag Device.
Step 3 Enter a tag name in the Tag Name field.
• If you are creating a new tag, click Create New Tag. You can also create a new tag with a rule. See Tag
Devices Using Rules, on page 220 for more information.
• If you are using an existing tag, select the tag from the list, then click Apply.
A tag icon and the tag name(s) appear under the device name(s) for which you applied the tag(s).
Procedure
Step 1 From the Cisco DNA Center home page, click Provision. The Device Inventory page displays device
information gathered during the discovery process.
Step 2 Check the check box next to the device(s) for which you want to apply a tag, then click Tag Device.
Step 3 Enter a tag name in the Tag Name field, then click Create New Tag with Rule.
The Create New Tag window appears.
The Manually Added field under Total Devices Tagged Count indicates the number of devices you selected
in Step 2.
Step 4 Click Add Condition, then complete the required fields for the rule.
The Matching Devices number automatically changes to indicate how many devices match this condition.
You can have two options to create additional conditions:
• And conditions—Click the Add Condition link. And appears above the condition.
• Or conditions—Click the add icon (+) next to an existing condition. Or appears next to the condition.
You can add as many conditions as needed. As you make changes to the rule, the Matching Devices count
changes to reflect how many devices in the inventory match the rule you specified. You can click on the device
number to view the devices that match the rule.
Step 5 Click Save to save your tag with the defined rule.
A tag icon and the tag name(s) appear under the device name(s) for which you applied the tag(s).
As devices are added to the inventory, if they match the rules you defined, the tag is automatically applied to
the devices.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision. The Device Inventory page displays device
information gathered during the discovery process.
In the Device Name column, you can see any previously created device tags listed under the device names.
Step 3 Hover your cursor over the tag you want to edit, then click the pencil icon next to the tag name.
Altenatively, you can select Tag Device > View All Tags, then click the pencil icon next to the tag you want
to edit.
Step 4 Make changes to the tag, then click Save to save your changes.
Provisioning Devices
Provision a Cisco Wireless Controller
Before you begin
• Make sure that you have defined the following global network settings before provisioning a Cisco
Wireless Controller:
• Network servers, such as AAA, DHCP, and DNS. For more information, see Configure Global
Network Servers, on page 143.
• Device credentials, such as CLI, SNMP, HTTP, and HTTPS. For more information, see Configure
Global CLI Credentials, on page 134, Configure Global SNMPv2c Credentials, on page 136, Configure
Global SNMPv3 Credentials, on page 137, and Configure Global HTTPS Credentials, on page 138.
• IP address pools. For more information, see Configure IP Address Pools, on page 142.
• Wireless settings, such as SSIDs, wireless interfaces, and wireless radio frequency profiles. For
more information, see Configure Global Wireless Settings, on page 119.
• Make sure that you have a wireless controller in your inventory. If not, discover the device using the
Discovery feature. For more information, see Discover Your Network, on page 11.
• Make sure that the wireless controller is added to a site. For more information, see Add Devices to Sites,
on page 219.
Procedure
Step 1 From the Cisco DNA Center home page, choose Provision > Devices.
The Device Inventory window appears.
Step 3 Check the check box next to the controller device name that you want to provision.
Step 4 From the Action drop-down list, choose Provision.
Step 5 In the Assign Site window, assign a site for the controller.
Step 6 In the Find Site field, enter the name of the site to which you want to associate the controller. To assign
multiple controllers to the same site, check the All Same Site check box.
Step 7 Click Next.
The Configuration window appears.
Step 8 Choose a role for the wireless controller: Active Main WLC or Guest Anchor.
Step 9 In the Managed AP Locations field, enter the AP locations managed by the controller. Here you have the
option to change, remove, or reassign the site.
Inheritance of managed AP locations lets you automatically choose a site along with the buildings and floors
under that particular site. One site can be managed by only one wireless controller.
Step 10 If you have selected the WLC Role as Active Main WLC, under Interface and VLAN Configuration, click
+ Add and configure the interface and the VLAN.
The Configure Interface and VLAN window appears.
Step 11 From the Interface Name drop-down list, choose the interface name.
Step 12 In the VLAN ID text box, enter a value for the VLAN ID.
Step 13 In the Interface IP Address text box, enter the interface IP address.
Step 14 In the Interface Net Mask (in bits) text box, enter the interface net mask details.
Step 15 In the Gateway IP Address text box, enter the gateway IP address.
Step 16 In the LAG/Port Number, enter the LAG or the port number.
Step 17 Click OK.
Step 18 For a guest anchor wireless controller, you can change the VLAN ID configuration by changing the VLAN
ID under Assign Guest SSIDs to DMZ site.
Step 19 Click Next.
Step 20 The Summary window displays the following information:
• System Details
• Global Setting
• SSID
• Managed Sites
• Interfaces
• Configure the DHCP server with Option #43 or Option #60. These are the IP addresses of the Cisco
DNA Center Plug and Play (PnP) server. This helps the AP to contact the Plug and Play server to download
configurations. For more information, see About Global Network Settings, on page 131.
• The APs should be in the factory reset state without any wireless controller configurations.
Procedure
Step 1 The AP that is connected to a switch contacts the DHCP server and then connects to a Plug and Play server.
Step 2 The DHCP server allocates IP address with Option #43, which is the IP address of the Cisco DNA Center
Plug and Play server.
Step 3 The AP starts the Plug and Play agent and contacts the Plug and Play server.
Step 4 From the Provision > Unclaimed Devices tab, find the AP.
The Device Status shows as Unclaimed.
Procedure
Step 1 From the Cisco DNA Center home page, choose Provision > Devices.
Step 3 Check the check box next to the AP device name that you want to provision.
Step 4 From the Action drop-down list, choose Provision.
The Assign Site window appears.
Step 8 By default, the customer RF profile that you marked as default under Network Settings > Wireless > Wireless
Radio Frequency Profile is chosen in the RF Profile drop-down list. You can change the default RF Profile
value for an AP by selecting a value from the RF Profile drop-down list. The options are High, Typical, and
Low. The AP group is created based on the RF profile selected.
Step 9 Click Deploy to provision the AP.
You are prompted with a message stating that creation or modification of an AP group in progress.
Note After completion, the devices are rebooted.
Procedure
Step 1 From the Cisco DNA Center home page, choose Provision > Devices.
The Device Inventory window appears.
Step 3 Click Filter and enter the appropriate values in the selected filter field. For example, for the Device Name
filter, enter the name of the device.
The data that is displayed in the Devices table is automatically updated according to your filter selection.
Step 4 Check the check box adjacent to the controller device name that you want to provision.
Step 5 From the Action drop-down list, choose Learn Device Config.
The Assign Site window appears.
Step 12 For an SSID with a preshared key (PSK), enter the passphrase key.
Step 13 Click Discarded Config in the left pane.
The right pane lists the conflicting or the existing configurations on Cisco DNA Center. The discarded
configuration entries are categorized as:
• Duplicate design entity
• Unknown device configuration for Radio Policy
Step 16 Choose Design > Network Profiles to assign a site to the network profile.
Step 17 In the Network Profiles window, click Assign Site to add sites to the selected profile.
Step 18 In the Add Sites to Profile window, choose a site from the drop-down list, and click Save.
Step 19 Click the Provision tab.
Step 20 Click Filter and enter the appropriate values in the selected filter field.
The data that is displayed in the Devices table is automatically updated according to your filter selection.
Step 21 Check the check box adjacent to the controller device name that you want to provision.
Step 22 From the Action drop-down list, choose Provision.
Step 23 Review the details in the Assign Site window, and click Next.
The Configurations window appears.
Step 24 Under Interface and VLAN Configuration, click +Add to configure interface and VLAN details.
Step 25 In the Configure Interface and VLAN window, configure the required fields, and click OK.
Step 26 Click Next.
Step 27 The Summary window displays the following information:
• Device Details
• Network Settings
• SSID
• Managed Sites
• Interfaces
Procedure
Step 1 Design a network hierarchy, with sites, buildings, floors, and so on. For more information, see Create a Site
in a Network Hierarchy, on page 98, Add Buildings, on page 101, and Add a Floor to a Building, on page 102.
Step 2 Configure network servers, such as AAA, DHCP, and DNS servers. For more information, see Configure
Global Network Servers, on page 143 and Add Cisco ISE or Other AAA Servers, on page 144.
Step 3 Create SSIDs for a guest wireless network with external web authentication and central web authentication
with Cisco ISE. For more information, see Create SSIDs for a Guest Wireless Network, on page 121.
Step 4 Discover the wireless controller using the Cisco Discovery Protocol (CDP) or an IP address range and ensure
that the devices are in the Inventory window and in the Managed state. For more information, see About
Discovery, on page 11.
Step 5 Provision a foreign wireless controller as the active main wireless controller. See Provision a Cisco Wireless
Controller, on page 222.
Step 6 Choose the role for the wireless controller as guest anchor and provision the guest anchor controllers. For
more information, see Provision a Cisco Wireless Controller, on page 222.
Step 7 Configure device credentials, such as CLI, SNMP, HTTP, and HTTPS. See Configure Global CLI Credentials,
on page 134, Configure Global SNMPv2c Credentials, on page 136, Configure Global SNMPv3 Credentials,
on page 137, and Configure Global HTTPS Credentials, on page 138.
Procedure
Step 1 From the Cisco DNA Center home page, choose Provision > Devices.
The Device Inventory window appears.
Step 3 Check the check box next to the sensor device that you want to provision.
Three tabs appear above the list of unclaimed devices.
Step 5 From the Choose a floor drop-down list, choose the floor where the sensor device is located.
Step 6 From the Sensor Select SSID Profile drop-down list, choose the profile name to associate to the sensor device.
Step 7 Click Assign.
Provisioning starts, and the sensor device appears in the device inventory.
If the provisioning succeeds, the Provision Status column in the Device Inventory window shows Success.
• Make sure that you have at least one device in your inventory. If not, discover devices using the Discovery
function.
Procedure
Step 1 Reserve an IP address pool for the site that you will be provisioning.
Note The size of the LAN automation IP address pool must be at least 25 bits of netmask in size or larger.
a) From the Cisco DNA Center home page, choose Design > Network Settings > IP Address Pools.
b) From the Network Hierarchy pane, select a site.
c) Click Reserve IP Pool and complete the following fields to reserve all or part of an available global IP
address pool for the specific site:
• IP Pool Name—Unique name for the reserved IP address pool.
• Type—Type of IP address pool. For LAN automation, choose LAN.
• Global IP Pool—IP address pool from which you want to reserve all or part of the IP addresses.
• CIDR Notation/No. of IP Addresses—IP subnet and mask address used to reserve all or part of the
global IP address pool or the number of IP addresses you want to reserve.
• Gateway IP Address—Gateway IP address.
• DHCP Servers—DHCP server(s) IP address(es).
d) Click Reserve.
Step 2 Discover and provision devices.
a) From the Cisco DNA Center home page, choose Provision > Devices > Inventory.
All the discovered devices are displayed.
b) Click the Topology View icon.
c) Right-click one of the discovered devices and choose Discover and Provision New Devices.
d) From the LAN Automation dialog box, complete the following fields:
• Site—Site ID and associated settings that Cisco DNA Center uses for LAN automation.
You can make different site selections for seed and discovered devices. LAN automation provides
flexibility in site selection for seeds and discovered devices, which can belong to different sites.
• Primary Device—IP address of the device that Cisco DNA Center uses as the starting point to
discover and provision new devices.
• Peer Device—IP address of the peer device.
• Choose Primary Device Ports—Ports to be used to discover and provision new devices.
• IP Pool—IP address pool that was reserved for LAN automation. (See Step 1.)
• ISIS Password—A user-provided IS-IS password for when LAN automation starts. If the password
already exists on the seed device, it is reused and is not overwritten. If no user-provided password
is entered and there is no existing IS-IS password on the device, the static IS-IS password 'cisco' is
configured.
• Enable Multicast—LAN automation creates a multicast tree from seed devices as RPs and discovered
devices as subscribers.
• Device Name Prefix—Text that describes the devices being provisioned. As Cisco DNA Center
provisions each device, it names the device with the text that you provide and adds a unique number
to the end. For example, if you enter Access as the name prefix, as each device is provisioned, it is
named Access-1, Access-2, Access-3, and so on.
• Hostname Map File—Configures user-provided names for discovery devices using a CSV file that
contains a mapping between serial numbers and hostnames. If the discovery device is a stack, all
serial numbers of the stack are provided in the CSV file.
e) Click Start.
Cisco DNA Center begins to discover and provision the new devices.
b) After all devices have been discovered, added to Inventory, and are in Managed state, click Stop in the
LAN Automation Status dialog box.
The LAN automation process is complete, and the new devices are added to the Device Inventory.
What to do next
To review the LAN automation configurations, from the Cisco DNA Center home page, choose Network
Plug and Play > Configurations.
Cisco DNA Center configures the DHCP server on the primary device. Because Cisco DNA Center understands
that the discovered device is connected to both the primary and peer devices, it configures two Layer 3
point-to-point connections when the LAN automation task is stopped. One connection is established between
the discovered device and the primary device; the other connection is established between the discovered
device and the peer device.
Note If the link between the primary and the peer device is not configured before the LAN automation job is
executed, you must select the interface of the primary device that connects to the peer device as part of the
LAN automation configuration in Cisco DNA Center.
For the preceding topology, Cisco DNA Center configures the following links:
• A point-to-point Layer 3 routed connection from Discovered device 1 to Primary device
• A point-to-point Layer 3 routed connection from Discovered device 1 to Peer device
• A point-to-point Layer 3 routed connection from Discovered device 1 to Discovered device 2
Consider the scenario where a device—named Discovered device 3—is directly connected below Discovered
device 2. The connection between Discovered device 2 and Discovered device 3 is not configured as part of
the LAN automation job, because it is more than two hops away from Primary device.
Procedure
Step 1 From the Cisco DNA Center home page, choose Provision > Devices.
Step 2 Click the Inventory tab.
All discovered devices are displayed.
Step 3 Click LAN Auto Status.
Procedure
Step 1 From the Cisco DNA Center home page, choose Provision > Devices.
The Device Inventory window appears.
Step 2 Click the Inventory tab, which lists all discovered and provisioned devices.
Step 3 Check the check box next to the device that you want to delete.
Note APs are deleted only when the controller to which they are connected is deleted.
A fabric domain can consist of one or more fabric sites + transit site. Multiple fabric sites are connected to
each other using a transit site.
There are two types of transit sites:
• SD-Access transit: Enables a native SD-Access (LISP, VXLAN, CTS) fabric, with a domain-wide control
plane node for intersite communication.
• IP-based transit: Leverages a traditional IP-based (VRF-LITE, MPLS) network, which requires remapping
of VRFs and SGTs between sites.
Transit Sites
A transit site is a site that connects two or more fabric sites with each other or connects the fabric site with
external networks (Internet, data center, and so on). There are two types of transit networks:
• IP transit: Used in a regular IP network to connect to an external network or to connect two or more
fabric sites.
• SDA transit: Used in LISP/VxLAN encapsulation to connect two fabric sites. The SDA transit area may
be defined as a portion of the fabric that has its own Control Plane Nodes, Border Nodes, but does not
have Edge Nodes.
Using SDA transit, an end-to-end policy plane is maintained using SGT group tags.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision.
Step 2 Click the Fabric tab.
Step 3 Click the Add Fabric Domain or Transit tab.
Step 4 Choose Add Transit from the pop-up.
Step 5 Enter a transit name for the network.
Step 6 Choose IP-Based as the transit type.
The routing protocol is set to BGP by default.
Step 7 Enter the autonomous system number (ASN) for the transit network.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision.
Step 2 Click the Fabric tab.
Step 3 Click the Add Fabric Domain or Transit tab.
Step 4 Choose Add Transit from the pop-up.
Step 5 Enter a transit name for the network.
Step 6 Choose SD-Access as the transit type.
Step 7 Enter the Site for the Transit Control Plane for the transit network. Choose at least one transit
map server.
Step 8 Enter the Transit Control Plane for the transit network.
Step 9 Repeat Step 7 and Step 8 for all map servers that you want to add.
Step 10 Click Save.
What to do next
After you create an SDA transit, go to the fabric site and connect the sites to which you want to connect the
SDA transit. Go to Provision > Fabric > Fabric Site. Choose the fabric site that you created. Click Fabric
Site > Border > Edit Border > Transit. From the drop-down, point to your SDA transit site and click Add.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision.
Step 2 Click the Fabric tab.
Step 3 Click the Add Fabric Domain or Transit tab.
Step 4 Choose Add Fabric from the pop-up.
Step 5 Enter a fabric name.
Step 6 Choose one fabric site.
Step 7 Click Add.
Note It is optional to designate the devices in a fabric domain as control plane nodes or border nodes. You may
have devices that do not play these roles. However, every fabric domain must have at least one control plane
node device and one border node device. In the current release for wired fabric, you can add up to six control
plane nodes for redundancy.
There are three steps to add and configure devices to a fabric domain:
1. Select the devices.
2. Specify devices to act as control plane nodes.
3. Specify devices to act as border nodes.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision. The screen displays all provisioned fabric domains.
Step 2 From the list of fabric domains, choose a fabric. The screen displays all devices in the network that have been
inventoried. You can view devices in the topology view or list view. In the topology view, any device that is
added to the fabric is shown in blue.
Step 3 Click a device and choose one of the options displayed.
Field Description
Add as CP+Border+Edge Add the selected device as a control plane and a border node and an edge node.
Add as CP Add a core or distribution device as a control plane node. This allows the fabric
access device to communicate with the control plane device.
Add as Border Add a core device as a border node. This allows the fabric access device to
communicate with the fabric border device.
Add as CP+Border Add the selected device as a control plane and a border node.
Procedure
Step 1 From the Cisco DNA Center home page, click Provision.
A list of all provisioned fabric domains is shown.
Step 2 From the list of fabric domains, choose a fabric. The window displays all devices in the network that have
been inventoried. You can view the devices in the topology view or list view. In the topology view, any device
that is added to the fabric is shown in blue.
Step 3 Click a device and choose one of the options:
• Add as CP+Border+Edge: Add the selected device as a control plane and a border node and an edge
node.
• Add as Border: Add a core device as a border node. This allows the fabric access device to communicate
with the fabric border device.
• Add as CP+Border: Add the selected device as a control plane and a border node.
Step 4 A pop-up window appears with the name of the device that you want to add.
a) From the Border to field, click one of the radio buttons:
• Rest of Company (Internal): Designate the device as a border for IP routes inside your company.
A border exports fabric routes and imports outside routes.
• Outside World (External): Designate the device as a default border for IP routes outside your
company. A border exports fabric routes only.
• Anywhere (Internal & External): Designate the device as a border for both internal and external
IP routes. A border exports fabric routes and imports outside routes, except default-route.
Choose External Interface from the drop-down list. Enter the Remote AS Number. Check the
Virtual Network from the list. This virtual network should be advertised by the border to the remote
peer. You can select one, multiple, or all virtual networks. Click Save.
Step 5 Click Layer 2. You will see a table of the virtual networks and the number of pools in each virtual network.
Click one of the virtual networks.
If a check box in the virtual network list is not clickable, it indicates that the segments under the virtual network
have been handed off to an external VLAN.
After you select a virtual network, the list of IP address pools present in the virtual network appears. A list
of interfaces through which you can connect non-fabric devices is displayed.
Enter the External VLAN into which the fabric must be extended. A virtual network can only be handed off
on a single interface. The same virtual network cannot be handed off via multiple interfaces.
Click Save.
Procedure
• No Authentication
• Open Authentication: A host is allowed network access without having to go through 802.1X
authentication.
Procedure
Step 3 Click Update to save the settings. The settings you specify here will be deployed to all devices on the network.
Step 4 After all the virtual networks have been configured, click Save.
Note The settings you make here for the ports override the general settings you made for the device in the Virtual
Networks section.
Procedure
Step 1 From the Select Fabric Device section, choose the access device that you want to configure.
The ports available on the device are displayed.
Step 2 Choose the ports on the device and specify the allowed IP address pool, the groups that have been provisioned,
the voice or data pool, and the authentication type for the port.
Step 3 Click Save.
Multicast Overview
Multicast traffic is forwarded in different ways:
• Through shared trees by using a rendezvous point. PIM SM is used in this case.
• Through shortest path trees (SPT). PIM source-specific multicast (SSM) uses only SPT. PIM SM switches
to SPT after the source is known on the edge router that the receiver is connected to.
Procedure
Step 1 From the Cisco DNA Center home page, choose Design > Network Settings > IP Address Pools.
A list of all IP address pools is displayed.
Step 2 Click Add and specify the multicast addresses to form the pool:
• IP Pool Name: Enter a name for the multicast IP address pool.
• Subnet/Mask: Enter the subnet IP address and subnet mask for the multicast pool.
• Gateway IP Address: Enter the IP address of the gateway.
Procedure
Step 1 From the Cisco DNA Center home page, click the Provision tab.
By default, the Devices window is shown.
Step 2 Click the Fabric tab.
A list of fabric domains is shown.
Step 3 Choose a fabric. The Fabric - Devices window appears, showing all the devices in the network. Any device
that is added to the fabric is highlighted in blue.
Step 4 Click the fabric device that you want to add as a rendezvous point, and choose Enable Rendezvous Point.
Step 5 Cisco DNA Center displays a list of virtual networks in the pop-up window. Expand Virtual Networks and
choose an IP multicast pool by clicking the Plus button. Click Next.
Note Only a single IP address pool is currently supported for each virtual network for multicast.
To enable multicast in multiple virtual networks, you must create multiple multicast IP address
pools.
Procedure
Step 1 From the Cisco DNA Center home page, click the Provision tab.
By default, the Devices window is shown.
Step 2 Click the Fabric tab.
A list of fabric domains is shown.
Step 3 Choose a fabric. The Fabric - Devices window appears, showing all devices in the network.
Virtual networks that are enabled for IP multicast are marked with an M.
Procedure
Step 1 From the Cisco DNA Center home page, click the Provision tab.
By default, the Devices window is shown.
Step 2 Click the Fabric tab.
A list of fabric domains is shown.
Step 3 Choose a fabric. The Fabric - Devices window appears, showing all devices in the network. Any device that
is added to the fabric is highlighted in blue.
Step 4 Click the device that you want to add as a redundant RP and choose Enable Rendezvous Point.
Cisco DNA Center displays the list of virtual networks.
Step 5 Expand the Virtual Networks for which you want to add a redundant RP. A multicast IP address pool should
be prepopulated. Click Next.
Step 6 Associate the virtual networks and click Enable.
Step 7 Click Save on the main screen. Apply the changes.
Procedure
Step 1 From the Cisco DNA Center home page, click the gear icon and then choose System Settings > Data
Platform.
Step 2 Click Analytics Ops Center.
A list of applications are displayed. For example, Assurance and Pegasus.
Step 3 Click the application name for which you want to view metrics, for example, Assurance.
A graphical representation of all the existing collectors and pipelines in the application appear. CPU or
throughput values corresponding to each pipeline are also provided.
The current health status of each component is indicated by its color:
• Red—indicates an error.
• Yellow—indicates a warning.
• Grey—indicates normal operation.
Step 5 To view additional details to help you troubleshoot an issue and determine the cause of an error or warning,
click a Collector Name.
A side bar appears with the following tabs:
• Metrics—Provides a selection of available metrics gathered during the last 30 minutes. It displays
summary information indicating the component status, start and stop time, and exceptions if errors have
occurred. You can also select a different time interval.
• Grafana—Displays a dashboard associated with the respective component for deeper debugging.
Step 6 To view whether data is flowing through a specific pipeline, click on a pipeline stream.
A sidebar appears with graphs. The graphs display whether the application is receiving data from the underlying
pipelines. The graph information is based on the time interval you select from the drop-down list in the sidebar.
Options are Last 30 Min, Last Hour, Last 2 Hours, and Last 6 Hours. Default is Last 30 Min.
Step 7 If a pipeline is not flowing at normal levels, hover your cursor over the stream to display the lag metrics.
Step 8 To view detail information for a specific pipeline, click a Pipleline Name.
The appropriate Pipleline page displays with the following tabs:
Note Make sure to click the Exceptions tab to determine if any exceptions have occurred in the pipeline.
Under normal working conditions, this tab displays null.
Step 9 To change the metrics you want displayed in the Analytics Ops Center page, click Key Metrics, select up to
two metrics, and then click Apply.
By default, Cisco DNA Center displays CPU and Throughput metrics.
Procedure
Step 1 From the Cisco DNA Center home page, click the gear icon and choose System Settings > Data Platform.
Step 2 Click Collectors. The colored dot next to each collector indicates its overall status.
Step 3 To view additional details, click a collector name.
The appropriate Collector page displays. By default, Cisco DNA Center displays the Current Configurations
list.
When you check the Anonymize check box, the user ID in the Client Health window appears
scrambled.
Procedure
Step 1 From the Cisco DNA Center home page, click the gear icon and then choose System Settings > Data
Platform.
Step 2 Click Store Settings.
Step 3 To view a list of historical purge jobs that have completed, click Data Purge Schedule.
The History table lists the name of the purge job, the result, time, and other data. You can sort, filter, and
export data in the table.
Step 4 To view or modify the current data retention and purge settings, click Data Retention & Purge Configuration.
Click the data for which you want to view or modify data retention and purge configuration settings:
• Time Series Document Store—Settings for all time-based data.
• Trigger Store—Storage space dedicated to issues detected by various data analysis algorithms.
• Time Series Graph Store—Settings for all time-based graphical data.
Procedure
Step 1 From the Cisco DNA Center home page, click the gear icon and choose System Settings > Data Platform.
Step 2 Click Pipelines.
Step 3 To view whether the application is receiving data from the underlying pipelines, click a pipeline name.
The appropriate Pipeline page displays with the following tabs:
Note Make sure to click the Exceptions tab to determine if any exceptions have occurred in the pipeline.
Under normal working conditions, this tab displays null.