Cisco Prime Infrastructure 2.0
Cisco Prime Infrastructure 2.0
0
Administrator Guide
October 2014
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Preface xi
Audience xi
Related Documentation xi
xi
CHAPTER 1
CHAPTER 2
CHAPTER 3
CHAPTER 4
CHAPTER 5
CHAPTER 6
CHAPTER 7
CHAPTER 8
CHAPTER 9
CHAPTER 10
CHAPTER 11
CHAPTER 12
Configuring Prime Infrastructure to Use Routers and Switches as Data Sources 12-2
CHAPTER 13
INDEX
Audience
This guide is for administrators who are responsible for setting up, maintaining, and configuring Prime
Infrastructure. The tasks in this guide are typically performed by administrators only.
Related Documentation
See the Cisco Prime Infrastructure Documentation Overview for a list of all Prime Infrastructure guides.
Note We sometimes update the documentation after original publication. Therefore, you should also review
the documentation on Cisco.com for any updates.
Cisco Prime Infrastructure is a network management tool that supports lifecycle management of your
entire network infrastructure from one graphical interface. Prime Infrastructure provides network
administrators with a single solution for provisioning, monitoring, optimizing, and troubleshooting both
wired and wireless devices. Robust graphical interfaces make device deployments and operations simple
and cost-effective.
The Administration menu in Prime Infrastructure contains tasks that are typically performed by
administrators only.
The following sections contain information about configuring Prime Infrastructure server settings:
• Available System Settings, page 2-1
• Configuring Email Settings, page 2-5
• Configuring Global SNMP Settings, page 2-6
• Configuring Proxy Settings, page 2-10
• Configuring Server Settings, page 2-11
• Configuring TFTP or FTP Servers, page 2-11
• Specifying Administrator Approval for Jobs, page 2-11
• Managing OUI, page 2-13
• Adding Notification Receivers to Prime Infrastructure, page 2-14
• Setting Up HTTPS Access to the Prime Infrastructure Server, page 2-15
• MIB to Prime Infrastructure Alert/Event Mapping, page 2-19
• Set the protocol to be used for controller and autonomous CLI Session Wireless
AP CLI sessions.
See Configuring Protocols for CLI Sessions, Device
• Enable autonomous AP migration analysis on discovery. page 7-2.
• Enable automatic troubleshooting of clients on the Client Wired and
diagnostic channel. wireless
See Configuring Client Performance
devices
• Enable lookup of client hostnames from DNS servers and set Settings, page 3-6.
how long to cache them.
• Set how long to retain disassociated clients and their session
data.
• Poll clients to identify their sessions only when a trap or
syslog is received.
• Disable saving of client association and disassociation traps
and syslogs as events.
• Enable saving of client authentication failure traps as events,
and how long between failure traps to save them.
Set basic control parameters used when deploying a device Configuration Wired and
configuration, such as enabling backup of the running wireless
See Backing up and Rolling Back
configuration, rollbacks, retrieval of show command output from devices
Configurations, page 6-6.
the cache, and the number of CLI thread pools to use.
Set basic parameters for the configuration archive, such as Configuration Archive Wired and
protocol, timeout value, number of configuration versions to wireless
See Specifying When to Archive
store, and so forth. devices
Configurations, page 6-6.
Set basic and advanced switch port trace parameters. Switch Port Trace Wired
device
See Configuring Switch Port Tracing,
page 7-4.
Add a vendor Organizationally Unique Identifier (OUI) mapping User Defined OUI Wired and
and upload an updated vendor OUI mapping XML file. wireless
Upload OUI
devices
See Managing OUI, page 2-13.
Store additional information about a device. User Defined Field Wired
device
See Adding Device Information to a User
Defined Field, page 2-12.
Step 1 Choose Administration > System Settings > Mail Server Configuration. The Mail Server
Configuration page appears.
Step 2 Enter the hostname of the primary SMTP server.
Step 3 Enter the username of the SMTP server.
Step 4 Provide a password for logging on to the SMTP server and confirm it.
Step 5 Provide the same information for the secondary SMTP server (only if a secondary mail server is
available).
Step 6 The From text box in the Sender and Receivers portion of the page is populated with
PI@Hostname.domainName. You can change it to a different sender.
Step 7 Enter the email addresses of the recipient in the To text box. The email address you provide serves as the
default value for other functional areas, such as alarms or reports. Multiple email addresses can be added
and should be separated by commas.
Note Global changes you make to the recipient email addresses in Step 7 are disregarded if email
notifications were set.
You must indicate the primary SMTP mail server and complete the From address text boxes.
If you want all alarm categories applied to the provided recipient list, select the Apply recipient list to
all alarm categories check box.
Step 8 Enter the text that you want to append to the email subject.
Step 9 (Optional) Click the Configure email notification for individual alarm categories link, you can specify
the alarm categories and severity levels you want to enable. email notifications are sent when an alarm
occurs that matches categories and the severity levels you select.
Note You can set each alarm severity by clicking the alarm category, choosing Critical, Major, Minor,
or Warning, and providing an email address.
Step 10 Click the Test button to send a test email using the parameters you configured. The results of the test
operation appear on the same page. The test feature checks the connectivity to both primary and
secondary mail servers by sending an email with a “Prime Infrastructure test email” subject line.
If the test results are satisfactory, click Save.
Note The default network address is 0.0.0.0, which indicates the entire network. An SNMP credential
is defined per network so only network addresses are allowed. 0.0.0.0 is the SNMP credential
default and is used when no specific SNMP credential is defined. The default community string
is private for both read and write. You should update the prepopulated SNMP credential with
your own SNMP information.
Step 4 For the Backoff Algorithm, choose either Exponential or Constant Timeout from the drop-down list.
If you choose Exponential (the default value), each SNMP try waits twice as long as the previous try,
starting with the specified timeout for the first try. If you choose Constant Timeout, each SNMP try waits
the same, specified amount of time.
Note Constant Timeout is useful on unreliable networks (such as satellite networks) where the desired
number of retries is large. Because it does not double the timeout per try, it does not take as long
to timeout with a high number of retries.
Step 5 Determine if you want to use reachability parameters. If selected, Prime Infrastructure defaults to the
global Reachability Retries and Timeout that you configure. If unselected, Prime Infrastructure always
uses the timeout and retries specified per-controller or per-IOS access point. The default is selected.
Note Adjust this setting downward if switch port tracing is taking a long time to complete.
Step 6 For the Reachability Retries field, enter the number of global retries used for determining device
reachability. The default number is 2. This field is only available if the Use Reachability Parameters
check box is selected.
Note Adjust this setting downward if switch port tracing is taking a long time to complete.
Step 7 For the Reachability Timeout field, enter a global timeout used for determining device reachability. The
default number is 2. This field is only available if the Use Reachability Parameters check box is selected.
Step 8 At the Maximum VarBinds per PDU field, enter a number to indicate the largest number of SNMP
variable bindings allowed in a request or response PDU. The default for the Maximum VarBinds per Get
PDU field is 30 and the Maximum VarBinds per Set PDU field is 50.
Note For customers who have issues with PDU fragmentation in their network, this number can be
reduced to 50, which typically eliminates the fragmentation.
The maximum rows per table field is configurable and the default value is 200000 rows. The configured
value is retained even if you upgrade Prime Infrastructure to a newer version.
Step 9 Click Save to confirm these settings.
Note Enter SNMP parameters for write access, if available. With display-only access parameters, the
switch is added but you cannot modify its configuration in Prime Infrastructure. Device
connectivity tests use the SNMP retries and timeout parameters configured in Administration >
Settings > SNMP Settings.
• Retries—The number of times that attempts are made to discover the switch.
• Timeout—The session timeout value in seconds, which specifies the maximum amount of time
allowed for a client before it is forced to reauthenticate.
• SNMP v1 Parameters or v2 Parameters—If selected, enter the applicable community in the available
text box.
• SNMP v3 Parameters—If selected, configure the following parameters:
– Username
– Auth. Type
– Auth. Password
– Privacy Type
– Privacy Password
Note If SNMP v1 or v2 with default community is configured, the network is open to easy attacks
because default communities are well known. SNMP v1 or v2 with a non default community is
more secure than a default community, but SNMP v3 with Auth and Privacy type and no default
user is the most secure SNMP connection.
Step 4 Click OK to save changes or Cancel to return to the SNMP Credentials page without making any
changes to the SNMP credential details.
• If SNMP v1 Parameters or v2 Parameters is selected, enter the applicable community in the available
text box.
• If SNMP v3 Parameters is selected, configure the following parameters:
– Username
– Auth. Type
– Auth. Password
– Privacy Type
– Privacy Password
Note If SNMP v1 or v2 with default community is configured, the network is open to easy attacks
because default communities are well known. SNMP v1 or v2 with a non-default community is
more secure than a default community, but SNMP v3 with Auth and Privacy type and no default
user is the most secure SNMP connection.
Note If you manually added switches through the Configure > Ethernet Switches page, then switch port
tracing uses the credentials from that page, not the ones listed in the SNMP Credentials page. If the
manually added switch credentials have changed, you need to update them from the Configure >
Ethernet page.
Note After you enable the compliance service and restart the server, you must synchronize inventory to
generate the PSIRT and EOX reports.
Step 1 Choose Administration > System Settings > Job Approval Settings.
Step 2 Select the Enable Job Approval check box
Step 3 From the list of job types, use the arrows to move any jobs for which you want to enable job approval to
the list in the right. By default, job approval is disabled so all jobs appear in the list on the left.
Step 4 To specify a customized job type, enter a string using regular expressions in the Job Type field, then click
Add. For example, to enable job approval for all job types that start with Config, enter Config.*
Step 5 Click Save.
Approving Jobs
If you have previously specified that a job must be approved by an administrator (see Specifying
Administrator Approval for Jobs, page 2-11) before the job can run, the administrator must approve the
job.
Choose Administration > Jobs Approval to:
• View the list of jobs that need approval.
• Approve any listed jobs—After an administrator approves a job, the job is enabled and runs per the
schedule specified in the job.
• Reject the approval request for any listed jobs—After an administrator rejects a job, the job is
deleted from the Prime Infrastructure database.
Step 1 Choose Administration > System Settings > User Defined Field.
Step 2 Click Add Row to add a UDF.
Step 3 Enter the field label and description in the corresponding fields.
Step 4 Click Save to add a UDF.
Managing OUI
Prime Infrastructure relies on the IEEE Organizational Unique Identifier (OUI) database to identify the
client vendor name mapping. Prime Infrastructure stores vendor OUI mappings in an XML file named
vendorMacs.xml. This file is updated for each release of Prime Infrastructure. With the OUI update, you
can perform the following:
• Change the vendor display name for an existing OUI.
• Add new OUIs to Prime Infrastructure.
• Refresh the vendorMacs.xml file with new vendor OUI mappings and upload it to Prime
Infrastructure.
This section contains the following topics:
• Adding a New Vendor OUI Mapping, page 2-13
• Uploading an Updated Vendor OUI Mapping File, page 2-13
The following sample output shows the ncs_nb.log file generated by Prime Infrastructure. This log file
is located in the log file directory on Prime Infrastructure server (/opt/CSCOlumos/logs). The log output
helps you troubleshoot when alarms are not being received by the North Bound SNMP receiver.
2013-12-02 17:11:53,868 [main] INFO services - Queue type is order
2013-12-02 17:11:53,870 [main] INFO services - Starting the notification thread..
2013-12-02 17:11:53,871 [NBNotifier] INFO services - Fetching the head of the queue
2013-12-02 17:11:53,871 [NBNotifier] INFO services - The Queue is empty
2013-12-02 17:11:53,871 [main] INFO notification - Setting the NB process flag
2013-12-02 17:41:50,839 [Task Scheduler Worker-10] ERROR notification - Unable to get OSS
list
2013-12-03 08:22:39,227 [main] INFO services - Queue type is order
2013-12-03 08:22:39,229 [main] INFO services - Starting the notification thread..
2013-12-03 08:22:39,231 [NBNotifier] INFO services - Fetching the head of the queue
2013-12-03 08:22:39,231 [NBNotifier] INFO services - The Queue is empty
2013-12-03 08:22:39,231 [main] INFO notification - Setting the NB process flag
2013-12-03 08:44:40,287 [main] INFO services - Queue type is order
2013-12-03 08:44:40,289 [main] INFO services - Starting the notification thread..
2013-12-03 08:44:40,290 [NBNotifier] INFO services - Fetching the head of the queue
2013-12-03 08:44:40,290 [NBNotifier] INFO services - The Queue is empty
2013-12-03 08:44:40,290 [main] INFO notification - Setting the NB process flag
2013-12-03 08:56:18,864 [Task Scheduler Worker-8] ERROR notification - Unable to get OSS
list
Step 1 Log in to the CLI of the Prime Infrastructure server in admin mode.
Step 2 Enter the following command in the admin prompt (admin #):
ncs key genkey –newdn
A new RSA key and self-signed certificate with domain information is generated. You are prompted for
the distinguished name fields for the certificate. It is important to specify the fully qualified domain
name (FQDN) of the server as the domain name that will be used to access Prime Infrastructure.
Step 3 To make the certificate valid, restart the Prime Infrastructure processes by issuing the following
commands in this order:
- ncs stop
- ncs start
Step 1 Generate a Certificate Signing Request (CSR) file for the Prime Infrastructure server:
a. At the Prime Infrastructure appliance, exit to the command line.
b. At the command line, log in using the administrator ID and password used to install Prime
Infrastructure.
c. Enter the following command to generate the CSR file in the default backup repository:
- ncs key genkey -newdn -csr CertName.csr repository RepoName
where:
– CertName is an arbitrary name of your choice (for example: MyCertificate.csr).
– RepoName is any previously configured backup repository (for example: defaultRepo).
Step 2 Copy the CSR file to a location you can access. For example:
copy disk:/RepoName/CertName.csr ftp://your.ftp.server.
Step 3 Send the CSR file to a Certificate Authority (CA) of your choice.
Note Once you have generated and sent the CSR file for certification, do not use the genkey command
again to generate a new key on the same Prime Infrastructure server. If you do, importing the
signed certificate file will result in mismatches between keys in the file and on the server.
Step 4 You will receive a signed certificate file with the same filename, but with the file extension CER, from
the CA. Before continuing, ensure:
• There is only one CER file. In some cases, you may receive chain certificates as individual files. If
so, concatenate these files into a single CER file.
• Any blank lines in the CER file are removed.
Step 5 At the command line, copy the CER file to the backup repository. For example:
- copy ftp://your.ftp.server/CertName.cer disk:RepoName
Step 6 Import the CER file into the Prime Infrastructure server using the following command:
- ncs key importsignedcert CertName.cer repository RepoName
Step 7 Restart the Prime Infrastructure server by issuing the following commands in this order:
- ncs stop
- ncs start
Step 8 If the Certificate Authority who signed the certificate is not already a trusted CA: Instruct users to add
the certificate to their browser trust store when accessing the Prime Infrastructure login page.
Step 1 At the command line, log in using the administrator ID and password and enter the following command:
ncs key importcacert aliasname ca-cert-filename repository repositoryname
where
• aliasname is a short name given for this CA certificate.
• ca-cert-filename is the CA certificate file name.
• repositoryname is the repository name configured in Prime Infrastructure where the
ca-cert-filename is hosted.
Step 2 To import an RSA key and signed certificate to Prime Infrastructure, enter the following command in
admin mode:
ncs key importkey key-filename cert-filename repository repositoryname
where
• key-filename is the RSA private key file name.
• cert-filename is the certificate file name.
• repositoryname is the repository name configured in Prime Infrastructure where the key-file and
cert-file are hosted.
Step 3 Restart the Prime Infrastructure server by issuing the following commands in this order:
- ncs stop
- ncs start
Deleting a CA Certificate
To delete a CA certificate from Prime Infrastructure, at the command line, log in using the administrator
ID and password and enter the following command
ncs key deletecacert <aliasname>
where aliasname is the short name of the CA certificate, which you can obtain by issuing the command
ncs key listcacert.
Prime Infrastructure
Field Name and Object ID Data Type Event/Alert field Description
cWNotificationTimestamp DateAndTime createTime - NmsAlert Creation time for alarm/event.
eventTime - NmsEvent
cWNotificationUpdatedTimestamp DateAndTime modTime - NmsAlert Modification time for Alarm.
Events do not have modification time.
cWNotificationKey SnmpAdminString objectId - NmsEvent Unique alarm/event ID in string form.
entityString- NmsAlert
cwNotificationCategory CWirelessNotificat NA Category of the Events/Alarms.
ionCategory Possible values are:
unknown
accessPoints
adhocRogue
clients
controllers
coverageHole
interference
contextAwareNotifications
meshLinks
mobilityService
performance
rogueAP
rrm
security
wcs
switch
ncs
cWNotificationSubCategory OCTET STRING Type field in alert and This object represents the subcategory
eventType in event. of the alert.
cWNotificationServerAddress InetAddress N/A Prime Infrastructure IP address.
Prime Infrastructure
Field Name and Object ID Data Type Event/Alert field Description
cWNotificationManagedObject InetAddressType N/A The type of Internet address by which
AddressType the managed object is reachable.
Possible values:
0—unknown
1—IPv4
2—IPv6
3—IPv4z
4—IPv6z
16—DNS
Always set to “1” because Prime
Infrastructure only supports IPv4
addresses.
cWNotificationManagedObject InetAddress getNode() value is used if getNode is populated for events and
Address present some alerts. If it is not null, then it is
used for this field.
cWNotificationSourceDisplay OCTET STRING sourceDisplayName field This object represents the display
Name in alert/event. name of the source of the notification.
cWNotificationDescription OCTET STRING Text - NmsEvent Alarm description string.
Message - NmsAlert
cWNotificationSeverity INTEGER severity - NmsEvent, Severity of the alert/event:
NmsAlert
critical(1)
major(2)
minor(3)
warning(4)
clear(5)
info(6)
unknown(7)
cWNotificationSpecialAttributes OCTET STRING All the attributes in This object represents the specialized
alerts/events apart from attributes in alerts like APAssociated,
the base alert/event class. APDisassociated, RogueAPAlert,
CoverageHoleAlert, and so on. The
string is formatted in property=value
pairs in CSV format.
cWNotificationVirtualDomains OCTET STRING N/A Virtual Domain of the object that
caused the alarm. This field empty for
the current release.
To view this information... Select this tab... And see this dashlet
Prime Infrastructure server memory and CPU statistics over time. Health System Health
Alarms and events issued against the Prime Infrastructure server itself, System Alarms
including a list of events, times events occurred, and their severities.
General health statistics for the Prime Infrastructure server, such as the System Information
number of jobs scheduled and running, the number of supported MIB
variables, how much polling the server is doing, and the number of users
logged in.
The relative proportion of the Prime Infrastructure server database taken DB Usage Distribution
up by data on discovered device inventory (“Lifecycle Clients”), their
current status and performance data (“Lifecycle Statistics”), and the
server’s own system data (“Infrastructure” and “DB-Index”)
To view this information... Select this tab... And see this dashlet
How quickly the Prime Infrastructure server is responding to user API Health API Response Time Summary
service requests for information, such device reachability, alarms and
events, and so on. Shows the maximum, minimum, and average response
times for each API underlying a client service.
The trend over time in how quickly the Prime Infrastructure server is Service Details API Response Time Trend
responding to user service requests.
The activity level for each of the logged-in Prime Infrastructure users, API Calls Per Client Chart
measured by the number of service requests each is generating.
The trend over time in the total number of service requests logged-in API Request Count Trend
clients are generating,
Note You must enter your Cisco.com username and password to access and participate in the forums.
Note To open a support case or access the Cisco Support Community, you must:
• Have a direct Internet connection on the Prime Infrastructure server
• Enter your Cisco.com username and password
If you find Prime Infrastructure is using 80 percent or more of your system resources or the
device/interface/flow counts recommended for the size of OVA you have installed, we recommend that
you address this using one or more of the following approaches, as appropriate for your needs:
• Recover as much existing disk space as you can, following the instructions in Compacting the Prime
Infrastructure Database, page 3-6.
• Add more disk space—VMWare OVA technology enables you to easily add disk space to an existing
server. You will need to shut down the Prime Infrastructure server and then follow the instructions
VMWare provides on expanding physical disk space. Once you restart the virtual appliance, Prime
Infrastructure automatically makes use of the additional disk space.
• Limit collection—Not all data that Prime Infrastructure is capable of collecting will be of interest
to you. For example, if you are not using the system to report on wireless radio performance
statistics, you need not collect or retain that data, and can disable the Radio Performance collection
task. Alternatively, you may decide that you need only the aggregated Radio Performance data, and
can disable retention of raw performance data. For details on how to do this, see Specifying Data
Retention Periods, page 6-2.
• Shorten retention—Prime Infrastructure defaults set generous retention periods for all of the data it
persists and for the reports it generates. You may find that some of these periods exceed your needs,
and that you can reduce them without negative effects. For details on this approach, see Controlling
Report Storage and Cleanup, page 6-5 and Specifying Data Retention Periods, page 6-2.
• Off load backups and reports—You can save space on the Prime Infrastructure server by saving
reports and backups to a remote server. For details, see Using Remote Backup Repositories,
page 4-5.
• Migrate to a new server—Set up a new server that meets at least the minimum RAM, disk space, and
processor requirements of the next higher level of OVA. Back up your existing system, then restore
it to a VM on the higher-rated server. For details, see Restoring From Application Backups,
page 4-7.
Step 1 Open a console session and log in to the server as admin. Enter the admin password when prompted.
Step 2 At the command line, enter the following command to compact the application database:
admin# ncs cleanup
Note Automatic client troubleshooting is only available for clients running CCX version 5 or version 6. For a
list of CCX-certified partner manufacturers and their CCX client devices, see the Cisco Compatible
Extensions Client Devices page.
You must now be able to login to Prime Infrastructure web interface with the new root password.
Note Be sure to download the software updates that match your Prime Infrastructure version. For
example, software updates for Release 1.1 can be installed only on Prime Infrastructure 1.1.
Field Description
Name The names of software updates that have been downloaded from Cisco.com.
Published Date Date at which the software was published to Cisco.com. The Software Updates table always shows the
published dates in chronological order (oldest to most recent).
Requires Restart If the update requires a restart, the value of this field is yes.
Pending Restart If a restart is pending for the update to be complete, the value of this field is yes.
Installed If the software is already installed, this field has a green check mark. If the update bundle has not yet
been installed, this field is blank.
Description To see a detailed description of the software update bundle, select the radio button to the right of the
description. A dialog box appears, showing the list of patches in that update bundle
Note When you choose an update, all the uninstalled updates published prior to the update you have
chosen are also auto-selected. In Prime Infrastructure, it is mandatory to install software updates
incrementally, because older updates are sometimes prerequisites to more recent updates. This
behavior also occurs in uninstallation.
The installed software updates appear at the bottom of the table, with a check mark at the Installed
column.
b. If the Pending Restart value is yes, restart Prime Infrastructure to complete the update.
c. To uninstall any software updates, select the updates and click Uninstall.
You can apply the UBF patch on either a standalone Prime Infrastructure 2.0 server or in a Prime
Infrastructure 2.0 High Availability (HA) environment. For more details, see PI 2.0 UBF Patch Readme.
Note If any users are logged in when you stop Prime Infrastructure, their sessions stop functioning.
Step 1 Log into the system as admin by entering the following command:
ssh admin server_IP address | hostname
Step 1 In the VMware vSphere client, right-click the Prime Infrastructure virtual appliance.
Step 2 Power off the virtual appliance.
Step 3 From the Disk option, choose Delete.
As with any other system upon which your organization relies, you will need to ensure that Cisco Prime
Infrastructure is backed up regularly, so it can be restored in case of hardware or other failure.
• Types of Prime Infrastructure Backups, page 4-1
• Taking Application Backups From the Interface, page 4-3
• Taking Application Backups From the Command Line, page 4-3
• Scheduling Automatic Application Backups, page 4-4
• Taking Appliance Backups, page 4-4
• Using Local Backup Repositories, page 4-5
• Using Remote Backup Repositories, page 4-5
• Types of Prime Infrastructure Restore, page 4-6
• Restoring From Application Backups, page 4-7
• Restoring From Appliance Backups, page 4-7
• Migrating to Another OVA Using Backup and Restore, page 4-9
• Log Information, page 4-9
All backups created automatically or on-demand from the Prime Infrastructure interface are assigned a
filename with the format host-yymmdd-hhmm.tar.gpg, where host is the hostname of the server from
which the backup was taken, and the other values are the date and time the backup was taken. Backups
taken from the command line have the format filename-yymmdd-hhmm.tar.gpg, where filename is the
filename you specify.
Step 1 At the Prime Infrastructure virtual appliance, exit to the command line.
Step 2 At the command line, log in using the administrator ID and password used to install Prime Infrastructure.
Step 3 Enter the following command to display the list of backups:
# show repository repositoryName
Where repositoryName is the repository alias on which you want to create the backup (for example,
RemoteFTP).
Note Backing up affects the performance of the server. You should schedule application backups to run when
the server is less active (for example, in the middle of the night).
Step 1 At the Prime Infrastructure virtual appliance, exit to the command line.
Step 2 At the command line, log in using the administrator ID and password used to install Prime Infrastructure.
Step 3 Enter the following command to display the list of appliance backups:
# show repository repositoryName
Where repositoryName is the repository alias on which you want to create the appliance backup (for
example, RemoteFTP).
Step 4 Enter the following command to back up the appliance:
# backup filename repository repositoryName
Where:
• filename is the name you want to give the appliance backup file (for example, myBackup). The date
and time of the backup and the tar.gpg filename extension will be appended to the filename you
specify (for example, myBackup-130615-1256.tar.gpg).
• repositoryName is the name of the repository where you want to store the appliance backup (for
example, RemoteFTP).
Step 1 At the command line, log in with the administrator ID and password used to install Prime Infrastructure.
Step 2 Enter the following commands:
# configure terminal
# repository repositoryName
# url disk: /foldername
# end
Where disk represents localdisk.
You can create new backup repositories as needed, then specify one of them when scheduling an
automatic backup or before performing an on-demand backup.
If you want to use a local repository, entering a new repository alias in the Name field and clicking
Submit will create the new repository as a subdirectory with the name you specified on the Prime
Infrastructure server.
If you want to use a repository located on a remote FTP server, see Using Remote Backup Repositories,
page 4-5.
• Has a local subdirectory that matches the repository Name you specify on the Prime Infrastructure
server.
Although not required, Cisco strongly recommends that you configure the FTP server backup repository
before setting up Prime Infrastructure to use it. If you do not configure it before the first on-demand or
automatic backup is triggered, the backup will fail without warning.
Step 1 At the Prime Infrastructure virtual appliance, exit to the command line.
Step 2 At the command line, log in with the administrator ID and password used to install Prime Infrastructure.
Step 3 Enter the following command to enter server configuration mode:
# configure terminal
Step 4 Enter the following commands to configure a symbolic link to the remote FTP server:
# repository repositoryName
# url ftp://serverIPorHostname
# user name password plain userPassword
Where:
• repositoryName is the name of the remote repository on the FTP server (for example, RemoteFTP).
• serverIPorHostname is the IP address or hostname of the remote FTP server (for example,
ftp://192.198.110.100/).
• name is the name of a user with write privileges to the repository on the FTP server.
• userPassword is the corresponding password for that user.
When you are finished, press Ctrl+z to exit configuration mode.
Step 5 Verify creation of the symbolic link using the following command:
# show repository repositoryName
Step 6 In the Prime Infrastructure interface, choose Administration > Background Tasks > Other
Background Tasks.
Step 7 Click Prime Infrastructure Server Backup.
Step 8 Click Create.
Step 9 Enter the name of the remote FTP repository.
Step 10 Select FTP Repository.
Step 11 Enter the serverIPorHostname and the name and userPassword of the FTP user.
Step 12 Click Submit.
• Appliance restore: These contain all application code, data, and host-specific settings, including the
hostname, IP address, subnet mask, and default gateway. You can restore appliance data from
appliance backup using command line only.
Step 1 At the Prime Infrastructure virtual appliance, exit to the command line.
Step 2 At the command line, log in using the administrator ID and password used to install Prime Infrastructure.
Step 3 Enter the following command to display the list of application backups:
# show repository repositoryName
Where repositoryName is the repository alias from which you want to restore the application backup.
(for example, RemoteFTP).
Step 4 Identify the application backup file you want to restore and then enter the following command to restore
from that file:
# restore filename repository repositoryName application NCS
Where filename is the name of the application backup file from which you want to restore (for example,
myHost-131216-1256.tar.gpg)
Note In case of older version restore, if the restore is done with NCS process down, then you have to manually
make the process up after completion of restore.
Although not required, we also recommend changing the server hostname under these conditions.
Step 1 At the Prime Infrastructure virtual appliance, exit to the command line.
Step 2 At the command line, log in using the administrator ID and password used to install Prime Infrastructure.
Step 3 Enter the following command to display the list of appliance backups:
# show repository repositoryName
Where repositoryName is the repository alias from which you want to pull the appliance backup (for
example, RemoteFTP).
Step 4 Identify the appliance backup file you want to restore and then enter the following command to restore
from that file:
# restore filename repository repositoryName
Where filename is the name of the appliance backup file from which you want to restore (for example,
myHost-131216-1256.tar.gpg).
Step 5 Once the restore is complete, if needed, use the command line to change the IP address, subnet mask,
default gateway and (optionally) the host name on the restored server. For example:
Admin# conf t
Admin# int GigabitEthernet 0
Admin# ip address IPAddress subnetMask
Admin# ip default-gateway GatewayIP
Admin# hostname hostname
Admin# exit
Step 1 If you have not already done so, set up a remote backup repository for the old host, as explained in Using
Remote Backup Repositories, page 4-5.
Step 2 Take an application backup of the old host on the remote repository, as explained in Taking Application
Backups From the Interface, page 4-3.
Step 3 Install the new host as explained in the Cisco Prime Infrastructure 2.0 Quick Start Guide.
Step 4 Configure the new host to use the same remote backup repository as the old host, as explained in Using
Remote Backup Repositories, page 4-5.
Step 5 Restore the application backup on the remote repository to the new host, as explained in Restoring From
Application Backups, page 4-7.
Log Information
Database backup and restore related information can be obtained from the below logs:
/opt/CSCOlumos/logs/rman.log
/opt/CSCOlumos/logs/dbadmin_StdOut.log
• Delete all events after—Enter the number of days after which all the events are deleted. If you want
this deletion task to be performed first, set its value smaller than all the other Alarm and Events
Cleanup Options.
Note Prime Infrastructure deletes old alarms nightly, as part of normal data cleanup tasks, and checks
the alarm table size once an hour. When the alarm table size exceeds 300K, Prime Infrastructure
deletes the oldest cleared alarms until the alarm table size is within 300K. If you want to keep
cleared alarms for more than seven days, then you can specify a value more than seven days in
the Delete cleared non-security alarms after text box, until the alarm table size reaches 300K.
Step 4 Under Syslog Cleanup Options, in the Delete all syslogs after field, enter the number of days after which
all syslogs are deleted.
Step 5 Modify the Alarm Display Options:
• Hide acknowledged alarms—When the check box is selected, Acknowledged alarms do not appear
on the Alarm Summary page. This option is enabled by default. Emails are not generated for
acknowledged alarms, regardless of severity change.
• Hide assigned alarms—When the check box is selected, assigned alarms do not appear in the Alarm
Summary page.
• Hide cleared alarms—When the check box is selected, cleared alarms do not appear in the Alarm
Summary page. This option is enabled by default.
• Add controller name to alarm messages—Select the check box to add the name of the controller to
alarm messages.
• Add Prime Infrastructure address to email notifications—Select the check box to add Prime
Infrastructure address to email notifications.
Note Changes in these options affect the Alarm Summary page only. Quick searches for alarms for
any entity will display all alarms for that entity, regardless of alarm state.
• Enable Secure Message Mode—Select the check box to enable a secure message mode. If you select
the Mask IP Address and Mask Controller Name check boxes, the alarm emails are sent in secure
mode where all the IP addresses and controller names are masked.
Step 7 Modify the Alarm Other Settings:
• Controller license count threshold—Enter the minimum number of available controller licenses you
want to maintain. An alarm is triggered if the number of available controller licenses falls below this
threshold.
• Controller access point count threshold—Enter the maximum number of available controller access
points you want to maintain. An alarm is triggered if the number of available access points exceeds
this threshold limit.
Step 8 Click Save.
Note Configuration objects refer to the device configuration stored in Prime Infrastructure
database.
• Template-based Audit—Audits on the applied templates, config group templates (which have been
selected for the background audit), and configuration audits (for which corresponding templates do
not exist) against current Controller device values.
Step 1 Choose Administration > Logging. The General Logging Options Screen appears.
Step 2 Choose a message level.
Step 3 Select the check boxes within the Enable Log Module option to enable various administration modules.
Click Log Modules to select all modules.
Step 4 In the Log File Settings section, enter the required settings. These settings will be effective after you
restart Prime Infrastructure.
By default, the File Prefix field is ncs-%g-%u.log where %g is a sequential number for the log file, and
%u is a unique number assigned by the local disk file system. For example, the first log file created is
named ncs-1-0.log.
Step 5 Click Download to download the log file to your local machine.
Note The logs.zip filename includes a prefix with the hostname, date, and time so that you can easily
identify the stored log file. An HTML file that documents the log files is included in the ZIP file.
Step 6 Enter the Email ID or Email IDs separated by commas to send the log file, then click Send.
Note To send the log file in an email, you must have configured an email server.
Note When you upgrade from WCS Release 7.x to Prime Infrastructure Release 2.0, the settings under
Administration > Logging Options > SNMP Logging Options are not retained.
Step 1 Choose Administration > Logging. The Logging Options page appears.
Step 2 Choose the SNMP Logging Options from the left sidebar menu.
Step 3 Select the Enable SNMP Trace check box to enable sending SNMP messages (along with traps)
between controllers and Prime Infrastructure, then select the Display Values check box to see the SNMP
message values.
Step 4 Configure the IP address or IP addresses to trace the SNMP traps. You can add up to a maximum of 10
IP addresses in the text box.
Step 5 You can configure the maximum SNMP file size and the number of SNMP files.
Step 1 Choose Administration > Logging, then click Syslog Logging Options.
Step 2 Select the Enable Syslog check box to enable sending of Prime Infrastructure system log messages.
Step 3 Configure the IP address of Syslog Server to which the system log message have to be sent.
Step 4 Choose the Syslog Facility. You can choose any of the eight local use facilities for sending syslog
messages. The local use facilities are not reserved and are available for general use.
Step 5 Click Save.
Step 5 Return to the Logging Options page and click Download from the Download Log File section.
The logs.zip filename includes a prefix with the hostname, date, and time so that you can easily identify
the stored log file. An HTML file that documents the log files is included in the ZIP file.
Step 6 After you have retrieved the logs, choose Information from the Message Level drop-down list.
Caution Leaving the Message Level at Trace can adversely affect performance over a long period of time.
Step 1 In Classic view: Choose Design > Mobility Services > Mobility Services Engines, then select the name
of the mobility services engine that you want to configure.
Step 2 Choose System > Logs, then choose the appropriate options from the Logging Level drop-down list.
There are four logging options: Off, Error, Information, and Trace. All log records with a log level of
Error or preceding are logged to a new error log file locserver-error-%u-%g.log. This is an additional log
file maintained along with the location server locserver-%u-%g.log log file. The error log file consists
of logs of Error level along with their context information. The contextual information consists of 25 log
records prior to the error. You can maintain up to 10 error log files. The maximum size allowed for each
log file is 10 MB.
Caution Use Error and Trace only when directed to do so by Cisco TAC personnel.
Step 3 Select the Enable check box next to each element listed in that section to begin logging its events.
Step 4 Select the Enable check box in the Advanced Parameters dialog box to enable advanced debugging. By
default, this option is disabled.
Step 5 To download log files from the server, click Download Logs. See the “Downloading Mobility Services
Engine Log Files” section on page 5-10 for more information.
Step 6 In the Log File Parameters group box, enter the following:
• The number of log files to be maintained in the mobility services engine. You can maintain a
minimum of 5 log files and a maximum of 20 log files in the mobility services engine.
• The maximum log file size in MB. The minimum log file size is 10 MB and the maximum is 50 MB.
Step 7 In the MAC Address Based Logging Parameters group box, do the following:
• Select the Enable check box to enable MAC address logging. By default, this option is disabled.
• Add one or more MAC addresses for which you want to enable logging. You can also remove MAC
addresses that you have already added by selecting the MAC address from the list and clicking
Remove. See the “MAC Address-Based Logging” section on page 5-10 for more information on
MAC address-based logging.
Step 8 Click Save to apply your changes.
Step 1 In Classic view: Choose Design > Mobility Services > Mobility Services Engines.
Step 2 Select the name of the mobility services engine to view its status.
Step 3 Choose System > Logs from the left sidebar menu.
Step 4 In the Download Logs group box, click Download Logs.
Step 5 Follow the instructions in the File Download dialog box to open the file or save the zip file to your
system.
Step 1 Choose Administration > System Settings > Support Request Settings.
Step 2 Select the type of interaction the Cisco Support Enabling interactions directly from the Prime
Infrastructure server:
• Enable interactions directly from the server—Specify this option to create the support case
directly from the Prime Infrastructure server. Emails to the support provider are sent from the email
address associated with the Prime Infrastructure server or the email address you specify.
• Interactions via client system only—Specify this option to download the information required for
your support case to a client machine. You must then email the downloaded support case details and
information to the support provider.
Step 3 Select your technical support provider:
• Click Cisco to open a support case with Cisco Technical Support, then enter your Cisco.com
credentials. Click Test Connectivity to check the connectivity to the following servers:
– Prime Infrastructure mail server
– Cisco support server
– Forum server
• Click Third-party Support Provider to create a service request with a third-party support provider.
You will need to enter the provider’s email address, the subject line, and the website URL.
One of the roles of an administrator is to manage Prime Infrastructure’s network data collection and
retention so that it:
• Scales to fit the real needs of the system’s users.
• Minimizes the burden on monitored devices, applications, and network bandwidth.
• Survives hardware failures.
The following topics explain how to achieve these goals and perform other data management tasks.
• Specifying Data Retention Periods, page 6-2
• Enabling Data Deduplication, page 6-4
• Specifying Where and for How Long to Save Reports, page 6-4
• Controlling Report Storage and Cleanup, page 6-5
• Specifying Inventory Collection After Receiving Events, page 6-5
• Device Configuration Settings, page 6-6
• Controlling Background Data Collection Tasks, page 6-7
• Migrating Data from Cisco Prime LMS to Cisco Prime Infrastructure, page 6-15
Note For the best interactive graph data views, change the settings to default value.
• Non-aggregated historical data—Numeric data that cannot be gathered as a whole (or aggregated).
Client association history is one example of non-aggregated historical data.
You can define a non-aggregated retention period in each data collection task and other settings.
For example, you define the retention period for client association history in Administration >
System Settings > Client. By default, the retention period is 31 days or 1 million records. This
retention period can be increased to 365 days.
Task
Task Name Status Default Schedule Description
AP Image Pre-Download Status Disabled 15 minutes Allows you to see the Image Predownload status of the
associated APs in the controllers. To see the status of the
access points, the Pre-download software to APs check box
should be selected while downloading software to the
controller.
Autonomous AP CPU and Enabled 15 minutes Collects information about memory and CPU utilization of
Memory Utilization autonomous APs.
Autonomous AP Inventory Enabled 180 minutes Collects the inventory information for autonomous APs.
Autonomous AP Radio Enabled 15 minutes Collects information about radio performance information
Performance as well as radio up or down status for autonomous APs.
Autonomous AP Tx Power and Enabled 30 minutes Collects information about radio performance of
Channel Utilization autonomous APs.
CCX Client Statistics Disabled 60 minutes Collects the Dot11 and security statistics for CCX Version
5 and Version 6 clients.
CleanAir Air Quality Enabled 15 minutes Collects information about CleanAir air quality.
Client Statistics Enabled 15 minutes Retrieves the statistical information for the autonomous
and lightweight clients.
Controller Performance Enabled 30 minutes Collects performance information for controllers.
Guest Sessions Enabled 15 minutes Collects information about the guest sessions.
Interferers Enabled 15 minutes Collects information about the interferers.
Media Stream Clients Enabled 15 minutes Collects information about media stream for clients.
Mesh link Performance Enabled 10 minutes Collects information about the performance of Mesh links.
Mesh Link Status Enabled 5 minutes Collects status of the Mesh links.
Mobility Service Performance Enabled 15 minutes Collects information about the performance of mobility
service engines.
Radio Performance Enabled 15 minutes Collects statistics from wireless radios.
Radio Voice Performance Enabled 15 minutes Collects voice statistics from wireless radios.
Rogue AP Enabled 120 minutes Collects information about the rogue access points.
Switch CPU and Memory Poll Enabled 30 minutes Collects information about switch CPU and memory poll.
Switch Inventory Enabled Daily at Collects inventory information for switches.
midnight
Traffic Stream Metrics Enabled 8 minutes Retrieves traffic stream metrics for the clients.
Unmanaged APs Enabled 15 minutes Collects poll information for unmanaged access points.
Task
Task Name Status Default Schedule Description
Wireless Controller Inventory Disabled Daily at Collects inventory information for wireless controllers.
midnight
Wireless Controller Performance Enabled 30 minutes Collects performance statistics for wireless controllers.
Default
Task Name Schedule Description Editable Options
Appliance Status 5 minutes Lets you view appliance polling Default—Enabled.
details. This task populates the Interval—Valid interval is from 1 to10080.
appliance polling details from the
Administration > Appliance >
Appliance Status page. In addition,
this background task populates
information such as the performance
and fault checking capabilities of the
appliance.
Autonomous AP 5 minutes Lets you view the autonomous AP Default: Enabled
Operational operational status polling. Interval—Valid interval is from 1 to10080.
Status
Autonomous 5 minutes Lets you discover the autonomous AP Default—Enabled.
Client Status client from the network.
Configuration Daily at 4 Lets you view the configuration Enable—Click this check box to enable
Sync am. synchronization. configuration synchronization. Default: Enabled.
Enable—Click this check box to enable Network
Audit. Default: Enabled.
Enable—Click this check box to enable Security
Index calculation. Default: Enabled.
Enable—Click this check box to enable RRM
audit. Default: Enabled.
Interval—Enter the interval, in days, that you want
the configuration synchronization to happen. The
valid range is 1 to 360 days.
Time of Day—Enter the time of the day that you
want the configuration synchronization to happen.
The valid format is hh:mm AM|PM. For example,
12:49 AM.
Default
Task Name Schedule Description Editable Options
Controller Daily at 10 Lets you view controller configuration Enable—Click this check box to enable controller
Configuration pm backup activities. configuration backup. Default: Disabled.
Backup
Interval—Enter the interval, in days, that you want
the configuration synchronization to happen. The
valid range is 1 to 360 days.
Time of Day—Enter the time of the day that you
want the configuration synchronization to happen.
The valid format is hh:mm AM|PM. For example,
12:49 AM.
TFTP Server—Select the IP address of the server
to which you want to back up the controller
configuration.
Controller 5 minutes Lets you schedule and view controller Enable—Click this check box to enable Controller
Operational operational status. Configuration Backup. Default: Enabled.
Status
Interval—Enter the interval, in days, that you want
the configuration synchronization to happen. The
valid range is 1 to 360 days.
Data Cleanup Daily at 2 Lets you schedule a data cleanup. Time of Day—Enter the time of the day that you
am. want the data cleanup to happen. The valid format
is hh:mm AM|PM. For example, 12:49 AM.
Default: Enabled.
Device Data 30 minutes Lets you schedule data collection based Enabled—Click this check box to enable data
Collector on specified command-line interface collection for a specified controller. The default is
(CLI) commands at a configured time Disabled.
interval. Controller IP address—The IP address of the
Controller to collect data from.
CLI Commands—Enter the CLI commands,
separated by commas, that you want to run on the
specified controller.
Clean Start—Click this check box to enable a
clean start before data collection.
Repeat—Enter the number of times that you want
the data collection to happen.
Interval—Enter the interval, in days, that you want
the data collection to happen. The valid range is 1
to 360 days.
Default
Task Name Schedule Description Editable Options
Guest Accounts Daily at 1 Schedules guest account polling and Enable—Click this check box to enable guest
Sync am. synchronization. account synchronization. The default is Enabled.
Interval—Enter the interval, in days, that you want
the guest account synchronization to happen. The
valid range is 1 to 360 days.
Time of Day—Enter the time of the day that you
want the guest account synchronization to happen.
The valid format is hh:mm AM|PM. For example,
12:49 AM.
Identity Services 15 minutes Schedules the Identity Services Engine Enable—Click this check box to enable Identity
Engine Status polling. Services Engine polling. The default is Enabled.
Interval—Enter the interval, in days, that you want
the Identity Services Engine polling to happen.
The valid range is 1 to 360 days.
License Status 4 hours. Schedules license status polling. Enable—Click this check box to enable license
status polling. The default is Enabled.
Interval—Enter the interval, in days, that you want
the license status polling to happen. The valid
range is 1 to 360 days.
Lightweight AP 5 minutes. Lets you view Lightweight AP Enable—Click this check box to enable
Operational operational status polling. Lightweight AP Operational Status polling. The
Status default is Enabled.
Interval—Enter the interval, in days, that you want
the Lightweight AP Operational Status polling to
happen. The valid range is 1 to 360 days.
Lightweight 5 minutes. Lets you discover Lightweight AP Enable—Click this check box to enable
Client Status clients from the network. Lightweight Client Status polling. The default is
Enabled.
Interval—Enter the interval, in days, that you want
the Lightweight Client Status polling to happen.
The valid range is 1 to 360 days.
Mobility Service Every 7 Schedules mobility services backup Enable—Click this check box to enable mobility
Backup days at 1 polling. service backup. The default is disabled.
am.
Interval—Enter the interval, in days, that you want
the mobility services back up to happen. The valid
range is 1 to 360 days.
Time of Day—Enter the time of the day that you
want the mobility services back up to happen. The
valid format is hh:mm AM|PM. For example,
12:49 AM.
Default
Task Name Schedule Description Editable Options
Mobility Service 5 minutes. This task is used to schedule mobility Enable—Click this check box to enable mobility
Status services status polling. services status polling. The default is Enabled.
Interval—Enter the interval, in days, that you want
the mobility services status polling to happen. The
valid range is 1 to 360 days.
Mobility Service 60 minutes. This task is used to schedule mobility Out of Sync Alerts—Click this check box if you
Synchronization services synchronization. want to enable out of sync alerts.
Smart Synchronization—Click this check box if
you want to enable smart synchronization. The
default is Enabled.
Interval—Enter the interval, in minutes, that you
want the mobility services synchronization to
happen. The valid range is 1 to 10080 minutes.
Mobility Status 5 minutes This task is used to view the status of Enable—Click this check box to enable mobility
Task mobility services engine(s). status polling. The default is Enabled.
Interval—Enter the interval, in minutes, that you
want the mobility status polling to happen. The
valid range is 1 to 10080 minutes.
Prime Every 7 This task is used to schedule Prime Enabled—Click this check box to enable
Infrastructure days at 1 Infrastructure server backup. automatic Prime Infrastructure server backup. The
Server Backup AM (01:00) default is Enabled.
Backup Repository—The location of the default
backup repository where automatic backups are
stored. The default is defaultRepo.
Max UI backups to keep—The maximum number
of automatic backups to keep (applied only if they
are stored in the default local repository).
Interval—Enter the interval, in days, at which you
want automatic Prime Infrastructure server
backups to be taken. The valid range is 1 to 360
days.
Time of Day—Enter the time of the day that you
want Prime Infrastructure server back up to be
taken. Use 24-hour format (for example, 13:49).
OSS Server 5 minutes. This task is used to schedule OSS Enable—Click this check box to enable OSS
Status server status polling. Server polling. The default is Enabled.
Interval—Enter the interval, in minutes, that you
want the OSS server polling to happen. The valid
range is 1 to 10080 minutes.
Default
Task Name Schedule Description Editable Options
Redundancy 60 minutes This task is used to view the Enabled—Click this check box to enable
Status redundancy status for primary and Redundancy status polling. The default is
secondary controllers. Disabled.
Interval—Enter the interval, in minutes, that you
want the Redundancy status polling to happen.
Switch NMSP 4 hours This task is used to schedule the Switch Enable—Click this check box to enable Switch
and Location Network Mobility Services Protocol NMSP and Civic Location polling. The default is
Status (NMSP) and Civic Location Polling. Enabled.
Interval—Enter the interval, in minutes, that you
want the Switch NMSP and Civic Location Polling
to happen. The valid range is 1 to 10080 minutes.
Switch 5 minutes. This task is used to schedule switch Enable—Click this check box to enable Switch
Operational Full poll is operational status polling. NMSP and Civic Location polling.
Status 15 minutes.
Interval—Enter the interval, in minutes, that you
want the Switch NMSP and Civic Location Polling
to happen. The valid range is 1 to 10080 minutes.
Full operational status interval—Enter the
interval, in minutes. The valid range is 1 to 1440
minutes.
Third party 3 hours This task is used to schedule the Enabled—Click this check box to enable third
Access Point operational status polling of third party party AP operational polling.
Operational APs. Interval—Enter the interval, in hours, that you
Status want the third party AP operational status polling
to happen. The valid range is 3 to 4 hours.
Third party 3 hours This task is used to schedule the Enabled—Click this check box to enable the
Controller reachability status polling of third reachability status polling of third party
Operational party controllers. controllers.
Status
Interval—Enter the interval, in hours, that you
want the third party controller reachability status
polling to happen. The valid range is 3 to 4 hours.
Default
Task Name Schedule Description Editable Options
wIPS Alarm Sync 120 This task is used to schedule wIPS Enable—Click this check box to enable wIPS
minutes. alarm synchronization. alarm synchronization. The default is Enabled.
Interval—Enter the interval, in minutes, that you
want the wIPS alarm synchronization to happen.
The valid range is 1 to 10080 minutes.
Wired Client 2 hours. This task is used to schedule wired Enable—Click this check box to enable wired
Status client status polling. client status polling. The default is Enabled.
Interval—Enter the interval, in hours, that you
want the wired client status polling to happen. The
valid range is 1 to 8640 hours.
Major Polling—Specify two time periods that you
want the major pollings to happen. The valid
format is hh:mm AM|PM. For example, 12:49
AM.
Step 1 Identify the FTP server where LMS backup data is stored, then log in to the Prime Infrastructure server
as an admin user.
Step 2 Configure the backup location in the Admin Console by entering the following commands:
admin# config terminal
admin(config)# repository carsapps
admin(config-Repository)# url
Note The default network address is 0.0.0.0, which indicates the entire network. An SNMP credential
is defined per network so only network addresses are allowed. 0.0.0.0 is the SNMP credential
default and is used when no specific SNMP credential is defined. The default community string
is private for both read and write. You should update the prepopulated SNMP credential with
your own SNMP information.
Step 4 To add a new SNMP entry, choose Add SNMP Entries from the Select a command drop-down list, then
click Go. See the “Adding a New SNMP Credential Entry” section on page 2-9 for more information.
Note In CLI templates, you are not required to answer the question responses (such as Yes or No
answer to a command, Press enter to continue, and so on.). This is automatically performed by
Prime Infrastructure.
Note You must purchase a Lifecycle license in order to use this feature. For more information on ordering
Prime Infrastructure licenses, see the Cisco Prime Infrastructure 2.0 Ordering and Licensing Guide.
Step 1 Choose Administration > System Settings > Switch Port Trace.
Step 2 Configure the following basic settings:
• MAC address +1/-1 search—Select the check box to enable.
This search involves the MAC address +1/-1 convention where the wired-side MAC address of the
rogue access point is obtained by adding or subtracting the radio MAC address by one.
• Rogue client MAC address search—Select the check box to enable.
When a rogue access point client exists, the MAC address of the client is added to the searchable
MAC address list.
• Vendor (OUI) search—Select the check box to enable. OUI refers to Organizational Unique
Identifier search which searches the first three bytes in a MAC address.
• Exclude switch trunk ports—Select the check box to exclude switch trunk ports from the switch port
trace.
Note When more than one port is traced for a given MAC address, additional checks are
performed to improve accuracy. These checks include the: trunk port, non-AP CDP
neighbors present on the port, and whether or not the MAC address is the only one on this
port.
• Exclude device list—Select the check box to exclude additional devices from the trace. Enter into
the device list text box each device that you want to exclude from the switch port trace. Separate
device names with a comma.
• Max hop count—Enter the maximum number of hops for this trace. Keep in mind that the greater
the hop count, the longer the switch port trace takes to perform.
• Exclude vendor list—Enter in the vendor list text box any vendors that you want to exclude from the
switch port trace. Separate vendor names with commas. The vendor list is not case sensitive.
Step 3 Configure the following advanced settings:
• TraceRogueAP task max thread—Switch port tracing uses multiple threads to trace rogue access
points. This field indicates the maximum number of rogue access points that can be traced on
parallel threads.
• TraceRogueAP max queue size—Switch port tracing maintains a queue to trace rogue access points.
Whenever you select a rogue access point for tracing, it is queued for processing. This field indicates
the maximum number of entries that you can store in the queue.
• SwitchTask max thread—Switch port tracing uses multiple threads to query switch devices. This
field indicates the maximum number of switch devices that you can query on parallel threads.
Note The default value for these parameters should be good for normal operations. These parameters
directly impact the performance of switch port tracing and Prime Infrastructure. Unless required,
We do not recommend that you alter these parameters.
Note Prime Infrastructure uses CDP to discover neighbors during tracing. When the neighbors are
verified, Prime Infrastructure uses the CDP capabilities field to determine whether or not the
neighbor device is a valid switch. If the neighbor device is not a valid switch, it is not traced.
Step 4 Click Save to confirm changes made. Click Reset to return the page to the original settings. Click
Factory Reset to return settings to the factory defaults.
Note The following switches are supported: 3750, 3560, 3750E, 3560E, and 2960.
The following topics describe how to manage the high-availability framework provided by Cisco Prime
Infrastructure and redundancy framework on controllers:
• Configuring High-Availability, page 8-1
• Configuring Redundancy, page 8-15
Configuring High-Availability
To ensure continued operation in case of failure, Prime Infrastructure now provides a high-availability
or failover framework. When an active (primary) Prime Infrastructure fails, a secondary Prime
Infrastructure takes over operations for the failed primary Prime Infrastructure and continues to provide
service. Upon failover, a peer of the failed primary Prime Infrastructure is activated on the secondary
Prime Infrastructure using the local database and files, and the secondary Prime Infrastructure runs a
fully functional Prime Infrastructure. While the secondary host is in failover mode, the database and file
backups of other primary Prime Infrastructure continue uninterrupted.
If email Address is specified in the high-availability configuration, the mail server must be configured
and reachable to be notified about the failure.
The following topics describe the high-availability framework provided by Cisco Prime Infrastructure:
• Failover and Failback Processes, page 8-2
• High-Availability Notation, page 8-3
• Health Monitor, page 8-3
• Data Storage, page 8-5
• Licensing, page 8-6
• Guidelines and Limitations for High-Availability, page 8-6
• High-Availability Status, page 8-7
• Deploying High-Availability, page 8-8
• Configuring High-Availability on the Primary Prime Infrastructure Server, page 8-9
• Adding a New Primary Prime Infrastructure Server in Existing High Availability Environment,
page 8-10
• Removing High Availability Configuration, page 8-11
• Configuring an SSO Server in the High-Availability Environment, page 8-11
Failover Scenario
Failover is the process of activating the secondary Prime Infrastructure when the primary Prime
Infrastructure fails. Failover can be initiated, either manually or automatically, depending on the failover
type that is set during the high-availability configuration. For more information about configuring
high-availability, see “Configuring High-Availability on the Primary Prime Infrastructure Server”
section on page 8-9.
If high-availability is configured with manual mode, the following events take place:
1. An email notification, containing the failure status and a link to the secondary Prime Infrastructure
Health Monitor page, will be sent to the registered email address.
2. Using the link provided in the email notification, you can launch the Health Monitor UI and initiate
a failover.
If high-availability is configured with automatic mode, the following events take place:
1. The primary Prime Infrastructure is confirmed as non functioning (because of a hardware crash or
a network crash) by the health monitor on the secondary Prime Infrastructure.
2. The secondary Prime Infrastructure instance is started immediately (using the configuration already
in place) and uses the database of the primary. After a successful failover, the client should point to
the newly activated Prime Infrastructure (the secondary Prime Infrastructure). The secondary Prime
Infrastructure updates all wireless controllers with its own address as the trap destination. For wired
devices, the trap destination for the primary and secondary Prime Infrastructure must be configured
on the devices.
Note After a failover, for all devices, make sure you change the communication IP address from
the primary Prime Infrastructure to the secondary Prime Infrastructure IP address.
3. The result of the failover operation is indicated as an event in the Health Monitor UI, or a critical
alarm is sent to the administrator and to other Prime Infrastructure instances.
Note If an out-of-memory error occurs on the Network Management System (NMS) server, failover must be
initiated, either manually or automatically based on the high-availability configuration settings.
Failback Scenario
Failback is the process of making the primary Prime Infrastructure instance as the active instance.
Failback must be initiated manually. Use https://<piip>:8082 to access the Health Monitor UI of the
secondary Prime Infrastructure. Within the Health Monitor UI, use the authentication key to log in and
initiate the failback process. Before initiating the failback process in the secondary Prime Infrastructure,
you must start the primary Prime Infrastructure. The health monitor and the database processes starts.
When failback is initiated, the following events take place:
1. The database information and files are copied to the primary Prime Infrastructure server. The
primary server mode changes to Primary Active, and the secondary server mode changes to
Secondary Syncing.
2. All processes on the secondary Prime Infrastructure server go down except for the Health Monitor,
and all processes on the primary Prime Infrastructure server start.
3. Failback operation takes more time than failover or registration operations when the secondary
Prime Infrastructure server was in the active state for a long time.
4. During the failback process, if the primary Prime Infrastructure server goes down, failover is
initiated to the secondary Prime Infrastructure server. A new primary Prime Infrastructure is
installed with all the configuration settings of the old primary Prime Infrastructure. The secondary
Prime Infrastructure is registered with the new primary Prime Infrastructure when the failback is
initiated.
High-Availability Notation
The high-availability implementation requires a secondary server that has sufficient resources (CPU,
hard drive, memory, and network connection) to take over operation in the event that the primary system
fails. The database instance on the secondary system is a hot standby for the primary instance.
The size of the primary and secondary servers must be the same. For example, if the primary Prime
Infrastructure server is the express Open Virtual Appliance (OVA; see
http://www.fileinfo.com/extension/ova), the secondary Prime Infrastructure server must also have
express OVA.
The primary and secondary server can be a mix of a physical and a virtual appliance. For example, if the
primary Prime Infrastructure server is a physical appliance, the secondary server can be either a physical
appliance or a standard OVA virtual appliance; for example, the server configuration and sizing of
standard OVA is the same as the physical appliance. For more information about the OVA options, see
Cisco Prime Infrastructure 2.0 Quick Start Guide.
Health Monitor
The Health Monitor is the primary component that manages the Health Monitor operation of the system.
Health Monitor is divided into multiple submodules:
Name Description
Core Health Monitor • Configures the overall Health Monitor system.
• Maintains the state machine for the Health Monitor system.
• Starts and stops the Health Monitor and the Prime Infrastructure
Java Virtual Machine (JVM).
• Starts, stops, and monitors other submodules within the Health
Monitor.
• Handles registration of the primary/secondary pair.
• Authenticates the Health Monitor-specific session.
• Makes all decisions about failover and failback.
Heart Beat Maintains communication between the primary and secondary
Health Monitors. Communication occurs over HTTPS (the default
port is 8082). The timeout value is two seconds. A retry mechanism
has been implemented to retry establishing connectivity between the
primary Health Monitor and secondary Health Monitor. If the Health
Monitor does not receive a response after sending a heartbeat request
within the timeout period, it retries establishing communication by
sending another heartbeat request. If communication has not been
established after three retries, the Health Monitors take appropriate
action according to the following defined scenarios:
• Primary server goes down: This is the classic failover case. In
this scenario, when the secondary Health Monitor does not
receive heartbeat requests for six seconds (3 retries x 2 seconds),
it initiates the failover mechanism on the secondary Prime
Infrastructure Health Monitor.
• Secondary server goes down: In this scenario, the primary
Health Monitor does not receive a heartbeat response from the
secondary Health Monitor for six seconds (3 retries x 2
seconds). When this happens, the primary Health Monitor
changes its state to PRIMARY_ALONE, raises alarms, and
changes into listening mode (waiting to receive any messages
from the secondary Health Monitor for reestablishing the link
between the primary Health Monitor and the secondary Health
Monitor).
Application Monitor Communicates with the Prime Infrastructure framework (the Prime
Infrastructure JVM) on the local server to retrieve status
information. Communication is performed using Simple Object
Access Protocol (SOAP) over HTTPS.
DB Monitor Configures the database for replication. It is not responsible for the
database replication itself; this is accomplished using the database
proprietary replication protocol.
Name Description
File Synchronization This submodule consists of these components:
• File Archiver: Periodically scans directories looking for files
that have been modified, collects any such files, and adds them
to a .tar archive.
• File Transfer Agent (FTA): Transfers the compressed TAR
archive to the destination (the other server, that is, from primary
to secondary or from secondary to primary).
• File Upload Servlet (FUS): Runs on the secondary server and is
the counterpart to the FTA. When it receives a file, the FUS
streams it directly to the TAR extractor rather than create the file
on the local disk (avoids unnecessary disk activity). The FTA
and FUS communicate over HTTPS.
• Statistics Collector: Keeps statistics of file transfer operations
from the time the server starts.
Data Storage
The Prime Infrastructure database is the core data storage element of the system and must be replicated
between primary and backup systems in real time without data loss. This is fundamental to the operation
of Prime Infrastructure high-availability. Data is stored in one of two ways:
• Prime Infrastructure database
• Application data
Application data is a set of flat files that contains the following data:
• All files under the TFTP root directory: Replicated through batch processing (every 500 seconds).
The following real time, batch and Compliance and Audit Manager files are copied from the primary
Prime Infrastructure to the secondary Prime Infrastructure:
– Batch_Directory—$APPLROOT/domainmaps/, $APPLROOT/licenses/,
$REPORTREPOSITORY/, $APPLROOT/conf/sam/, $APPLROOT/conf/da/,
DBDBS=$DBHOME/dbs
– Batch_File—=$APPLROOT/conf/rfm/classes/com/cisco/server/reports/conf/*.xml,
$APPLROOT/da/pktcapfiles/*.pcap,
$APPLROOT/conf/rfm/classes/com/cisco/server/resources/MonitorResources.properties,
$APPLROOT/conf/rfm/classes/com/cisco/webui/resources/MonitorResources.properties,
$APPLROOT/conf/ifm_app_ui_wap_rs.xml, $APPLROOT/conf/ifm_bean_context.xml,
$APPLROOT/tomcat/webapps/webacs/WEB-INF/classes/config/MailServer.properties,
$APPLROOT/tomcat/webapps/webacs/WEB-INF/classes/wap/registry/json/navigation.json,
$APPLROOT/conf/ComplianceEngine.properties, $APPLROOT/conf/jobapprover.properties
Batch File Copy—This copies the least frequently used files to a remote machine.
– RealTime_File—=$TFTPROOT/*-confg, $TFTPROOT/*.cfg,
opt/CSCOlumos/conf/rfm/classes/com/cisco/packaging/PortResources.xml
Real Time Copy—This copies the most frequently used files to a remote machine.
• Scheduled generated reports: Replicated in real time (11 seconds).
Licensing
Only one Prime Infrastructure server license must be purchased; there is no need to purchase a license
for the secondary Prime Infrastructure server. The secondary server will use the license from the primary
when a failover occurs. The secondary node will simulate the Unique Device Identifier (UDI)
information of the primary; thus the secondary server will be able to use the synchronized license from
the primary server when the secondary server is active.
The same Prime Infrastructure license file resides on both the primary and secondary Prime
Infrastructure servers. Because the Prime Infrastructure JVM is only running on the primary or
secondary (not both), the license file is only active on one system at a given point in time.
• Any access control lists imposed between the primary and secondary Prime Infrastructure must
allow traffic to go between the primary and secondary Prime Infrastructure.
• The primary Prime Infrastructure must have a sufficient number of licenses for the devices. When
failover occurs, the secondary Prime Infrastructure uses the licenses of the primary Prime
Infrastructure for the devices.
• A secondary Prime Infrastructure can only support one primary Prime Infrastructure.
• When high-availability is enabled for the first time, synchronizing the servers takes a considerable
amount of time. The time it would take would be in the order of 30 minutes or more depending on
the size of the database.
• During the high-availability registration, ensure that the bandwidth between the primary Prime
Infrastructure and the secondary Prime Infrastructure is 1Gbps.
• Ensure that you remove high-availability from the Prime Infrastructure server before initiating the
high-availability registration.
High-Availability Status
To view high-availability details:
HA Status Description
HA Not Configured High-availability is not configured yet.
Primary Alone The primary Prime Infrastructure is alone and not synchronizing with the
secondary Prime Infrastructure.
HA Initializing High-availability is initializing.
Primary Active The primary Prime Infrastructure is synchronizing with the secondary Prime
Infrastructure without problems.
Primary Lost Secondary The primary Prime Infrastructure has lost connectivity with the secondary
Prime Infrastructure.
Primary Failback A failback to the primary Prime Infrastructure is being done.
Primary Uncertain The primary Prime Infrastructure is uncertain about the state of the
secondary Prime Infrastructure.
Secondary Alone The secondary Prime Infrastructure is alone and not synchronizing with the
primary Prime Infrastructure.
Secondary Syncing The secondary Prime Infrastructure is synchronizing with the primary Prime
Infrastructure without problems.
HA Status Description
Secondary Active High-availability has failed over the primary Prime Infrastructure and the
application is running on the secondary Prime Infrastructure and is active.
Secondary Lost Primary The secondary Prime Infrastructure has lost connectivity with the primary
Prime Infrastructure.
Secondary Failover A failover is being done to the secondary Prime Infrastructure.
Secondary Post A failback is in the post step.
Failback
Secondary Uncertain The secondary Prime Infrastructure is uncertain about the state of the
primary Prime Infrastructure.
Deploying High-Availability
To deploy high-availability on an existing Prime Infrastructure installation:
Step 1 Identify and prepare the hardware to run the secondary Prime Infrastructure.
Step 2 Ensure that network connectivity between the primary and secondary Prime Infrastructure is
functioning, and all necessary ports are open.
Step 3 Install the same version of Prime Infrastructure for the secondary server as was installed for the primary
server.
Step 4 Upgrade the primary Prime Infrastructure and secondary Prime Infrastructure to the new version.
Step 5 Start the primary Prime Infrastructure. All processes start, including the Health Monitor.
Step 6 Configure the high-availability parameters described in the “Configuring High-Availability on the
Primary Prime Infrastructure Server” section on page 8-9.
Step 7 Activate high-availability on the primary Prime Infrastructure. The primary Prime Infrastructure first
copies its database to the secondary Prime Infrastructure and then connects to the secondary. The
following files are copied over from the primary to the secondary Prime Infrastructure:
• DB password file
• All auto provisioning startup config files
• All domain maps
• All history reports that are generated by scheduled report tasks
High-availability deployment is complete. Use https://<piip>:8082 to access the HealthMonitor UI.
Within the HealthMonitor UI, use the authentication key to log in.
You can change the authentication key in Prime Infrastructure, view the current status of the health
monitor, and remove the configuration settings using the command prompt. Enter the following
commands:
• AL-249-HA-PRIM/admin# ncs ha authkey—To update the authentication key for
high-availability.
• AL-249-HA-PRIM/admin# ncs ha remove—To remove the high-availability configuration.
• AL-249-HA-PRIM/admin# ncs ha status—To view the current status of high-availability.
For more information about these commands, see the Command Reference Guide for Cisco Prime
Infrastructure, Release 2.0.
Note When database transaction logs grow to one-third of the database partition disk space, set the database
to standalone mode to prevent transaction logs from growing further. However, a complete netcopy is
required the next time a database synchronization occurs.
Note If the secondary Prime Infrastructure has a multihomed IP address, the first IP address (eth0)
will be registered for high-availability.
Step 4 Enter the authentication key specified during the installation of the secondary Prime Infrastructure.
Step 5 The default admin email address that you configured in Administration > Settings > E-mail Server is
automatically supplied. You can make any necessary changes. Any changes you make to these e-mail
addresses must also be entered in the Secondary SMTP Server section of the Administration > Settings
> Mail Server page.
Note You must enter an email address when configuring high-availability for failure notifications.
Prime Infrastructure tests the email server configuration, and if the test fails (because the mail
server cannot connect), Prime Infrastructure cannot send a failure notification. You can still start
the high-availability registration.
Step 6 From the Failover Type drop-down list, choose either manual or automatic. If you choose manual, you
can trigger the failover operation with a button in the secondary HealthMonitor graphical user interface
or with the URL specified in the email that the administrator receives upon failure of the primary Prime
Infrastructure. If you choose automatic, the secondary Prime Infrastructure initiates a failover on its own
when a failure is detected on the primary.
Step 7 Click Save to retain the configuration and enable high-availability, or click Remove to disable
high-availability and its settings.
The Remove button is only available if high-availability is already configured. While failover is in
progress do not remove HA using CLI.
At this point, the secondary is either reachable with the database, and files are synchronized between
health monitors, or the secondary is unreachable, and an error is returned because secondary installation
did not occur.
Step 1 Install the correct version of Prime Infrastructure on the primary Prime Infrastructure.
Step 2 Start the new primary Prime Infrastructure. All processes start, including the Health Monitor.
Step 3 Ensure that network connectivity between the new primary and secondary is functioning and that all
necessary ports are open.
Step 4 Make sure that the same Prime Infrastructure release that is loaded on the other primary Prime
Infrastructure and secondary Prime Infrastructure is loaded on the new primary Prime Infrastructure.
Note Ensure that the IP address and other configuration settings for the new primary Prime
Infrastructure are the same as they were for the old primary Prime Infrastructure.
Step 5 Launch the Health Monitor web UI of the secondary Prime Infrastructure (Administration > High
Availability > HA Status > Launch Health Monitor).
or
Use https://<piip>:8082 to access the HealthMonitor UI. Within the HealthMonitor UI, use the
authentication key to log in.
Step 6 On the Health Monitor Details page of the secondary Prime Infrastructure, click Failback.
The database and other configuration files are copied from the secondary Prime Infrastructure to the new
primary Prime Infrastructure. The registration of the new primary Prime Infrastructure with the existing
secondary Prime Infrastructure is started. After the primary Prime Infrastructure connects to the
secondary, the Health Monitor on the primary connects to the secondary Health Monitor. They mutually
acknowledge each other and start the monitoring.
• Configure server A as the primary Prime Infrastructure and SSO server, and configure server B as
the secondary Prime Infrastructure. When server A fails, server B, which has the secondary Prime
Infrastructure installed is activated. But the machines that are connected to server A will not be
redirected to server B because the SSO server is also configured in server A that has failed. For all
Prime Infrastructure instances to get redirected to the secondary Prime Infrastructure, the SSO
server must be active. So, you must configure server B as the failback option to the SSO server. If
server B is not configured as the failback option to the SSO server, you will still be able to
authenticate using local authentication but you will not be able to share sessions.
For information about how to add an SSO server, see Adding an SSO Server, page 9-17
You can also define a AAA server for the primary SSO server. For more information about configuring
AAA server mode for an SSO server, see “Configuring SSO Server AAA Mode” section on page 9-17.
When the primary SSO server fails and the secondary SSO server becomes active, the AAA server mode
settings that you configured on the primary SSO server will automatically be configured on the
secondary SSO server.
Figure 8-1 is an example of how to configure an SSO server in the high-availability environment.
D- SSO Server
B- Secondary
Step 1 Install the primary and secondary Prime Infrastructure servers. Ensure that both servers have the same
version of Prime Infrastructure installed.
Step 2 Download the latest software update file (with the extension .ubf) and install the file on the primary
Prime Infrastructure when the high-availability status is Primary Alone. For more information on how
to install software updates, see Downloading Device Support and Product Updates, page 3-9.
Step 3 Restart the primary Prime Infrastructure and complete the high-availability registration between the
primary and secondary Prime Infrastructure.
Step 4 Install the software update file on the secondary Prime Infrastructure.
Note Restarting the secondary Prime Infrastructure is not required because when the failover is
initiated, based on the failover type, the secondary Prime Infrastructure is restarted.
If secondary Prime Infrastructure is in synching state, you can use the Software-Update link in the
HealthMonitor page to launch the software update page. In other states, you will not be able to find the
Software-Update link in HealthMonitor Page. If secondary Prime Infrastructure is in active state, you
can navigate to Admin > Software Update to update the software in secondary server.
Step 1 Install the primary and secondary Prime Infrastructure servers. Ensure that both servers have the same
version of Prime Infrastructure installed.
Step 2 Complete the high-availability registration between the primary and secondary Prime Infrastructure
servers.
Step 3 Download the latest software update file (with the extension .ubf) and install the file on the primary
Prime Infrastructure. For more information on how to install software updates, see Downloading Device
Support and Product Updates, page 3-9.
Step 4 Restart the primary Prime Infrastructure. The secondary Prime Infrastructure will not be in the active
state now because the failover type for the high-availability is configured as manual. The primary Prime
Infrastructure attempts to register with the secondary Prime Infrastructure and the high-availability
registration is completed.
Step 5 Install the software update file on the secondary Prime Infrastructure.
Note Restarting the secondary Prime Infrastructure is not required because when you initiate the
failover, the secondary Prime Infrastructure is restarted.
Step 1 Install the primary and secondary Prime Infrastructure servers. Ensure that both servers have the same
version of Prime Infrastructure installed.
Step 2 Complete the high-availability registration between the primary and secondary Prime Infrastructure
servers.
Step 3 Download the latest software update file (with the extension .ubf) and install the file on the primary
Prime Infrastructure. For more information on how to install software updates, see Downloading Device
Support and Product Updates, page 3-9.
Step 4 Restart the primary Prime Infrastructure. The secondary Prime Infrastructure will be in the active state
now because the failover type for the high-availability is configured as automatic. So, only the health
monitor and database processes in the primary Prime Infrastructure starts.
Step 5 Initiate the failback process.
Step 6 Install the software update file on the secondary Prime Infrastructure before you stop the primary Prime
Infrastructure. When the failover is initiated, the secondary Prime Infrastructure is restarted.
Configuring Redundancy
The term redundancy in the Prime Infrastructure refers to the high-availability framework in controllers.
Redundancy in wireless networks allows you to reduce the downtime of the networks. In a redundancy
architecture, one controller is in the Active state and a second controller is in the Standby state, which
continuously monitors the health of the controller in the Active state through a redundant port. Both
controllers share the same configurations including the IP address of the management interface.
The Standby or Active state of a controller is based on the redundancy stock keeping unit (SKU), which
is a manufacturing ordered unique device identification (UDI). A controller with redundancy SKU UDI
is in the Standby state for the first time when it boots and pairs with a controller that runs a permanent
count license. For controllers that have permanent count licenses, you can manually configure whether
the controller is in the Active state or the Standby state.
In this release, a stateful switchover of access points (AP SSO) is supported. An AP SSO ensures that
the AP sessions are intact even after a switchover.
Note The stateful switchover of clients is not supported, which means that all clients, with the exception of
clients on locally switched WLANs on access points in FlexConnect mode, are deauthenticated and
forced to reassociate with the new controller in the Active state.
Note If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > System >
Interfaces to access the Interfaces list page.
Step 6 Click the redundancy-management interface. The redundancy-management interface details page
appears.
Step 7 In the IP Address field, enter an IP address that belongs to the management interface subnet.
Step 8 Click Save.
Note You can also configure the IP address of the redundancy management in the Global Configuration details
page. From the Lifecycle view, choose Operate > Device Work Center> Device Type > Wireless
Controller > Controller > Configuration > Redundancy > Global Configuration to access the Global
Configuration details page. If you are in the Classic view, choose Configure > Controllers > Ctrl IP
addr > Redundancy > Global Configuration to access the Global Configuration details page.
Note If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > Redundancy
> Global Configuration to access the Global Configuration details page.
Step 6 You must configure the following parameters before you enable the redundancy mode for the primary
controller:
• Redundancy-Management IP—The IP address of the local physical management interface, which
you had configured in the redundancy-management interface details page is displayed. You can also
modify the IP address.
• Peer Redundancy-Management IP—Enter the IP address of the peer redundancy-management
interface.
• Redundant Unit—Choose Primary.
• Mobility MAC Address—Enter the virtual MAC address for the redundancy pair. Ensure that the
mobility MAC address that you enter is the same for both primary and secondary controllers.
Step 7 Click Save. The Enabled check box for the redundancy mode becomes available for editing.
Step 8 Select the Enabled check box for the redundancy mode to enable the redundancy on the primary
controller.
Note After you enable the redundancy, you cannot modify the Redundancy-Management IP, Peer
Redundancy-Management IP, Redundant Unit, and Mobility MAC Address parameters.
Note You cannot configure this controller during the redundancy pair-up process.
Step 9 Click Save. The configuration is saved and the system reboots.
Note If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > Redundancy
> Global Configuration to access the Global Configuration details page.
Step 6 You must configure the following parameters before you enable the redundancy mode for the secondary
controller:
• Redundancy-Management IP—Enter the IP address of the local physical management interface.
This IP address must be the same as the IP address of the peer redundancy-management interface of
the primary controller.
• Peer Redundancy-Management IP—Enter the IP address of the peer physical management interface.
This IP address must be the same as the IP address of the local physical management interface of
the primary controller.
• Redundant Unit—Choose Secondary.
• Mobility MAC Address—Enter the virtual MAC address of the redundancy pair. Ensure that the
mobility MAC address that you enter is the same for both primary and secondary controllers.
Step 7 Click Save. The Enabled check box for the redundancy mode becomes available for editing.
Step 8 Select the Enabled check box for the redundancy mode to enable the redundancy on the secondary
controller.
Note After you enable the redundancy, you cannot modify the Redundancy-Management IP, Peer
Redundancy-Management IP, Redundant Unit, and Mobility MAC Address parameters.
Note You cannot configure the primary controller during the redundancy pair-up process.
Step 9 Click Save. The configuration is saved and the system reboots.
When traps are missed by the Prime Infrastructure, you must run this background task to complete the
following:
Note If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > Redundancy
> Global Configuration to access the Global Configuration details page.
Step 6 In the Peer Service Port IP field, enter the IP address of the peer service port.
Step 7 In the Peer Service Netmask IP field, enter the IP address of the peer service subnet mask.
Step 8 Click Save.
Note If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > Redundancy
> Peer Network Route to access the Peer Network Route list page.
Step 6 From the Select a command drop-down list, choose Add Peer Network Route.
Step 7 Click Go. The Peer Network Route Details page appears.
Step 8 Configure the following fields:
• IP Address—Enter the IP address of the peer network route.
• IP Netmask—Enter the subnet mask of the peer network route.
• Gateway IP Address—Enter the IP address of the peer network route gateway.
Step 9 Click Save. The peer network route is added.
Step 1 Choose Operate > Device Work Center > Device Type > Wireless Controller > Controller.
Step 2 Select the primary server for which you have configured the redundancy-management interface IP
address, then click the Configuration tab.
Step 3 From the left sidebar menu, choose Device Details > Redundancy > Redundancy Commands.
Note If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > Redundancy
> Redundancy Commands.
Note If you are in the Classic view, choose Configure > Controllers > Ctrl IP addr > Redundancy
> Global Configuration to access the Global Configuration details page.
Step 6 Deselect the Enabled check box for the redundancy mode to disable the redundancy on the selected
controller.
Step 7 Click Save. The configuration is saved and the system reboots.
When you disable redundancy on the controller, both active and standby controllers reboot. You must
refresh the configuration from the device to remove any audit mismatches in the redundancy parameters.
The active controller becomes a standalone controller and the standby controller reboots with all the
ports disabled.
Step 1 Choose Administration > Users, Roles & AAA, then click Active Sessions.
Step 2 Click the Audit Trail icon for the username for which you want to see the following data:
Note The audit trail entries could be logged for individual device changes. For example, If a template
is applied on multiple switches, then there will be multiple audit entries for each switch to which
the template has been applied.
Adding Users
You can add a user and assign predefined static roles to that user. Besides complete access, you can give
administrative access with differentiated privileges to certain user groups.
Prime Infrastructure supports user authentication via integration with external TACACS+ and RADIUS
servers (see Configuring AAA on Prime Infrastructure, page 9-15). Note that Prime Infrastructure
supports case-sensitive user names, while TACACS+ and RADIUS do not. If you plan to use external
user authentication, be sure to avoid creating variations of user names that are only distinguished by their
case. For example, if you create Prime Infrastructure users named User, USER and user, Prime
Infrastructure will treat them as three different users, while external AAA servers will validate all three
of them as the same user. If these three users have different privileges, this can lead to security problems.
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Choose Add a User, then click Go.
Step 3 Enter the username, password, and confirm password for the new user, then choose the groups to which
this user belongs.
Step 4 Click the Virtual Domains tab to assign a virtual domain to this user (see User Access in Virtual
Domains, page 9-10), then click Save.
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Select the user whose access you want to disable, then choose Select a command > Lock User(s).
The next time the user tries to log in to Prime Infrastructure, a message appears saying the login failed
because the account is locked.
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Select the user whose password you want to change.
Step 3 Complete the password fields, then click Save.
Related Topics
• Adding Users
Step 1 Choose Administration > Users, Roles & AAA, then click User Groups.
Step 2 Click a group name to change the tasks this group is allowed to perform.
Step 3 Click the Members tab to view the users of this group.
Step 1 Choose Administration > Users, Roles & AAA, then click Local Password Policy.
Step 2 Chose the necessary policies, then click Save.
Step 1 Choose Administration > Users, Roles & AAA, then click User Groups.
Step 2 Click a group name to change the tasks this group is allowed to perform.
Step 3 Click the Members tab to view the users of this group.
Note When the non-root users log in to Prime Infrastructure and try to modify the user preferences,
the “Permission Denied” message appears, which is an expected behavior.
Step 8 Click Edit Alarm Categories to select the alarm categories to display in the Alarm Summary page.
Step 9 In the Select Alarms page, choose the default category to display from the drop-down list, and select
the alarm categories and subcategories to display from the alarm toolbar. Click Save to save the alarm
category list. The selected alarm category and subcategories appear in the User Preferences page.
Step 10 Click Save.
Option Description
Items Per List You can set the number of items, such as controllers or access points, to display in pages that
list these items. Choose the number of items to display from the Items Per List Page
drop-down list.
Use Next Generation Maps Select the check box if you want to use the Next Generation Maps feature.
Logout idle user Select the check box if you want to configure the amount of time, in minutes, that a user
session can be idle before the server cancels the session.
Note If the Logout idle user check box is unselected, the user session does not time out.
Logout idle user after Choose the maximum number of minutes that a server waits for an idle user. The default value
is 60 minutes. The minimum value is 15 minutes. The maximum value is 120 minutes.
Note If the Logout idle user check box is unselected, the user session does not time out.
Refresh Map/Alarms page on Select the check box to refresh map and alarm pages each time a new alarm is generated.
new alarm
Refresh Alarm count in the Choose the frequency of the Alarm Summary refresh from the drop-down list (every 5,
Alarm Summary every seconds, 15 seconds, 30 seconds, 1 minute, 2 minutes, or 5 minutes).
Display Alarm Category in Choose the alarm category that you want to display in the minimized Alarm Summary (Alarm
Alarm Summary page Summary, Malicious AP, Unclassified AP, Coverage Holes, Security, Controllers, Access
Points, Mobility Services, Mesh Links, Prime Infrastructure, or Performance).
Disable Alarm Acknowledge When you acknowledge an alarm, a warning displays as a reminder that a recurrence of the
Warning Message problem does not generate another alarm unless this functionality is disabled. Click this check
box to stop the warning message from displaying.
Choose alarms for Alarm To select alarms for the Alarm Summary Toolbar, click Edit Alarm Categories and choose
Summary Toolbar the required alarm categories and subcategories.
The email address and time zone that you specify in the Virtual Domains page (Administration > Virtual
Domains) are used when scheduling and e-mailing domain specific reports. The scheduled time of the
report can be set to the time zone specific to the virtual domain and the scheduled report can be e-mailed
to the email address specified for the virtual domain. For more information, see the Cisco Prime
Infrastructure 2.0 User Guide.
Virtual domains can be based on physical sites, device types, user communities, or any other designation
you choose.
Before you set up virtual domains, you should determine which users should have access to which sites
and devices in your network.
This section contains the following topics:
• Understanding Virtual Domain Hierarchy, page 9-7
• Creating a Site-Oriented Virtual Domain, page 9-10
Note If the configuration of a controller is modified by multiple virtual domains, complications might arise.
To avoid this, manage each controller from only one virtual domain at a time.
This section describes the effects of partitioning and contains the following topics:
• Reports, page 9-7
• Search, page 9-8
• Alarms, page 9-8
• Templates, page 9-8
• Config Groups, page 9-8
• Maps, page 9-8
• Access Points, page 9-9
• Controllers, page 9-9
• Email Notification, page 9-10
Reports
Reports only include components assigned to the current virtual domain. For example, if you create a
virtual domain with only access points and no controllers assigned, all controllers are not displayed when
you generate a controller inventory report.
If you create a virtual domain with only access points and no controllers assigned, you lose some ability to
choose controller-based features. For example, some options require you to drill down from controller to
access points. Because controllers are not in the virtual domain, you are not able to generate associated
reports.
Reports are only visible in the current virtual domain. The parent virtual domain cannot view the reports
from its subvirtual domain. Client reports such as Client Count only include clients that belong to the
current virtual domain. If new clients are assigned to this partition by the administrator, the previous
reports do not reflect these additions. Only new reports reflect the new clients.
Search
Search results only include components that are assigned to the virtual domain in which the search is
performed. Search results do not display floor areas when the campus is not assigned to the virtual
domain.
The saved searches are only visible in the current virtual domain. The parent virtual domain cannot view
these search results. Prime Infrastructure does not partition network lists. If you search a controller by
network list, all controllers are returned. Search results do not display floor areas when the campus is
not assigned to the virtual domain.
Alarms
When a component is added to a virtual domain, no previous alarms for that component are visible to
that virtual domain. Only new alarms are visible. For example, when a new controller is added to a
virtual domain, any alarms generated for that controller prior to its addition do not appear in the current
virtual domain.
Alarms are not deleted from a virtual domain when the associated controllers or access points are deleted
from the same virtual domain.
Note Alarm Email Notifications—Only the ROOT-DOMAIN virtual domain can enable Location
Notifications, Location Servers, and Prime Infrastructure email notification.
Templates
When you create or discover a template in a virtual domain, it is only available to that virtual domain
unless it is applied to a controller. If it is applied to a controller and that controller is assigned to a
subvirtual domain, the template stays with the controller in the new virtual domain.
Note If you create a subvirtual domain and then apply a template to both network elements in the virtual
domain, Prime Infrastructure might incorrectly reflect the number of partitions to which the template
was applied.
Config Groups
Config groups in a virtual domain can also be viewed by the parent virtual domain. A parent virtual
domain can modify config groups for a sub (child) virtual domain. For example, the parent virtual
domain can add or delete controllers from a subvirtual domain.
Maps
You can only view the maps that your administrator assigned to your current virtual domain.
• When a campus is assigned to a virtual domain, all buildings in that campus are automatically
assigned to the same virtual domain.
• When a building is assigned to a virtual domain, it automatically includes all of the floors associated
with that building.
• When a floor is assigned, it automatically includes all of the access points associated with that floor.
If only floors are assigned to a virtual domain, you lose some ability to choose map-based features. For
example, some reports and searches require you to drill down from campus to building to floor. Because
campuses and buildings are not in the virtual domain, you are not able to generate these types of reports
or searches.
Coverage areas shown in Prime Infrastructure are only applied to campuses and buildings. In a floor-only
virtual domain, Prime Infrastructure does not display coverage areas. If a floor is directly assigned to a
virtual domain, it cannot be deleted from the virtual domain which has the building to which the floor
belongs.
Note Search results do not display floor areas when the campus is not assigned to the virtual domain.
Access Points
When a controller or map is assigned to a virtual domain, the access points associated with the controller
or map are automatically assigned as well. Access points can also be assigned manually (separate from
the controller or map) to a virtual domain.
If the controller is removed from the virtual domain, all of its associated access points are also removed.
If an access point is manually assigned, it remains assigned even if its associated controller is removed
from the current virtual domain.
If you create a virtual domain with only access points and no controllers assigned, you lose some ability
to choose controller-based features. For example, some options require you to drill down from controller
to access points. Because controllers are not in the virtual domain, you are not able to generate associated
reports.
If a manually added access point is removed from a virtual domain but is still associated with a controller
or map that is assigned to the same virtual domain, the access point remains visible in the virtual domain.
Any alarms associated with this access point are not deleted with the deletion of the access point.
When maps are removed from a virtual domain, the access points on the maps can be removed from the
virtual domain.
Note If you later move an access point to another partition, some events (such as generated alarms) might
reside in the original partition location.
Rogue access point partitions are associated with one of the detecting access points (the one with the
latest or strongest RSSI value). If there is detecting access point information, Prime Infrastructure uses
the detecting controller.
If the rogue access point is detected by two controllers which are in different partitions, the rogue access
point partition might be changed at any time.
Controllers
Because network elements are managed hierarchically, controllers might be affected by partitioning. If
you create a virtual domain with only access points and no controllers assigned, you lose some ability to
choose controller-based features. For example, some options require you to drill down from controller to
access points. Because controllers are not in the virtual domain, you are not able to generate associated
reports.
If you create a partition with only a few controllers, choose Configure > Access Points, and click an
individual link in the AP Name column, the complete list of Prime Infrastructure-assigned controllers is
displayed for primary, secondary, and tertiary controllers rather than the limited number specified in the
partition.
Note If a controller configuration is modified by multiple virtual domains, complications might arise. To avoid
this, manage each controller from only one virtual domain at a time.
Email Notification
Email notification can be configured per virtual domain. An email is sent only when alarms occur in that
virtual domain.
If there is only one virtual domain defined (“root”) in the system AND the user does not have any virtual
domains in the custom attributes fields in the TACACS+/RADIUS server, the user is assigned the “root”
virtual domain by default. If there is more than one virtual domain, and the user does not have any
specified attributes, then the user is blocked from logging in.
This section contains the following topics:
• Adding Users to Virtual Domains, page 9-11
• Adding Sites and Devices to Virtual Domains, page 9-11
• Changing Virtual Domain Access, page 9-12
• Virtual Domain RADIUS and TACACS+ Attributes, page 9-13
Note When using external AAA, be sure to add the custom attributes for virtual domains to the appropriate
user or group configuration on the external AAA server.
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Click the user you want to add to a virtual domain.
Step 3 Click the Virtual Domains tab.
Step 4 Move the virtual domain to which you want to add the user from the Available Virtual Domains column
to the Selected Virtual Domains column, then click Save.
Note Each virtual domain may contain a subset of the elements included with its parent virtual
domain. When a user is assigned a virtual domain, that user can view the devices that are
assigned to its virtual domain.
Step 3 Move the sites and devices from the Available to the Selected column, then click Submit.
Note Because all maps, controllers, and access points are included in the partition tree, it takes several
minutes to load. This time increases if you have a system with a significant number of controllers
and access points.
Step 3 Click the applicable Site Maps, Controller, Access Points, or Wired Devices tab.
Step 4 In the Available (Site Maps, Controllers, Access Points, or Wired Devices) column, click to highlight
the new component(s) you want to assign to the virtual domain. Click Add to move the component(s) to
the Selected (Site Maps, Controllers, Access Points, or Wired Devices) column.
Note To remove a component from the virtual domain, click to highlight the component in the
Selected (Site Maps, Controllers, Access Points, or Wired Devices) column, and click Remove.
The component returns to the Available column.
Note If you delete a switch, a controller, or an autonomous AP from the ROOT-DOMAIN, the device
is removed from Prime Infrastructure. If the device is explicitly associated with the
ROOT-DOMAIN or any other virtual domain that is not the child of the current virtual domain
and if you delete the device from the current virtual domain, the device is removed from this
virtual domain but it is not removed from Prime Infrastructure.
After assigning elements to a virtual domain and submitting the changes, Prime Infrastructure might take
some time to process these changes depending on how many elements are added.
Note If you want to specify virtual domains on a per-user basis, then you need to make sure you add
all of the custom attributes (for example, tasks, roles, virtual domains) information to the User
custom attribute page.
Note For more information on adding RADIUS and TACACS+ attributes to the ACS server, see the “Adding
Prime Infrastructure User Groups into ACS for TACACS+” section on page 9-23 or the “Adding Prime
Infrastructure User Groups into ACS for RADIUS” section on page 9-25.
Step 1 Choose Administration > Users, Roles & AAA, then click User Groups.
Step 2 Click the Audit Trail icon corresponding to the user group name for which you want to see the audit
data. The Configuration Changes field provides a Details link if there are any configuration changes.
Click the Details link for more information on the configuration changes done by an individual user.
Note The audit trail entries could be logged for individual device changes. For example, If a template
is applied on multiple switches, then there will be multiple audit entries for each switch to which
the template has been applied.
Note For Application Audit, the User Group column is blank for TACACS+/RADIUS users.
Note If you add more than one server, user authentication is validated for the second server, only if the first
server is not reachable or it has any network problems.
Note You can use alphabets, numbers, and special characters except ‘ (single quote) and “ (double quote)
while entering shared secret key for a third-party TACACS+ or RADIUS server.
To specify a TACACS+ server and then change the AAA mode to TACACS+:
Step 1 Add a TACACS+ Server. For more information, see Adding a TACACS+ Server, page 9-16.
Step 2 Click AAA Mode.
Step 3 Select TACACS+.
Step 4 Select the Enable Fallback to Local check box if you want to use the local database when the external
AAA server is down.
Note If you choose ONLY on no server response, the fallback to local Prime Infrastructure user
accounts occurs only when the external server is unreachable or has any network problems. If
you choose on authentication failure or no server response, the fallback to local Prime
Infrastructure user accounts occurs when the external server is unreachable or has network
problems or there is an authentication failure in the external server.
Step 1 Choose Administration > Users, Roles & AAA, then click TACACS+.
Step 2 From the command pull-down menu, choose Add TACACS+ Server, then click Go.
Step 3 Enter the TACACS+ server information, then click Save.
Note For Prime Infrastructure to communicate with the TACACS+ server, the shared secret you enter
on this page must match the shared secret configured on the TACACS+ server.
Related Topic
• Required TACACS+/RADIUS Configurations After Prime Infrastructure IP Address Changes
Step 1 Choose Administration > Users, Roles & AAA, then click RADIUS Servers.
Step 2 Choose Add Radius Server, then click Go.
Step 3 Enter the RADIUS server information, then click Save.
Note For Prime Infrastructure to communicate with the RADIUS server, the shared secret you enter
on this page must match the shared secret configured on the RADIUS server.
Related Topic
• Required TACACS+/RADIUS Configurations After Prime Infrastructure IP Address Changes
Related Topics
• Adding a TACACS+ Server
• Adding a RADIUS Server
Note Before setting up SSO, you must have an SSO configured server. For information about configuring SSO
Server AAA Mode, see “Configuring SSO Server AAA Mode” section on page 9-17.
Step 1 Choose Administration > Users, Roles & AAA, then click SSO Servers.
Step 2 Choose Add SSO Server, then click Go.
Step 3 Enter the SSO server information, then click Save.
Note The number of retries allowed for the SSO server authentication request is from 0 to 3.
Note As Prime Infrastructure does not support CA certificates and self-signed certificates in Java, SSO
requires accurate DNS configuration. So, you must define the DNS with fully qualified domain name
(FQDN). For example, the nslookup command and expected data when configuring DNS with FQDN is:
hostname CUSTOMER_PI_HOSTNAME
nslookup CUSTOMER_PI_HOSTNAME
Server: ..
Address: ...
Name: CUSTOMER_PI_HOSTNAME.company.com
Address: ….
Step 1 Choose Administration > Users, Roles & AAA, then click SSO Server AAA Mode.
Step 2 Choose which SSO Server AAA mode you want to use. Only one can be selected at a time.
Any changes to local user accounts are effective only when you are configured for local mode (the
default). If you use remote authentication, changes to the credentials are made on a remote server. The
two remote authentication types are RADIUS and TACACS+. RADIUS requires separate credentials for
different locations (East and West Coast). TACACS+ is an effective and secure management framework
with a built-in failover mechanism.
Step 3 Select the Enable Fallback to Local check box if you want the administrator to use the local database
when the external SSO AAA server is down.
This check box is unavailable if Local was selected as the SSO Server AAA Mode type.
Step 4 Click OK.
Step 1 Add Prime Infrastructure as a AAA client in ISE. For more information, see the “Adding Prime
Infrastructure as an AAA Client in ISE” section on page 9-19.
Step 2 Create a new User group in ISE. For more information, see the “Creating a New User Group in ISE”
section on page 9-19.
Step 3 Create a new User in ISE and add that User to the User group created in ISE. For more information, see
the “Creating a New User and Adding to a User Group in ISE” section on page 9-19.
Step 4 Create a new Authorization profile. For more information, see the “Creating a New Authorization Profile
in ISE” section on page 9-20.
Step 5 Create an Authorization policy rule. For more information, see the “Creating an Authorization Policy
Rule in ISE” section on page 9-20.
Step 6 Create an Authentication policy. For more information, see the “Creating a Simple Authentication Policy
in ISE” section on page 9-21 or the “Creating a Rule-Based Authentication Policy in ISE” section on
page 9-21.
Step 7 Configure AAA in Prime Infrastructure. For more information, see the “Configuring AAA in Prime
Infrastructure” section on page 9-22.
Step 1 Choose ISE > Administration > Identity Management > Identities.
Step 2 From the left sidebar menu, choose Identities > Users, then click Add.
Step 3 Enter the username and password and reenter the password for the user.
Step 4 Choose the required user group from the User Group drop-down list, then click Save.
Note You can also integrate ISE with external sources such as Active Directory and Lightweight
Directory Access Protocol (LDAP).
Step 1 Choose ISE > Policy > Policy Elements > Results.
Step 2 From the left sidebar menu, choose Authorization > Authorization Profiles, then click Add.
Step 3 Enter the name and description for the profile.
Step 4 Choose ACCESS_ACCEPT from the Access Type drop-down list.
Step 5 In the Advanced Attribute Settings group box, add Prime Infrastructure User Group RADIUS custom
attributes one after another along with the virtual domain attributes at the end.
User Group RADIUS custom attributes are located in Prime Infrastructure at Administration > Users,
Roles & AAA > User Groups. Click Task List for the group with appropriate permissions.
a. Select cisco - av - pair and paste Prime Infrastructure User Group RADIUS custom attribute next
to it. Keep adding one after another.
b. Add the Virtual Domain attribute at the end of the last RADIUS custom attribute for each group (for
RADIUS custom attributes, see Virtual Domain RADIUS and TACACS+ Attributes).
Step 6 Save the authorization profile.
Related Topics
Simple Authentication Policies in the Cisco Identity Services Engine User Guide, Release 1.2
Related Topics
Rule-Based Authentication Policies in the Cisco Identity Services Engine User Guide, Release 1.2
Step 1 Log in to Prime Infrastructure as root, then choose Administration > Users, Roles & AAA > RADIUS
Servers.
Step 2 Add a new RADIUS server with the ISE IP address, then click Save.
Step 3 Log in to ISE, then choose Administration > AAA > AAA Mode Settings.
Step 4 Select RADIUS as the AAA mode, then click Save.
Step 5 Log off of Prime Infrastructure.
Step 6 Log in again to Prime Infrastructure as an AAA user defined in ISE.
For example, log in as user ncs-sysmon.
For more information about creating users in ISE, see the “Creating a New User and Adding to a User
Group in ISE” section on page 9-19.
Adding Prime Infrastructure to an ACS Server for Use with TACACS+ Server
To add Prime Infrastructure to a TACACS+ server:
Note The instructions and illustrations in this section pertain to ACS Version 4.1 and might vary slightly for
other versions or other vendor types. See the Cisco Secure ACS documentation or the documentation for
the vendor you are using.
Step 1 Click Add Entry in the Network Configuration page of the ACS server.
Step 2 In the AAA Client Hostname text box, enter the Prime Infrastructure hostname.
Step 3 Enter the Prime Infrastructure IP address in the AAA Client IP Address text box.
Ensure the interface that you use for ACS is the same as that is specified in Prime Infrastructure and it
is reachable.
Step 4 In the Shared Secret text box, enter the shared secret that you want to configure on both Prime
Infrastructure and ACS servers.
Step 5 Choose TACACS+ in the Authenticate Using drop-down list.
Step 6 Click Submit + Apply.
Step 7 From the left sidebar menu, choose Interface Configuration.
Step 8 In the Interface Configuration page, click the TACACS+ (Cisco IOS) link.
The TACACS+ (Cisco IOS) Interface Configuration page appears.
Step 9 In the New Services portion of the page, add NCS in the Service column heading.
Step 10 Enter HTTP in the Protocol column heading.
Step 11 Select the check box in front of these entries to enable the new service and protocol.
Note The ACS 4.x configuration is complete only when you specify and enable NCS service with
HTTP protocol.
Note When you upgrade Prime Infrastructure, you must readd any permissions on the TACACS+ or
RADIUS server and update the roles in your TACACS+ server with the tasks from the Prime
Infrastructure server.
Note To enable TACACS+ in Prime Infrastructure, see the “Adding a TACACS+ Server” section on
page 9-16.
Note You must add a virtual domain in ACS when exporting the task list to ACS. This might be the
default ROOT-DOMAIN virtual domain. For more information on virtual domains, see the
“Using Virtual Domains to Control Access to Sites and Devices” section on page 9-6.
Note Ensure the interface that you use for ACS is the same you specified in Prime Infrastructure and
it is reachable.
Step 5 In the Shared Secret text box, enter the shared secret that you want to configure on both Prime
Infrastructure and ACS servers.
Step 6 Choose RADIUS (Cisco IOS/PIX 6.0) from the Authenticate Using drop-down list.
Step 7 Click Submit + Apply.
You can now associate ACS users with this ACS group.
Note To enable RADIUS in Prime Infrastructure, see the “Adding a RADIUS Server” section on
page 9-16.
Note From Prime Infrastructure Release 1.0 and later, you are required to add a virtual domain in ACS
when exporting the task list to ACS. This might be the default ROOT-DOMAIN virtual domain.
For more information on virtual domains, see the “Using Virtual Domains to Control Access to
Sites and Devices” section on page 9-6.
Note When you upgrade Prime Infrastructure, any permissions on the TACACS+ or RADIUS server
must be readded.
Note When you upgrade Prime Infrastructure, any permissions on the TACACS+ or RADIUS server
must be readded.
Note To enable RADIUS in Prime Infrastructure, see the “Adding a RADIUS Server” section on
page 9-16. For information on adding Prime Infrastructure virtual domains into ACS for
TACACS+, see the “Virtual Domain RADIUS and TACACS+ Attributes” section on page 9-13.
Note You must add a virtual domain in ACS when exporting the task list to ACS. This might be the
default ROOT-DOMAIN virtual domain. For more information on virtual domains, see the
“Using Virtual Domains to Control Access to Sites and Devices” section on page 9-6.
Adding Prime Infrastructure to a Non-Cisco ACS Server for Use with RADIUS
When you use a RADIUS server to log in to Prime Infrastructure, the AAA server sends back an
access=accept message with a user group and a list of available tasks, after the username and password
were verified. The access=accept message comes back as a fragmented packet because of the large
number of tasks in some user groups. You can look in the following file to see the tasks associated with
a given user group: C:\Program Files\Prime
Infrastructure\webnms\webacs\WEB-INF\security\usergroup-map.xml. The tasks are passed back as a
vendor specific attribute (VSA), and Prime Infrastructure requires authorization information using the
VSA (IETF RADIUS attribute number 26). The VSA contains Prime Infrastructure RADIUS task list
information.
The content of the VSA is as follows:
• Type = 26 (IETF VSA number)
• Vendor Id = 9 (Cisco vendor ID)
• Vendor Type = 1 (Custom attributes)
• Vendor Data = Prime Infrastructure task information (for example Prime Infrastructure: task0 =
Users and Group)
Each line from Prime Infrastructure RADIUS task list should be sent in its own RADIUS VSA.
In the data portion of the access=access packet, the truncated output sometimes shows only one role sent
back for an Admin user group login. The tasks associated with the role start with task0 and increment
with task1, task2, and so on. Table 9-3 defines what these attributes in the access=access packet example
signify.
0000 06 6d 0e 59 07 3d 6a 24 02 47 07 35 d2 12 a4 eb .m.Y.=j$G.5...
0010 a2 5a fa 84 38 20 e4 e2 3a 3a bc e5 1a 20 00 00 .Z..8..::..
0020 00 09 01 1a 57 69 72 65 6c 65 73 73 2d 57 43 53 ....Prime Infrastructure
0030 3a 72 6f 6c 65 30 3d 41 64 6d 69 6e 1a 2b 00 00 :role0=Admin.+...
0040 00 09 01 25 57 69 72 65 6c 65 73 73 2d 57 43 53 ...%Prime Infrastructure
0050 3a 74 61 73 6b 30 3d 55 73 65 72 73 20 61 6e 64 :task0=Users and
0060 20 47 72 6f 75 70 73 1a 27 00 00 00 09 01 21 57 Groups.”....!W
0070 69 72 65 6c 65 73 73 2d 57 43 53 3a 74 61 73 6b Prime Infrastructure:task
0080 31 3d 41 75 64 69 74 20 54 72 61 69 6c 73 xx xx 1=Audit Trails.*
Attribute Description
1a (26 in decimal) Vendor attribute
2b (43 bytes in decimal) Length as the total number of bytes to skip and still reach the next TLV (for
task0, Users and Groups)
4-byte field Vendor Cisco 09
01 Cisco AV pair - a TLV for Prime Infrastructure to read
25 (37 bytes in decimal) Length
hex text string Prime Infrastructure:task0=Users and Groups
The next TLV until the data portion is completely processed
255.255.255.255 TLV: RADIUS type 8 (framed IP address)
Type 35 (0x19) A class, which is a string
Type 80 (0x50) Message authenticator
Step 1 Choose Network Resources > Network Devices and AAA Clients.
Step 2 Enter an IP address.
Adding Groups
To add groups:
Adding Users
To add users:
Step 1 Choose Users and Identity Stores > Internal Identity Stores > Users.
Step 2 Add a user, and then map to group to that user.
Step 1 Choose Policy Elements > Authorization and Permissions > Network Access > Authorization
Profiles, then click Create.
Step 2 Enter the required information, then click Submit.
Step 1 Choose Policy Elements > Authorization and Permissions > Device Administration > Shell Profiles,
then click Create.
Step 2 Enter the required information, then click Submit.
Step 1 Choose Access Policies > Access Services > Service Selection Rules, then click Create.
Step 2 Enter the required information, then click OK.
Step 1 Choose Access Policies > Access Services > Service Selection Rules, then click Create.
Step 2 Enter the required information, then click OK.
Step 1 Log in to the ACS 5.x server and choose Access Policies > Access Services > Default Network Access.
Step 2 On the General tab, click the policy structure you want to use. By default, all the three policy structures
are selected.
Step 3 From the Allowed Protocols, click the protocols you want to use.
Note You can retain the defaults for identity and group mapping.
Step 4 To create an authorization rule for RADIUS, choose Access Policies > Access Services > Default
Network Access > Authorization, then click Create.
Step 5 In Location, click All Locations or you can create a rule based on the location.
Step 6 In Group, select the group that you created earlier.
Step 7 In Device Type, click All Device Types or you can create a rule based on the Device Type.
Step 8 In Authorization Profile, select the authorization profile created for RADIUS, click OK, then click Save.
Step 1 Choose Access Policies > Access Services > Default Device Admin.
Step 2 On the General tab, click the policy structure you want to use. By default, all the three are selected.
Similarly, in Allowed Protocols, click the protocols you want to use.
Note You can retain the defaults for identity and group mapping.
Step 3 To create an authorization rule for TACACS+, choose Access Policies > Access Services > Default
Device Admin > Authorization, then click Create.
Step 4 In Location, click All Locations, or you can create a rule based on the location.
Step 5 In Group, select the group that you created earlier.
Step 6 In Device Type, click All Device Types, or you can create a rule based on the Device Type.
Step 7 In Shell Profile, select the shell profile created for TACACS+, click OK, then click Save.
Cisco Prime Infrastructure consumes a lot of information from various different sources, including
NAM, NetFlow, NBAR, medianet, PerfMon, and Performance Agent. The following table depicts the
sources of the data for the site dashlets used by Prime Infrastructure:
The following table shows how Prime Infrastructure populates the application-specific dashlets:
DSCP Classification y _ y _ _
Number of Clients Over Time y _ y _ _
Top Application Traffic Over Time y _ y _ _
Top N Applications y _ y y _
Top N Clients (In and Out) y _ y y _
Average Packet Loss y y _ _ _
Client Conversations y _ y _ _
Client Traffic y _ y _ _
IP Traffic Classification y _ y _ _
Top N Applications y _ y _ _
DSCP Classification y _ y _ _
RTP Conversations Details y y _ _ _
Top N RTP Streams y y _ _ _
Voice Call Statistics Y y _ _ _
Worst N RTP Streams by Jitters y y _ _ _
Worst N RTP Streams by MOS y _ _ _ _
Worst N Sites by MOS y _ _ _ _
Worst N Site to Site Connections y y _ y _
by KPI
Step 1 Choose Design > Configuration > Monitor Configuration > Features > NetFlow.
Step 2 Select one of the NetFlow templates, enter the appropriate details, and save the template. Your new
template will be stored in My Templates.
Step 3 Choose Deploy > Monitoring Deployment and deploy the template you just created. After a couple of
polling cycles, dashlets should start populating the data.
WAN Optimization
Cisco Wide Area Application Services (WAAS) devices and software help you to ensure high-quality
WAN end-user experiences across applications at multiple sites. For various scenarios for deploying
WAAS in your network, see:
http://wwwin.cisco.com/dss/adbu/waas/collateral/Using NAM in a WAAS Deployment.pdf
After you have deployed your WAAS changes at candidate sites, you can navigate to Operate >
Monitoring Dashboards > Detail Dashboards > WAN Optimization to validate the return on your
optimization investment. From this dashboard, you can click:
• View Multi-Segment Analysis to monitor WAAS-optimized WAN traffic.
• Conversations to see individual client/server sessions.
• Site to Site to see aggregated site traffic.
The following table describes the key WAAS monitoring dashlets:
Dashlet Description
Average Concurrent Connections (Optimized Graphs the average number of concurrent client and
versus Pass-through) pass-through connections over a specified time
period.
Multi-segment Analysis Displays WAAS traffic across multiple segments in
a conversation or between sites.
Multi-segment Network Time (Client Graphs the network time between the multiple
LAN-WAN - Server LAN) segments.
Transaction Time (Client Experience) Graphs average client transaction times (in
milliseconds) for the past 24 hours, with separate
lines for optimized traffic and pass-through traffic
(in which optimization is disabled). With
optimization enabled, you should see a drop in the
optimized traffic time when compared to the
pass-through time.
Traffic Volume and Compression Ratio Graphs the bandwidth reduction ratio between the
number of bytes before compression and the number
of bytes after compression.
The Administration > Licenses page allows you to manage Prime Infrastructure, wireless LAN
controllers, and Mobility Services Engine (MSE) licenses.
Although Prime Infrastructure and MSE licenses can be fully managed from the Administration >
Licenses page, you can only view Wireless LAN Controller (WLC). You must use WLC or Cisco
License Manager (CLM) to manage WLC licenses.
Tip To learn more about Prime Infrastructure licensing, go to Cisco.com to watch a multimedia presentation.
Here you can also find the learning modules for a variety of Prime Infrastructure topics. In future
releases, we will add more overview and technical presentations to enhance your learning.
• Include all the devices in your network that you want to manage using Prime Infrastructure.
To ensure you have the licenses to achieve these goals, do the following:
1. Familiarize yourself with the types of license packages available to you, and their requirements. See
Purchasing a Prime Infrastructure License, page 11-2.
2. View the existing licenses. See Verifying License Details, page 11-3 for help on ordering and
downloading licenses.
3. Calculate the number of licenses you will need, based both on the package of features you want and
the number of devices you need to manage. See Managing License Coverage, page 11-3
4. Add new licenses. See Adding Licenses, page 11-4.
5. Delete existing licenses. See Deleting Licenses, page 11-4.
If you are already using the Prime Infrastructure or any other network management product and you plan
to extend your device coverage, see Managing License Coverage, page 11-3.
You can order a single base license, then purchase additional Assurance licenses as necessary.
Assurance licenses are available in bundle sizes of 25, 50, 100, 500, 1000, 2500, 5000, and 10,000
devices and can be combined.
• Collector License—The Collector license is based on NetFlow processing in flows per second. By
default, the Assurance license provides a Collector license to process NetFlow for up to 20,000
flows per second. You can also purchase a Collector license to support up to 80,000 flows per
second.
Note When you see a warning message as ‘Base license is missing’ or ‘Multiple base licenses present, use
only one’ under Administration > Licenses > Files > License Files, you can ignore the warning and
proceed.
Note If you are using LMS, you need to migrate existing data from the previous installation to the new Prime
Infrastructure installation. For more details on data that can be exported from LMS 4.2.x to PI 2.0, see
Migrating Data from Cisco Prime LMS to Cisco Prime Infrastructure, page 6-15
Adding Licenses
You need to add new licenses when:
• You have purchased a new Prime Infrastructure license.
• You are already using Prime Infrastructure and have bought additional licenses.
• You are upgrading to Prime Infrastructure, see Managing License Coverage, page 11-3.
To add a new license:
Deleting Licenses
When you delete licenses from Prime Infrastructure, all licensing information is removed from the
server. Make a copy of your original license file in case you want to add it again later. There are several
reasons you might want to delete licenses:
• You installed temporary licenses and want to delete them before applying your permanent licenses.
• You want to move your licenses to a different server. You must first delete the licenses from the
original server, then send an email to licensing@cisco.com requesting a re-host for your licenses.
You can then apply the re-hosted licenses to the new server.
To delete a license file:
Troubleshooting Licenses
To troubleshoot licenses, you will need to get details about the licenses that are installed on your system.
Click Help > About Prime Infrastructure to access your license information.
Controller Licensing
If you choose Files > Controller Files from the left sidebar menu, you can monitor the controller licenses.
Note Prime Infrastructure does not directly manage controller licenses, rather it simply monitors the licenses.
To manage the licenses you can use command-line interface (CLI) commands, Web UI, or Cisco License
Manager (CLM).
Note You can have both a WPlus and Base license, but only one can be active at any given time.
Note Types other than Permanent display the number of days left until the license expires.
Licenses not currently in use do not have their counts reduced until they become “In Use.”
• Status
– In Use—The license level and the license are in use.
– Inactive—The license level is being used, but this license is not being used.
– Not In Use—The license level is not being used and this license is not currently recognized.
– Expired In Use—The license is being used, but is expired and will not be used upon next reboot.
– Expired Not In Use—The license has expired and can no longer be used.
– Count Consumed—The ap-count license is In Use.
Note If you need to filter the list of license files, you can enter a controller name, feature, or type and click Go.
MSE Licensing
The MSE packages together multiple product features related to network topology, design such as
NMSP, Network Repository along with related Service Engines, and application processes, such as the
following:
• Context-Aware Service
• Wireless Intrusion Prevention System (WIPS)
To enable smooth management of MSE and its services, various licenses are offered.
Note You must have a Cisco Prime Infrastructure license to use MSE and its associated services.
wIPS 3000 access points 2000 access points Validity 60 days, 20 access
points.
The second word of the first line defines the specific component to be licensed. For example, MSE,
LOCATION_TAG. The third word depicts the vendor of the license, for example Cisco. The fourth word
denotes the version of the license, for example 1.0. The fifth word denotes the expiration date; this can
be permanent for licenses that never expire or a date in the format dd-mm-yyyy. The last word defines
whether this license is counted.
Note Limits for individual services differ. For example, a low-end mobility services engine
(MSE-3310) tracks a total of 2,000 CAS elements; a high-end mobility services engine
(MSE-3350) tracks a total of 25,000 CAS elements.
A low-end mobility services engine has a maximum limit of 2000 wIPS elements; a high-end
mobility services engine has a maximum limit of 3000 wIPS elements.
Note Because tag licenses are added and managed using appropriate vendor applications, tag licenses
are not displayed in this page. Refer to the following URL for more information:
http://support.aeroscout.com.
Evaluation (demo) licenses are also not displayed.
Tag licenses are installed using the AeroScout System Manager only if the tags are tracked using Partner
engine. Otherwise the tags will be counted along with the CAS element license.
• MSE License File—Indicates the MSE License.
• MSE—Indicates the MSE name.
• Type—Indicates the type of mobility services engine (client elements, wIPS local mode or wIPS
monitor mode access points).
• Limit—Displays the total number of client elements or wIPS monitor mode access points licensed
across the mobility services engine.
• License Type—Permanent licenses are the only license types displayed on this page.
– Permanent—Licenses are node locked and have no usage period associated with them. They are
issued by Cisco licensing portal and must be installed using management interfaces on the
device. Upon installation of these licenses, you have the necessary permissions across different
versions.
Note Tag PAKs are registered with AeroScout. To register your tag PAK, go to this URL:
http://www.aeroscout.com/content/support
To register a product authoritative key (PAK) and obtain a license file for installation:
Note You can also access this site by clicking the Product License Registration link located on the
License Center page of Prime Infrastructure.
Note If the license is incorrect, click the TAC Service Request Tool link to report the problem.
Step 4 At the Designate Licensee page, enter the mobility service engine UDI in the host ID text box. This is
the mobility services engine on which the license will be installed.
Note UDI information for a mobility services engine is found in the General Properties group box at
Services > Mobility Services Engine > Device Name > System.
Step 5 Select the Agreement check box. Registrant information appears beneath the Agreement check box.
Modify information as necessary.
Note Ensure that the phone number does not include any characters in the string for the registrant and
end user. For example, enter 408 555 1212 rather than 408.555.1212 or 408-555-1212.
Step 6 If registrant and end user are not the same person, select the Licensee (End-User) check box beneath
registrant information and enter the end-user information.
Step 7 Click Continue.
Step 8 At the Finish and Submit page, review registrant and end-user data. Click Edit Details to correct
information, if necessary, then click Submit.
Note Tag licenses are installed using the AeroScout System Manager. Refer to the following URL for
additional information:
http://support.aeroscout.com.
To add a client or wIPS license to Prime Infrastructure after registering the PAK:
Note Verify that the UDI of the selected mobility services engine matches the one you entered when
registering the PAK.
Step 5 Enter the license file in the License File text box or browse to the applicable license file.
Step 6 Once displayed in the License File text box, click Upload. Newly added license appears in mobility
services engine license file list.
Note A Context Aware Service (CAS) restarts if a client or tag license is installed; a wIPS service
restarts if a wIPS license is installed.
Note Services must come up before attempting to add or delete another license.
Step 1 From the License Center > Files > MSE Files page, select the check box of the mobility services engine
license file that you want to delete.
Step 2 Click Delete, then click OK to confirm the deletion.
Assurance Licensing
As explained in Purchasing a Prime Infrastructure License, page 11-2, licenses for Assurance features
are based on the number of NetFlow-monitored devices and Network Analysis Module (NAM) data
collection-enabled devices you have in your network. You manage, verify, and troubleshoot Assurance
licenses much as you do with other feature licenses, as explained in Adding Licenses, page 11-4,
Deleting Licenses, page 11-4 and Troubleshooting Licenses, page 11-4.
In addition to these functions, Prime Infrastructure also lets you choose which NetFlow and NAM
devices you want to manage using Assurance features. For example, if you have only 50 Assurance
feature licenses and more than 50 NetFlow and NAM devices, you can choose to manage only your most
critical devices. If you later purchase additional Assurance licenses, you can add license coverage for
the devices previously left unmanaged.
To see Choose
The NetFlow-enabled devices in your network that are under Administration > Licenses > Summary.
Assurance management, as a percentage of the total number of
Assurance licenses you have.
The total number of Assurance licenses you have and the files Administration > Licenses > Files.
associated with them.
A list of the devices sending NetFlow or NAM polling data to Prime Administration > Licenses > Assurance License
Infrastructure. Manager
The number of Assurance Licenses in use.
The maximum number of Assurance licenses available to you.
By default, the total count of Assurance licenses on the Assurance License Manager, Summary and Files
pages are always updated whenever you add or delete Assurance licenses. However, note that adding or
deleting Assurance licenses is a System Defined Job, which runs automatically once every 12 hours. So
it can take up to 12 hours for the Summary, and Assurance License Manager pages to show added or
deleted Assurance licenses.
In addition to Administration > Licenses > Assurance License Manager, you can always access the
Assurance License Manager page using the Assurance License Manager link in the upper right corner
of the Summary and Files pages.
Step 1 Choose Administration > Licenses > Assurance License Manager. Prime Infrastructure displays the
list of devices currently under Assurance management. It also displays the total number of Assurance
licenses you have, and the total number of devices under Assurance management.
Step 2 Select the check box next to each device you want to remove from Assurance management, then click
Remove Device.
Prime Infrastructure supports tracing Real-Time Transport Protocol (RTP) and TCP application traffic
paths across endpoints and sites. Tracing data paths depends on Cisco medianet and Web Services
Management Agent (WSMA). Both are built-in features of Cisco IOS and Catalyst IOS software images
that help isolate and troubleshoot problems with RTP and TCP data streams. Prime Infrastructure
supports all versions of medianet and WSMA and makes it easy to enable them on any router.
Where Cisco Network Analysis Module (NAM) traffic monitoring data is not available, Prime
Infrastructure supports RTP service path tracing (mediatrace) using Medianet Performance Monitor and
Cisco IOS NetFlow. When properly configured, mediatrace can be your most valuable tool when
troubleshooting RTP and TCP application problems.
Before you can use Prime Infrastructure’s mediatrace feature, you must complete the following
prerequisite setup tasks. These prerequisite tasks are required to enable Cisco Routers (ISRs, ISR G2,
ASRs) and NAM devices to act as data (metrics collection) sources to monitor network traffic (RTP and
TCP) performance metrics.
• Configuring Prime Infrastructure to Use NAM Devices as Data Sources, page 12-1
• Configuring Prime Infrastructure to Use Routers and Switches as Data Sources, page 12-2
• Configuring Mediatrace on Routers and Switches, page 12-3
• Configuring WSMA and HTTP(S) Features on Routers and Switches, page 12-4
Step 1 Add NAMs to the system. You can do this either automatically using Discovery, or manually using bulk
import or the Device Work Center (see Adding Devices Using Discovery in the Cisco Prime
Infrastructure 2.0 User Guide).
Step 2 Enable NAM Data collection. To do this:
a. Choose Administration > System Settings > Data Sources.
b. Scroll down to the NAM Data Collector section, then enable data collection on each NAM. For more
information, see Enabling NAM Data Collection in the Cisco Prime Infrastructure 2.0 User Guide.
Step 3 Create a site structure for your organization and use the Device Work Center to assign your principal
routers to the appropriate sites. To do this:
a. Choose Design > Management Tools > Site Map Design.
b. Add one or more campuses. For more information, see Creating Locations or Sites in the Cisco
Prime Infrastructure 2.0 User Guide.
Step 4 Associate your sites with authorized data sources. To do this:
a. Choose Administration > System Settings, then select Data Deduplication.
b. Click Enable Data Deduplication, then assign authoritative data sources for Voice/Video (for RTP
data) and Application Response Time (for TCP data). For more information, see Controlling
Background Data Collection Tasks, page 6-7.
Step 5 Associate your sites with endpoint subnets. To do this:
a. Choose Design > Management Tools > Endpoint-Site Association.
b. Associate subnets with your sites. For more information, see Associating Endpoints with a Location
in the Cisco Prime Infrastructure 2.0 User Guide.
Note If you fail to do this, by default the data collected by the NAMs for these endpoints will have
their sites set to “Unassigned.”
Step 6 Configure your routers for mediatrace and WSMA (see Troubleshooting with Mediatrace in the Cisco
Prime Infrastructure 2.0 User Guide).
Step 1 Create a site structure for your organization and use the Device Work Center to assign your principal
routers to the appropriate sites. To do this:
a. Choose Design > Management Tools > Site Map Design.
b. Add one or more campuses. For more information, see Creating Locations or Sites in the Cisco
Prime Infrastructure 2.0 User Guide.
Step 2 Associate your sites with authorized data sources. To do this:
a. Choose Administration > System Settings, then select Data Deduplication.
b. Click Enable Data Deduplication, then assign authoritative data sources for Voice/Video (for RTP
data) and Application Response Time (for TCP data). For more information, see Controlling
Background Data Collection Tasks, page 6-7.
Note If you fail to do this, by default the data collected for these endpoints will have their sites
set to “Unassigned.”
Step 4 Configure your compatible routers for Medianet Performance Monitor. For more information, see
Configuring Mediatrace on Routers and Switches, page 12-3.
Step 5 Configure your routers for mediatrace and WSMA (see Troubleshooting with Mediatrace in the Cisco
Prime Infrastructure 2.0 User Guide).
Step 1 Choose Design > Configuration > Feature Design > CLI Templates > System Templates - CLI >
mediatrace-Responder-Configuration.
Step 2 Enter the required information. See the Cisco Prime Infrastructure 2.0 Reference Guide for field
descriptions.
Step 3 Click Save as New Template. After you save the template, deploy it to your routers using the procedures
in Deploying and Monitoring Configuration Tasks in the Cisco Prime Infrastructure 2.0 User Guide.
Step 1 Choose Design > Configuration > Feature Design > CLI Templates > System Templates - CLI >
HTTP-HTTPS Server and WSMA Configuration-IOS.
Step 2 Enter the required information. See the Cisco Prime Infrastructure 2.0 Reference Guide for field
descriptions.
Note Enable the HTTP protocol. WSMA over HTTPS is not supported in the current version of Prime
Infrastructure.
Step 3 Click Save as New Template. After you save the template, deploy it to your routers using the procedures
in Deploying and Monitoring Configuration Tasks in the Cisco Prime Infrastructure 2.0 User Guide.
Note When adding a device to the Device Work Center, you must provide the HTTP user and password
for the device (see Device Work Center in the Cisco Prime Infrastructure 2.0 User Guide).
Cisco Prime Assurance allows you to view and report a variety of key performance indicators that are
critical for maintaining and improving your network’s operational readiness and performance quality.
This information is especially critical in adapting to ever increasing network loads.
Note To use this feature, your Prime Infrastructure implementation must include Assurance licenses. This
feature is supported on ASR platforms only.
In the following workflow, we take the role of a network administrator who has just been told that a large
staff expansion is planned for a branch office. This change will add more users to the branch LAN, many
of whom will be using WAN applications. We want to monitor the branch’s key interfaces for usage and
traffic congestion, so we can see if more users on the branch LAN will mean degraded WAN application
performance for those users. To be certain we have an adequate picture, we will need to look at both
short- and long-term performance trends for all the WAN applications the branch uses.
Step 1 Choose Operate > Operational Tools > Device Resource Estimation.
Step 2 To view the usage statistics for the WAN interfaces on the routers connecting remote branches to the
WAN, choose Operate > Monitoring Dashboards > Detail Dashboards and if it is not already there,
add the Top N WAN Interfaces by Utilization dashlet (see Adding Dashlets in the Cisco Prime
Infrastructure 2.0 User Guide).
For each interface, this dashlet shows the site, the IP of the device hosting the WAN interface, the
interface name, maximums and average utilization, and the utilization trend line for the past 24 hours.
Step 3 To see the utilization statistics for the past month, set the Time Frame on the Filters line to Past 4
Weeks.
Step 4 Find the WAN interface for the branch to which you are adding users. In the Interface column, click the
interface’s name to display that interface’s dashboard. The interface dashboard shows the following for
this single interface:
• Interface Details
• Top Applications by Volume
• Number of Users Over Time
• Class Map Statistics
• Interface Tx and Rx Utilization
• Top N Clients (In and Out)
• DSCP Classification
• Top Application Traffic Over Time
Step 5 Concentrate on Top Application Traffic Over Time, which gives a color-coded map of the top ten
applications with the heaviest traffic over this interface.
Step 6 To get a better idea of the longer-term performance trend, click the Clock icon next to the dashlet title
to change the Time Frame to Past 24 Hours, Past 4 Weeks, or Past 6 Months. To zoom in on particular
spikes in the graph, use the Pan and Zoom handles in the lower graph.
Step 7 For a quick report of the same data as the interface dashboard, select Report > Report Launch Pad.
Then select Performance > Interface Summary. Specify filter and other criteria for the report, select
the same interface in Report Criteria, then click Run.
The following table shows the ISP profile used to test against (it is very similar to the Caida.org Internet
profile).
Number of Parallel Active Users 60,000 Derived from the number of flows
M
E mail server configuration 2-5
managing
email
licenses 11-1
configuring parameters 2-5
traffic metrics 12-1
exclude device list 7-5
managing virtual domains 9-12
exclude switch trunk ports 7-5
TFTP
turning on and off 2-11
trace 5-7
Troubleshooting
Switch Port Tracing 7-7
troubleshooting
using logging options 5-7
upgrade settings
for controller 7-2