Cisco Prime Network Registrer - Guide
Cisco Prime Network Registrer - Guide
1 Administration Guide
First Published: 2017-12-20
Last Modified: 2021-10-20
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship
between Cisco and any other company. (1110R)
© 2017-2021 Cisco Systems, Inc. All rights reserved.
CONTENTS
Target Users 1
Regional and Local Clusters 2
Deployment Scenarios 2
Related Topics 3
Small-to-Medium-Size LANs 3
Large Enterprise and Service Provider Networks 3
Configuration and Performance Guidelines 4
Related Topics 4
General Configuration Guidelines 5
Special Configuration Cases 5
General Performance Guidelines 6
Interoperability with Earlier Releases 6
Management Components 9
Introduction to the Web-Based User Interfaces 10
Related Topics 10
Supported Web Browsers 11
Access Security 11
Logging In to the Web UIs 11
Multiple Users 12
Changing Passwords 12
Navigating the Web UIs 13
Refreshing Displays 28
Setting the Polling Interval 28
Displaying Charts as Tables 29
Exporting to CSV Format 29
Selecting Dashboard Elements to Include 29
Configuring Server Chart Types 29
Host Metrics 31
System Metrics 31
JVM Memory Utilization 32
CLI Commands 50
Managing Passwords 51
Managing Groups 51
Adding Groups 51
Editing Groups 51
Deleting Groups 52
CLI Commands 52
Managing Roles 52
Adding Roles 52
Editing Roles 53
Deleting Roles 53
CLI Commands 53
Granular Administration 53
Local Advanced and Regional Web UI 53
Related Topics 54
Scope-Level Constraints 54
Prefix-Level Constraints 55
Link-Level Constraints 56
Centrally Managing Administrators 57
Related Topics 57
Pushing and Pulling Administrators 58
Pushing Administrators to Local Clusters 58
Pushing Administrators Automatically to Local Clusters 58
Managing Owners 69
Local Advanced and Regional Advanced Web UI 69
CLI Commands 69
Managing Regions 70
Local Advanced and Regional Advanced Web UI 70
CLI Commands 70
Centrally Managing Owners and Regions 70
Related Topics 71
Pushing and Pulling Owners or Regions 71
Pushing Owners or Regions to Local Clusters 71
Pulling Owners and Regions from the Replica Database 72
How the Cisco Prime Network Registrar Virtual Appliance Works 195
Invoking Cisco Prime Network Registrar on the Virtual Appliance 196
Monitoring Disk Space Availability on VMware 196
Monitoring Disk Space Availability in Use by the Virtual Appliance 196
Increasing the Size of the Disk on VMware 196
Glossary 199
Target Users
Cisco Prime Network Registrar is designed for these users:
• Internet service providers (ISPs)—Helps ISPs drive the cost of operating networks that provide leased
line, dialup, and DSL (Point-to-Point over Ethernet and DHCP) access to customers.
• Multiple service operators (MSOs)—Helps MSOs provide subscribers with Internet access using cable
or wireless technologies. MSOs can benefit from services and tools providing reliable and manageable
DHCP and DNS services that meet the Data Over Cable Service Interface Specification (DOCSIS). Cisco
Prime Network Registrar provides policy-based, robust, and scalable DNS and DHCP services that form
the basis for a complete cable modem provisioning system.
• Enterprises—Helps meet the needs of single- and multisite enterprises (small-to-large businesses) to
administer and control network functions. Cisco Prime Network Registrar automates the tasks of assigning
IP addresses and configuring the Transport Control Protocol/Internet Protocol (TCP/IP) software for
individual network devices. Forward-looking enterprise users can benefit from class-of-service and other
features that help integrate with new or existing network management applications, such as user
registration.
A typical deployment is one regional cluster at a customer network operation center (NOC), the central point
of network operations for an organization. Each division of the organization includes a local address
management server cluster responsible for managing a part of the network. The System Configuration Protocol
(SCP) communicates the configuration changes between the servers.
Deployment Scenarios
The Cisco Prime Network Registrar regional cluster web UI provides a single point to manage any number
of local clusters hosting DNS, CDNS, DHCP, or TFTP servers. The regional and local clusters also provide
administrator management so that you can assign administrative roles to users logged in to the application.
This section describes two basic administrative scenarios and the hardware and software deployments for two
different types of installations—a small-to-medium local area network (LAN), and a large-enterprise or
service-provider network with three geographic locations.
Related Topics
Small-to-Medium-Size LANs, on page 3
Large Enterprise and Service Provider Networks, on page 3
Small-to-Medium-Size LANs
In this scenario, low-end Windows or Linux servers are acceptable. The image below shows a configuration
that would be adequate for this network.
Note Regional server is MUST in deployment for small and medium sized LANs.
Related Topics
General Configuration Guidelines, on page 5
Dynamic DNS updates generate an additional load on all Cisco Prime Network Registrar servers as new
DHCP lease requests trigger dynamic DNS updates to primary servers that update secondary servers
through zone transfers.
• During network reconfiguration, set DHCP lease renewal times to a small value.
Do this several days before making changes in network infrastructure (such as to gateway router and
DNS server addresses). A renewal time of eight hours ensures that all DHCP clients receive a changed
DHCP option parameter within one working day. See the "Managing Leases" section in Cisco Prime
Network Registrar 9.1 DHCP User Guide
Address space x x x x x
Host administration x x x x x
Extended host x x x x x
administration
Zone Views x x x x
Administrator:
Single sign-on x x x x x
Password change x x x x x
IP history reporting:
Lease history x x x x x
Utilization reporting:
Management Components
Cisco Prime Network Registrar contains two management components:
• Regional component, consisting of:
• Web UI
• CLI
• CCM Server
• Bring your own device (BYOD)
• Simple Network Management Protocol (SNMP) server
• Local component, consisting of:
• Web UI
• CLI
• CCM server
• Authoritative Domain Name System (DNS) server
• Caching / Recursive Domain Name System (CDNS) server
• Dynamic Host Configuration Protocol (DHCP) server
• Trivial File Transport Protocol (TFTP) server
• SNMP server
• Management of local address space, zones, scopes, DHCPv6 prefixes and links, and users
Note Cisco Prime Network Registrar includes a Hybrid DNS feature that allows you to run both the Caching DNS
and Authoritative DNS servers on the same operating system without two separate virtual or physical machines.
However, Cisco recommends hybrid mode for smaller sized deployments only. For larger deployments, Cisco
recommends separating Caching and Authoritative DNS on separate physical machines or VMs.
License management is done from the regional cluster when Cisco Prime Network Registrar is installed. You
must install the regional server first and load all licenses in the regional server. When you install the local
cluster, it registers with regional to obtain its license.
The regional CCM server provides central management of local clusters, with an aggregated view of DHCP
address space and DNS zones. It provides management of the distributed address space, zones, scopes, DHCPv6
prefixes and links, and users.
The local CCM server provides management of the local address space, zones, scopes, DHCPv6 prefixes and
links, and users.
The remainder of this chapter describes the TFTP and SNMP protocols. The CCM server, web UIs, and CLI
are described in Cisco Prime Network Registrar User Interfaces, on page 9. The DNS, CDNS, and DHCP
servers are described in their respective sections.
Related Topics
Supported Web Browsers, on page 11
Access Security, on page 11
Logging In to the Web UIs, on page 11
Multiple Users, on page 12
Changing Passwords, on page 12
Navigating the Web UIs, on page 13
Waiting for Page Resolution Before Proceeding, on page 13
Committing Changes in the Web UIs, on page 14
Role and Attribute Visibility Settings, on page 14
Access Security
At Cisco Prime Network Registrar installation, you can choose to configure HTTPS to support secure client
access to the web UIs. You must specify the HTTPS port number and provide the keystore at that time. With
HTTPS security in effect, the web UI Login page indicates that the “Page is SSL1 Secure.”
Note Do not use a dollar sign ($) symbol as part of a keystore password.
Note Open the regional Web UI first and add the licenses for the required services.
• Open the web browser and go to the web site. For example, if default ports were used during the
installation, the URLs would be http://hostname:8080 for the local cluster web UI, and
http://hostname:8090 for the regional cluster web UI.
This opens the New Product Installation page if no valid license is added at the time of installation. You have
to browse and add the valid license. If the license key is acceptable, the Cisco Prime Network Registrar login
page is displayed.
Note You can add the licenses only in the regional server. The local has to be registered to the regional at the time
of installation to run the desired licensed services.
1
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/ ).
In the local server, confirm the regional server IP address and port number and also the services you want to
run at the time of your first login. Click Register to confirm registration. If the regional server is configured
with the required licenses, you will be displayed the login page.
Enter the superuser username and password created at the time of installation to log into the Web UI. The
password is case-sensitive (See Managing Passwords, on page 51). If you already added the valid license and
superuser and configured a password at the time of installation, then you can log into the web UI using that
username and password.
Note To prepare for an HTTPS-secured login, see Cisco Prime Network Registrar 9.1 Installation Guide.
Depending on how your browser is set up, you might be able to abbreviate the account name or choose it from
a drop-down list while setting the username.
To log in, click Login.
The Configuration Summary page is displayed by default which shows the summary of configuration details
on the cluster. Starting from release 9.1, the Configuration Summary page on the regional cluster displays the
configured failover-pairs and zone distributions which further can display the underlying cluster or HA pairs.
You can use the graphical utilities such as Show Visualization icon ( ) or Show Table View icon ( ) in
the chart to view the network data in chart or table format.
Multiple Users
The Cisco Prime Network Registrar user interfaces support multiple, concurrent users. If two users try to
access the same object record or data, a Modified object error will occur for the second user. If you receive
this error while editing user data, do the following:
• In the web UI—Cancel the edits and refresh the list. Changes made by the first user will be reflected in
the list. Redo the edits, if necessary.
• In the CLI—Use the session cache refresh command to clear the current edits, before viewing the
changes and making further edits. Make changes, if you feel that it is necessary even after the other user’s
changes.
Changing Passwords
Whenever you edit a password on a web UI page, it is displayed as a string of eight dots. The actual password
value is never sent to the web browser. So, if you change the password, the field is automatically cleared. You
must enter the new password value completely, exactly as you want it to be.
Note The password should not be more than 255 characters long.
For details on changing administrator passwords at the local and regional cluster, see Managing Passwords,
on page 51.
Caution Do not use the Back button of the browser. Always use the navigation menu, or the Cancel button on the page
to return to a previous page. Using the browser Back button can cause erratic behavior or can cause failures.
A single sign-on feature is available to connect between the regional and local cluster web UIs. The regional
cluster web UI pages include the Connect button in the List/Add Remote clusters page, which you can click
to connect to the local cluster associated with the icon. If you have single sign-on privileges to the local cluster,
the connection takes you to the related local server management page (or a related page for related server
configurations). If you do not have these privileges, the connection takes you to the login page for the local
cluster. To return to the regional cluster, local cluster pages have the Return button on the main toolbar.
The Search bar in the navigation menu provides an easy way to search for menus. The Pin icon in the top
right corner of the navigation menu helps to pin/unpin the menu.
Starting from release 9.0, Cisco Prime Network Registrar provides a facility to save the frequently used
pages/menus as favorites, which helps in accessing them easily. To configure the page/menu as favorite, after
navigating to the desired menu, click the Favorite icon (star icon ( ) next to the navigation path), provide the
appropriate name, and then click OK. The pages/menus which are configured as favorites appear under the
Favorites section of the global navigation. You can delete the menus from the favorites list by clicking the
Delete icon next to them. Configuration Summary page is listed under the Favorites section by default.
Note Click the double arrow icon ( ) in any page to view the hidden options/functionalities.
Note Navigation menu items can vary based on if you have the role privileges for IPv4 or IPv6. For example, the
Design menu can be DHCPv4 and DHCPv6 if you have the ipv6-management subrole of the addrblock-admin
role assigned.
Tip Wait for each operation in the web UI to finish before you begin a new operation. If the browser becomes
impaired, close the browser, reopen it, then log in again. Some operations like zone distributions can take
significant amount of time, so you may have to wait till the operation completes.
Modifying Attributes
You can modify attribute values and unset those for optional attributes. In many cases, these attributes have
preset values, which are listed under the Default column on the page. The explicit value overrides the default
one, but the default one is always the fallback. If there is no default value, unsetting the explicit value removes
all values for that attribute.
in the left pane. To add additional columns for objects, click the gear icon ( ) above the objects table
in the left pane, select the desired column names, and then click Close. You can save the column format by
clicking the Save Column Format button.
There are Quick Filter and Advanced Filter options available to filter the objects as needed. To do a quick
search for the objects, you can use the Quick Filter option. Click the Filter icon ( ) or select Quick Filter
from the Show drop-down list located above the objects table and then enter the search string in the search
bar. The objects are listed as per your search criteria.
You can also use Advanced Filter to filter the objects. Select Advanced Filter from the Show drop-down
list, set the appropriate filter and condition in the Advanced Filter dialog box, and then click OK. Once you
click OK, the object list on the left pane is filtered as per the filter specified. To save the filter, click Save As
in the Advanced Filter dialog box, enter the appropriate name in the Save Filter dialog box, and then click
Save. The saved filter name appears in the Show drop-down list and you can use this filter on that particular
object list at any time. You can also set this filter as the default filter by clicking the Set Default Filter button.
The user defined filters can be edited or removed. To do this, select Manage User Defined Filters from the
Show drop-down list, select the required user defined filter from the filter list in the Manage User Defined
Filters dialog box, and then click Edit or Remove as required.
Help Pages
The web UI provides a separate window that displays help text for each page. The Help pages provide:
• A context-sensitive help topic depending on which application page you have open.
• A clickable and hierarchical Contents and Index, and a Favorites setting, as tabs on a left-hand pane that
you can show or hide.
• A Search facility that returns a list of topics containing the search string, ordered by frequency of
appearance of the search string.
• Forward and backward navigation through the history of Help pages opened.
• A Print function.
• A Glossary.
Logging Out
Log out of the web UI by clicking Log Out link. You can find the Log Out under the gear icon at the top
right corner of the application page.
Note If you change the IP address of your local cluster machine, see the Note in Configuring Clusters in the Local
Web UI, on page 19.
Related Topics
Introduction to the Web-Based User Interfaces, on page 10
Regional Cluster Web UI, on page 20
• Set up a basic configuration by using the Setup interview pages—Click the Setup icon at the top and
select the different tabs in the Setup page. See Cisco Prime Network Registrar 9.1 Quick Start Guide for
more details.
• Administer users, tenants, encryption keys—Place the cursor on the Administration menu (for user
access options) or Design menu (for Security > Keys option). See Managing Administrators, on page
35.
• Manage the Cisco Prime Network Registrar protocol servers—Place the cursor on the Operate menu
and select Manage Servers or Schedule Tasks option. See Maintaining Servers and Databases, on page
131.
• Manage clusters—Place the cursor on the Operate menu and choose Manage Clusters option. See
Configuring Server Clusters, on page 79.
• Configure DHCP—Place the cursor on Design menu and select the options under DHCP Settings,
DHCPv4, or DHCPv6. See the "Managing DHCP Server" chapter in Cisco Prime Network Registrar
9.1 DHCP User Guide.
• Configure DNS—Place the cursor on the Design menu and select the options under Cache DNS and
Auth DNS. Place the cursor on the Deploy menu and select the options under DNS and DNS Updates.
See the "Managing Zones" section in Cisco Prime Network Registrar 9.1 Authoritative and Caching
DNS User Guide.
• Manage hosts in zones—From the Design menu, choose Hosts under the Auth DNS submenu. See the
"Managing Hosts" section in Cisco Prime Network Registrar 9.1 Authoritative and Caching DNS User
Guide.
• Go to Advanced mode—Click Advanced in the top right corner of the page. See Local Advanced Main
Menu Page, on page 17.
• Configure Routers—Place the cursor on the Deploy menu and select the options under Router
Configuration. See Managing Routers and Router Interfaces, on page 127.
• Configure DHCPv4—Place the cursor on the Design menu and select any option under DHCPv4. See
the "Managing DHCP Server" chapter in Cisco Prime Network Registrar 9.1 DHCP User Guide.
• Configure DHCPv6—Place the cursor on the Design menu and select any option under DHCPv6. See
the "DHCPv6 Addresses" section in Cisco Prime Network Registrar 9.1 DHCP User Guide.
• Configure DNS—Place the cursor on the Design menu and select the options under Cache DNS and
Auth DNS. Place the cursor on the Deploy menu and select the options under DNS and DNS Updates.
See the "Managing Zones" section in Cisco Prime Network Registrar 9.1 Authoritative and Caching
DNS User Guide.
• Manage hosts in zones—From the Design menu, choose Hosts under the Auth DNS submenu. See the
"Managing Hosts" section in Cisco Prime Network Registrar 9.1 Authoritative and Caching DNS User
Guide.
• Manage IPv4 address space—Place the cursor on the Design menu and select any option under
DHCPv4. See the "Managing Address Space" section in Cisco Prime Network Registrar 9.1 DHCP
User Guide.
• Configure IPv6 address space—Place the cursor on the Design menu and select any option under
DHCPv6. See the "DHCPv6 Addresses" section in Cisco Prime Network Registrar 9.1 DHCP User
Guide.
• Go to Basic mode— Click the drop-down arrow of the Mode icon ( ) at the top right corner
of the page and choose Basic. See Local Basic Main Menu Page, on page 16.
• Web UI mode—User mode at startup: Basic, Advanced, or Expert (see Role and Attribute Visibility
Settings, on page 14). If unset, the mode defaults to the one set in the CCM server configuration (see
Managing Servers, on page 131).
• Web UI tree page size—Adjust the page size when displaying a tree view in the web UI.
• Web UI log page size—Adjust the page size on log pages.
• Web UI report page size—Adjust the page size to use when displaying report pages in the web UI.
• Views—Specify the DNS view setting at session startup in the web UI or CLI.
• VPN—Specify the VPN setting at session startup in the web UI or CLI.
• Alarm poll interval—Adjust the alarm poll interval; that is, how often Network Registrar polls the alarm
data from server.
• Homepage—Set a page from favorites list as the homepage for the application. By default, Configuration
Summary page is set as the homepage. Starting from release 9.0, you can set a page of your choice as
the homepage for the application. To do this, add the desired page to the Favorites list (see Navigating
the Web UIs, on page 13), select the page name from the Homepage drop-down list, and then click
Modify User Preferences. You can click the Home icon ( ) on the top left corner of the web UI to go
to the homepage.
• Date format—Set the date-time format for date-time values in the web UI. A format can be selected
from the default list or entered in text form as <date-pattern> <time-pattern>.
Supported patterns are:
• Year as "yy", "yyyy"
• Month as "M", "MM", "MMM", "MMMM"
• Day as "d", "dd"
• Hour as "h", "hh", "H", "HH"
• Minute as "mm"
• Second as "s", "ss"
• Delimiters as ":", "-", "/"
• Chart X-Axis Timestamp Pattern—Specify the pattern to be used for displaying the timestamp on
x-axis while displaying charts.
• Tree node display—Specify the initial display option for tree nodes. If this setting is set to Expanded
and the number of nested child nodes is greater than 500, it may take a few minutes to display the tree.
You can unset the page size and web UI mode values by checking the check box in the Unset? column, next
to the attribute. After making the user preference settings, click Modify User Preferences.
use secure access mode, select use-ssl as disabled, optional, or required (optional is the preset value; you need
the security library installed if you choose required). Make the changes and then click Save.
Note If you change the IP address of your local cluster machine, you must modify the localhost cluster to change
the address in the ipaddr field. Avoid setting the value to the loopback address (127.0.0.1); if you do, you
must also set the actual IP addresses of main and backup servers for DHCP failover and High-Availability
(HA) DNS configurations.
Related Topics
Introduction to the Web-Based User Interfaces, on page 10
Local Cluster Web UI, on page 16
Note The CLI provides concurrent access, by at most 14 simultaneous users and processes per cluster.
Tip See the CLIContents.html file in the /docs subdirectory of your installation directory for details.
• –C—Cluster name, preset value localhost. Specify the port number with the cluster name while invoking
nrcmd to connect to another cluster. See the preceding example.
The port number is optional if the cluster uses the default SCP port—1234 for local and 1244 for regional.
Ensure that you include the port number if the port used is not the default one.
• –N—Username. You have to enter the username that you created when first logged into the Web UI.
• –P—User password. You have to enter the password that you created for the username.
• –L—Access the local cluster CLI.
• –R—Access the regional cluster CLI.
• -b < script—Process script file of nrcmd commands.
• -h—Print this help text.
• -r —Login as a read-only user.
• -R—Connect to regional.
• -v (or -vv)—Report the program version and exit.
• -V—Specify the session visibility
Tip For additional command options, see the CLIGuide.html file in /docs.
Note If you change the IP address of your local cluster machine, you must modify the localhost cluster to change
the address in the ipaddress attribute. Do not set the value to 127.0.0.1.
For example:
To send the leases on the DHCP server to a file (leases.txt), use the following commands:
Note To close a previously opened file, use session log (no filename). This stops writing the output to any file.
nrcmd> exit
Tip The CLI operates on a coordinated basis with multiple user logins. If you receive a cluster lock message,
determine who has the lock and discuss the issue with that person. (See Multiple Users, on page 12.)
Note To view the search interface element and run the search for IP addresses and DNS names, Cisco Prime Network
Registrar must be licensed with DHCP or DNS, and the DHCP or DNS services must be enabled for the local
cluster (in the List/Add Remote Clusters page in Regional Web UI).
The following table shows the typical search results under different scenarios.
An IPv4 address Only DHCP The closest matching scope, scope lease or
scope reservation
An IPv4 address or a DNS FQDN Only DNS The related Zone or Resource Record
An IPv6 address Only DHCP The closest matching prefix, prefix lease
or prefix reservation
An IPv6 address or a DNS FQDN Only DNS The related Zone or Resource Record
An IPv4 address, an IPv6 address Both DHCP and DNS All of the above, based on the type of
or a DNS FQDN address
The dashboard is best used in a troubleshooting desk context, where the system displaying the dashboard is
dedicated for that purpose and might be distinct from the systems running the protocol servers. The dashboard
system should point its browser to the system running the protocol servers.
You should interpret dashboard indicators in terms of deviations from your expected normal usage pattern.
If you notice unusual spikes or drops in activity, there could be communication failures or power outages on
the network that you need to investigate.
• Opening the Dashboard, on page 23
• Display Types, on page 24
• Customizing the Display, on page 28
• Selecting Dashboard Elements to Include, on page 29
• Host Metrics, on page 31
Display Types
Provided you have DHCP and DNS privileges through administrator roles assigned to you, the preset display
of the dashboard consists of the following tables (See the table below for an example):
• System Metrics—See System Metrics, on page 31.
• DHCP General Indicators—See the "DHCP General Indicators" section in Cisco Prime Network
Registrar 9.1 DHCP User Guide.
• DNS General Indicators—See the "DNS General Indicators" section in Cisco Prime Network Registrar
9.1 Authoritative and Caching DNS User Guide.
Tip These are just the preset selections. See Selecting Dashboard Elements to Include, on page 29 for other
dashboard elements you can select. The dashboard retains your selections from session to session.
Each dashboard element initially appears as a table or a specific panel chart, depending on the element:
• Table—See Tables, on page 25.
• Line chart—See Line Charts, on page 26.
• Area chart—See Area Charts, on page 27.
Note Automatic refresh is turned off for magnified charts. To get the most recent data, click the Refresh icon next
to the word Dashboard at the top left of the page.
To convert a chart to a table, see the "Displaying Charts as Tables" section. You cannot convert tables to a
graphic chart format.
Legends
Each chart includes a color-coded legend by default.
Tables
Dashboard elements rendered as tables have data displayed in rows and columns. The following dashboard
elements are preset to consist of (or include) tables:
• DHCP DNS Updates
• DHCP Address Current Utilization
• DHCP General Indicators
• DNS General Indicators
• Caching DNS General Indicators
Note If you view a table in Expert mode, additional data might appear.
Line Charts
Dashboard elements rendered as line charts can include one or more lines plotted against the x and y axes.
The three types of line charts are described in the following table.
Raw data line chart Lines plotted against raw data. • Java Virtual Machine (JVM) Memory
Utilization (Expert mode only)
• DHCP Buffer Capacity
• DHCP Failover Status (two charts)
• DNS Network Errors
• DNS Related Servers Errors
Delta line chart Lines plotted against the • DNS Inbound Zone Transfers
difference between two
sequential raw data. • DNS Outbound Zone Transfers
Rate line chart Lines plotted against the • DHCP Server Request Activity (see
difference between two the image below)
sequential raw data divided by
the sample time between them. • DHCP Server Response Activity
• DHCP Response Latency
• DNS Query Responses
• DNS Forwarding Errors
Tip To get the raw data for a chart that shows delta or rate data, enter Expert mode, go to the required chart, click
the Chart Link icon at the bottom of the panel chart, and then click Data Table. The Raw Data table is below
the Chart Data table.
Area Charts
Dashboard elements rendered as area charts have multiple related metrics plotted as trend charts, but stacked
one on top of the other, so that the highest point represents a cumulative value. The values are independently
shaded in contrasting colors. (See the image below for an example of the DHCP Server Request Activity chart
shown in Figure 6: Line Chart Example, on page 26 rendered as an area chart.)
Figure 7: Area Chart Example
They are stacked in the order listed in the legend, the left-most legend item at the bottom of the stack and the
right-most legend item at the top of the stack. The dashboard elements that are pre-set to area chart are:
• DHCP Buffer Capacity
• DHCP Failover Status
• DHCP Response Latency
• DHCP Server Leases Per Second
• DHCP Server Request Activity
• DHCP Server Response Activity
• DNS Inbound Zone Transfers
• DNS Network Errors
• DNS Outbound Zone Transfers
• DNS Queries Per Second
• DNS Related Server Errors
Tip Each chart type shows the data in distinct ways and in different interpretations. You can decide which type
best suits your needs.
Each chart has a help icon with a description of the chart and a detailed help if you click the link (more...) at
the bottom of the description.
Note The changes made to the dashboard/chart will persist only if you click Save in the Dashboard window.
Refreshing Displays
Refresh each display so that it picks up the most recent polling by clicking the Refresh icon.
You can set the cached data polling (hence, automatic refresh) interval to:
• Disabled— Does not poll, therefore does not automatically refresh the data.
• Slow— Refreshes the data every 30 seconds.
• Medium— Refreshes the data every 20 seconds.
• Fast (the preset value)— Refreshes the data every 10 seconds.
To set up default chart type, check the check box corresponding to the Metrics chart that you want to display
and choose a chart type from the Type drop-down list. The default chart types are consistent and shared across
different user sessions (see the image below).
Note You can see either the CDNS or DNS Metrics in the Dashboard Settings > Chart Selection page based on
the service configured on the server.
Tip The order in which the dashboard elements appear in the Chart Selection list does not necessarily determine
the order in which the elements will appear on the page. An algorithm that considers the available space
determines the order and size in a grid layout. The layout might be different each time you submit the dashboard
element selections. To change selections, check the check box next to the dashboard element that you want
to display.
The above image displays the Charts Selection table in the regional web UI. The Clusters column is available
only in regional dashboard and it displays the list of local clusters configured. You can add the local cluster
by clicking the Edit icon and then by selecting the local cluster name from the Local Cluster List dialog box.
To change selections, check the check box next to the dashboard element that you want to display.
Specific group controls are available in the Change Chart Selection drop-down list, at the top of the page
(see the image above). To:
• Uncheck all check boxes, choose None.
• Revert to the preset selections, choose Default. The preset dashboard elements for administrator roles
supporting DHCP and DNS are:
• Host Metrics: System Metrics
• DHCP Metrics: General Indicators
• DNS Metrics: General Indicators
• Select the DHCP metrics only, choose DHCP (see the "DHCP Metrics" section in Cisco Prime Network
Registrar 9.1 DHCP User Guide).
• Select the DNS metrics only, choose DNS (see the "Authoritative DNS Metrics" section in Cisco Prime
Network Registrar 9.1 Authoritative and Caching DNS User Guide).
• Select the DNS metrics only, choose CDNS (see the "Caching DNS Metrics" section in Cisco Prime
Network Registrar 9.1 Authoritative and Caching DNS User Guide)
• Select all the dashboard elements, choose All.
Click OK at the bottom of the page to save your choices, or Cancel to cancel the changes.
Starting from release 9.1, you can change the chart type by clicking the Chart Type icon at the bottom of the
panel chart and then by selecting the required chart type (see the image below). The different types of chart
available are: Line Chart, Column Chart, Area Chart, and Scatter Chart.
Figure 11: Selecting the Chart Type
Host Metrics
Host metrics comprise two charts:
• System Metrics—See System Metrics, on page 31.
• JVM Memory Utilization (available in Expert mode only)—See JVM Memory Utilization, on page
32.
System Metrics
The System Metrics dashboard element shows the free space on the disk volumes where the Cisco Prime
Network Registrar logs and database directories are located, the date and time of the last server backup, and
CPU and memory usage for the various servers. System metrics are available if you choose Host Metrics:
System Metrics in the Chart Selection list.
The resulting table shows:
• Logs Volume—Current free space out of the total space on the disk drive where the logs directory is
located, with the equivalent percentage of free space.
• Database Volume—Current free space out of the total space on the disk drive where the data directory
is located, with the equivalent percentage of free space.
• Last Good Backup—Date and time when the last successful shadow database backup occurred (or Not
Done if it did not yet occur) since the server agent was last started.
• CPU Utilization (in seconds), Memory Utilization (in kilobytes), VM Utilization (in kilobytes), and
Process ID (PID) for the:
• Cisco Prime Network Registrar server agent
• CCM server
• DNS server
• DHCP server
• Web server
• SNMP server
• DNS caching server
Related Topics
How Administrators Relate to Groups, Roles, and Tenants, on page 36
Administrator Types, on page 36
Roles, Subroles, and Constraints, on page 37
Groups, on page 40
Managing Administrators, on page 49
Administrator Types
There are two basic types of administrators: superusers and specialized administrators:
• Superuser—Administrator with unrestricted access to the web UI, CLI, and all features. This administrator
type should be restricted to a few individuals. The superuser privileges of an administrator override all
its other roles.
Tip You have to create the superuser and password at installation, or when you first
log into the web UI.
When a superuser is assigned a tenant tag, unrestricted access is only granted for corresponding tenant
data. Data of other tenants cannot be viewed, and core objects are restricted to read-only access.
Tip An example of adding role constraints is in Create a Host Administrator Role with Constraints, on page 116.
The interplay between DNS and host administrator role assignments is such that you can combine an
unconstrained dns-admin role with any host-admin role in a group. For example, combining the
dns-admin-readonly role and a host-admin role in a group (and naming the group host-rw-dns-ro) provides
full host access and read-only access to zones and RRs. However, if you assign a constrained dns-admin role
along with a host-admin role to a group and then to an administrator, the constrained dns-admin role takes
precedence, and the administrator privileges at login will preclude any host administration.
Certain roles provide subroles with which you can further limit the role functionality. For example, the local
ccm-admin or regional-admin, with just the owner-region subrole applied, can manage only owners and
regions. By default, all the possible subroles apply when you create a constrained role.
The predefined roles are described in Table 4: Local Cluster Administrator Predefined and Base Roles , on
page 37 (local), and Table 5: Regional Cluster Administrator Predefined and Base Roles, on page 39 (regional).
Core functionality: Manage address block, subnets, and reverse DNS zones (also requires
dns-admin); and notify of scope activity.
• ric-management: Push to, and reclaim subnets from, DHCP failover pairs and routers.
• ipv6-management: Manage IPv6 prefixes, links, options, leases, and reservations.
• lease-history: Query, poll, and trim lease history data.
ccm-admin Core functionality: Manage access control lists (ACLs), and encryption keys.
• authentication: Manage administrators.
• authorization: Manage roles and groups.
• owner-region: Manage owners and regions.
• database: View database change entries and trim the CCM change sets.
• security-management: Manage ACLs and DNSSEC configuration.
cdns-admin Core functionality: Manage in-memory cache (flush cache and flush cache name).
• security-management: Manage ACLs and DNSSEC configuration.
• server-management: Manage DNSSEC configuration, as well as forwarders, exceptions,
DNS64, and scheduled tasks, and stop, start, or reload the server.
dhcp-admin Core functionality: Manage DHCP scopes and templates, policies, clients, client-classes, options,
leases, and reservations.
• lease-history: Query, poll, and trim lease history data.
• ipv6-management: Manage IPv6 prefixes, links, options, leases, and reservations.
• server-management: Manage the DHCP server configuration, failover pairs, LDAP servers,
extensions, and statistics.
dns-admin Core functionality: Manage DNS zones and templates, resource records, secondary servers, and
hosts.
• security-management: Manage DNS update policies, ACLs, and encryption keys.
• server-management: Manage DNS server configurations and zone distributions, synchronize
zones and HA server pairs, and push update maps.
• ipv6-management: Manage IPv6 zones and hosts.
• enum-management: Manage DNS ENUM domains and numbers.
host-admin Core functionality: Manage DNS hosts. (Note that if an administrator is also assigned a
constrained dns-admin role that overrides the host-admin definition, the administrator is not
assigned the host-admin role.)
central-dns-admin Core functionality: Manage DNS zones and templates, hosts, resource records, and
secondary servers; and create subzones and reverse zones.
• security-management: Manage DNS update policies, ACLs, and encryption keys.
• server-management: Synchronize DNS zones and HA server pairs, manage zone
distributions, pull replica zone data, and push update maps.
• ipv6-management: Manage IPv6 zones and hosts.
• enum-management: Manage DNS ENUM domains and numbers.
central-host-admin Core functionality: Manage DNS hosts. (Note that if an administrator is also assigned
a constrained central-dns-admin role that overrides the central-host-admin definition,
the administrator is not assigned the central-host-admin role.)
regional-addr-admin Core functionality: Manage address blocks, subnets, and address ranges; generate
allocation reports; and pull replica address space data.
• dhcp-management: Push and reclaim subnets; and add subnets to, and remove
subnets from, DHCP failover pairs.
• lease-history: Query, poll, and trim lease history data.
• subnet-utilization: Query, poll, trim, and compact subnet and prefix utilization
data.
• ipv6-management: Manage IPv6 prefixes, links, options, leases and reservations.
• byod-management: Manage BYOD Server configuration.
Groups
Administrator groups are the mechanism used to assign roles to administrators. Hence, a group must consist
of one or more administrator roles to be usable. When you first install Cisco Prime Network Registrar, a
predefined group is created to correspond to each predefined role.
Roles with the same base role are combined. A group with an unconstrained dhcp-admin role and a constrained
dns-admin role, does not change the privileges assigned to the dns-admin role. For example, if one of the roles
is assigned unconstrained read-write privileges, the group is assigned unconstrained read-write privileges,
even though other roles might be assigned read-only privileges. Therefore, to limit the read-write privileges
of a user while allowing read-only access to all data, create a group that includes the unconstrained read-only
role along with a constrained read-write role. (See Roles, Subroles, and Constraints, on page 37 for the
implementation of host-admin and dns-admin roles combined in a group.)
Note Any administrators defined in the CCM server's database are ignored when external authentication is enabled.
Attempting to log in with these usernames and passwords will fail. To disable external authentication, you
must remove or disable all the configured external servers or change the auth-type attribute value to Local.
Tip If all logins fail because the RADIUS servers are inaccessible or misconfigured, use the local.superusers file
to create a temporary username and password. See Managing Administrators, on page 49 for more details.
To assign superuser access privileges, the reserved group name superusers is used. To provide superuser
privileges to an administrator, enter:
cnr:groups=superusers
Once you save and reload your RADIUS server (assuming all configuration is correct), you can then login to
Cisco Prime Network Registrar using the user created in RADIUS and it will allow authentication.
Note You cannot add, delete, or modify external user names and their passwords or groups using Cisco Prime
Network Registrar. You must use the RADIUS server to perform this configuration.
Step 1 From the Administration menu, choose Radius under the External Authentication submenu. The List/Add Radius
Server page is displayed.
Step 2 Click the Add Radius icon in the Radius pane, enter the name, IPv4 and/or IPv6 address of the server you want to
configure as the external authentication server, and you can set the key attribute which will be used for communicating
with this server in the Add External Authentication Server dialog box, and click Add External Authentication Server.
The CCM server uses the key to set the key-secret attribute which is the secret key shared by client and the server.
Step 3 To enable the external authentication server, check enabled check box of the ext-auth attribute in the Edit Radius Server
page, and then click Save.
Step 4 Change the auth-type attribute to RADIUS in the Manage Servers page, click Save, and then restart Cisco Prime Network
Registrar.
Note At this point, if you are not able to login to Cisco Prime Network Registrar since local authentication is disabled,
you need to create a backdoor account under /opt/var/nwreg2/local/conf/priv and create a file name
"local.superusers" with a username and password.
CLI Commands
To create an external authentication server, use auth-server name create <address | ip6address>
[attribute=value ...] (see the auth-server command in the CLIGuide.html file in the /docs directory for syntax
and attribute descriptions).
To assign superuser access privileges, the reserved group name superusers is used. To provide superuser
privileges to an administrator, enter:
cnr:groups=superusers
Step 1 In AD server, create a new group, for example CPNR, with the group scope Domain Local.
Step 2 Select a user and click Add to a group.
Step 3 In Enter the Object Names window, select CPNR and click OK.
Step 4 In AD Server Object windows, select CPNR for the ad-group-name attribute and info for the ad-user-attr-map attribute.
Note You cannot add, delete, or modify external user names and their passwords or groups using Cisco Prime Network
Registrar. You must use the AD server to perform this configuration.
If the Prime Network Registrar is running on Linux platform, the changes need to be configured in krb5.conf
(/etc/krb5.conf) file, as shown below:
default = FILE:/var/log/krb5libs.log
kdc = FILE:/var/log/krb5kdc.log
admin_server = FILE:/var/log/kadmind.log
[libdefaults]
ticket_lifetime = 1d
default_realm = ECNR.COM
default_tkt_enctypes = rc4-hmac
default_tgs_enctypes = rc4-hmac
dns_lookup_realm = false
dns_lookup_kdc = false
forwardable = true
[realms]
ECNR.COM = {
kdc = <kdc server host name>
admin_server = <kdc server host name>
}
[domain_realm]
.ecnr.com = ECNR.COM
ecnr.com = ECNR.COM
Step 1 From the Administration menu, choose Active Directory under the External Authentication submenu. The List/Add
Active Directory Server page is displayed.
Step 2 Click the Add Active Directory Server icon in the Active Directory pane, enter the name, hostname of the server, and
domain you want to configure as the external authentication server. You can set the base domain, LDAP user attribute
map, and AD group name which will be used for communicating with this server in the Add Active Directory Server
dialog box. Click Add Active Directory Server.
Step 3 Change the auth-type attribute to Active Directory in the Manage Servers page, click Save, and then restart Cisco Prime
Network Registrar.
CLI Commands
To create an external authentication server, use auth-server name create <address | ip6address>
[attribute=value ...].
Managing Tenants
The multi-tenant architecture of Cisco Prime Network Registrar provides the ability to segment the data stored
on both regional and local clusters by tenant. When tenants are defined, data is partitioned by tenant in the
embedded databases of each cluster. This provides data security and privacy for each tenant, while allowing
cloud or managed service providers the flexibility to consolidate many smaller customer configurations on a
set of infrastructure servers, or distribute a larger customer configuration across several dedicated servers.
Any given local cluster may be associated with one or more tenants, but within a local cluster, the address
pools and domain names assigned to a given tenant must not overlap.
For larger customers, clusters may be explicitly assigned to a tenant. In this case, all data on the local cluster
will be associated with the tenant, and may include customized server settings. Alternatively, infrastructure
servers may service many tenants. With this model, the tenants can maintain their own address space and
domain names, but share common server settings that would be administered by the service provider. Their
use of public or private network addresses needs to be managed by the service provider, to ensure that the
tenants are assigned non-overlapping addresses.
The following are the key points you should know while configuring tenants:
• Tenant administrators are linked to their data by a tenant object that defines their tenant tag and identifier.
• Tenant objects should be consistent and unique across all clusters.
• You should not reuse tags or identifiers for different tenants.
Adding a Tenant
To add a tenant, do the following:
Step 1 From the Administration menu, choose Tenants under the User Access submenu. This opens the List/Add Tenants
page.
Step 2 Click the Add Tenants icon in the Tenants pane, enter the tenant tag and tenant ID and click Add Tenant. The Name
and Description attributes are optional.
Note You cannot create more than one tenant with the same tenant ID or tenant tag.
CLI Commands
To add a tenant, use tenant tag create tenant-id [attribute=value] (see the tenant command in the
CLIGuide.html file in the /docs directory for syntax and attribute descriptions).
Editing a Tenant
To edit a tenant, do the following:
Step 1 On the List/Add Tenants page, click the name of the desired tenant in the Tenants pane and the Edit Tenant page appears
with the details of the selected tenant.
Step 2 You can modify the tenant tag, name, or description of the tenant on the Edit Tenant page and click Save. The tenant ID
cannot be modified.
Deleting a Tenant
Warning Deleting the tenant will also delete all data for the tenant.
To delete a tenant, select the name of the desired tenant in the Tenants pane, click the Delete icon in the
Tenants pane, and then confirm the deletion. You can also cancel the deletion by clicking the Close button.
Step 1 To set the data for a desired tenant, click the Settings drop-down list on the toolbar at the top of the page and select the
desired tenant under the Tenant submenu.
Step 2 Create the object.
When creating tenant data, most object names are only required to be unique for the specified tenant. For example, tenants
abc and xyz may both use their own scope test that is private to their configuration.
Note Administrators (Admin), zones (CCMZone, CCMReverseZone, and CCMSecondaryZone), keys (Key), and
clients (ClientEntry) must be unique across all tenants.
Administrator names must be unique to perform initial login authentication and establish whether the user is a tenant.
Zone and key classes must be unique because these require a DNS domain name that is expected to be unique across the
Internet. Client names must correspond to a unique client identifier that the DHCP server can use to match its incoming
requests.
Step 1 Ensure that you select [all] from the Settings drop-down list on toolbar at the top of the page and select the desired tenant
under the Tenant submenu.
Step 2 Create the object, leaving the object tenant assignment set to none. By default none is selected in the Tenant drop-down
list. Leave it as it is, so that the object is not constrained to any specific tenant.
Core data can be used to provide common configuration elements such as policies or client classes that you choose to
offer to tenants. Tenants can view and reference these objects in their configuration, but cannot change or delete them.
Because core data is visible to all tenants, objects names must be unique across all tenants.
CLI Commands
Use session set tenant=tag to set the selected tenant. Use session unset tenant to clear the tenant selection,
if set (see the session command in the CLIGuide.html file in the /docs directory for syntax and attribute
descriptions).
Note Once created, you cannot change the tenant or core designation for the object. You must delete and recreate
the object to change its tenant assignment.
Tip You can use the cnr_exim tool to move a set of tenant data from one tenant to another.
Note If synchronization with the local cluster fails, the cluster will not be assigned to the tenant. Resolve any
connectivity issues and use the resynchronization icon to set the local cluster tenant.
Regional Web UI
To assign a local cluster to a single tenant, do the following:
Step 1 Add the tenant in the List/Add Tenant page if you want to assign the cluster to a new tenant (see the Adding a Tenant,
on page 45).
Step 2 From the Operate menu, Choose Manage Clusters under the Servers submenu. The List/Add Clusters page is displayed.
Step 3 Choose the tenant you added in Step 1 from the Settings drop-down list on the toolbar at the top of the page and select
the desired tenant under the Tenant submenu.
Step 4 Click the Add Manage Clusters icon in the Manage Clusters pane. The Add Cluster dialog box appears.
Step 5 Click Add Cluster to add the cluster. For information on adding the cluster, see the Create the Local Clusters, on page
120.
Note Once a cluster is assigned to a particular tenant, it cannot be changed or unset.
Use the Settings drop-down list on the toolbar at the top of the page and select the desired tenant under the
Tenant submenu to specify the set of data to be pushed or pulled.
Note To maintain a consistent view of tenant data, all related clusters should be configured with the same list of
tenants. See Pushing and Pulling Tenants, on page 66 for steps that help you manage tenant lists.
CLI Commands
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push
and reclaim, a list of clusters or "all" may be specified.
• tenant < tag | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
• tenant < tag | all > push < ensure | replace | exact > cluster-list [-report-only | -report]
• tenant tag reclaim cluster-list [-report-only | -report]
Note A user constrained to a specific tenant can only export or import data for that tenant.
Step 1 Create a template tenant user to use as a placeholder, with tag=template and id=9999, and create the set of objects to be
reused for each tenant.
Step 2 Use the cnr_exim tool to export the template configuration:
cnr_exim -f template -x -e template.bin
Step 3 Use the cnr_exim tool to import the template configuration for the tenant abc :
cnr_exim -f template -g abc -i template.bin
Note The template tenant user does not need to be present on the cluster to import the data, which lets you reuse the
template.bin export file on other clusters. Once you have created the export file, you can also delete the
placeholder tenant on the original cluster to remove all associated template data, if desired.
Step 1 Use the cnr_exim tool to export the configuration for the tenant xyz:
cnr_exim -f xyz -x -e xyz.bin
Managing Administrators
When you first log in, Cisco Prime Network Registrar will have one administrator—the superuser account.
This superuser can exercise all the functions of the web UI and usually adds the other key administrators.
However, ccm-admin and regional-admin administrators can also add, edit, and delete administrators. Creating
an administrator requires:
• Adding its name.
• Adding a password.
• Specifying if the administrator should have superuser privileges (usually assigned on an extremely limited
basis).
• If not creating a superuser, specifying the group or groups to which the administrator should belong.
These groups should have the appropriate role (and possibly subrole) assignments, thereby setting the
proper constraints.
Tip If you accidentally delete all the roles by which you can log into Cisco Prime Network Registrar (those having
superuser, ccm-admin, or regional-admin privileges), you can recover by creating a username/password pair
in the install-path/conf/priv/local.superusers file. You must create this file, have write access to it, and include
a line in it with the format username password. Use this username and password for the next login session.
Note, however, that using the local.superusers file causes reduced security. Therefore, use this file only in
emergencies such as when temporarily losing all login access. After you log in, create a superuser account in
the usual way, then delete the local.superusers file or its contents. You must create a new administrator account
for each individual, to track administrative changes.
Adding Administrators
To add a administrator, do the following:
Step 1 From the Administration menu, choose Administrators under the User Access submenu. This opens the List/Add
Administrators page (see the Create the Administrators, on page 113 for an example).
Step 2 Click the Add Administrators icon in the Administrators pane, enter the name in the Name field, enter the password
in the Password field, retype the password in the Confirm Password field in the Add Admin dialog box, and then click
Add Admin.
Step 3 Choose one or more existing groups from the Groups Available list (or whether the administrator should be a superuser)
and then click Save.
Editing Administrators
To edit an administrator, select the administrator in the Administrators pane, modify the name, password,
superuser status, or group membership on the Edit Administrator page, and then click Save. The active group
or groups should be in the Selected list.
Deleting Administrators
To delete an administrator, select the administrator in the Administrators pane, click the Delete Administrators
icon, and then confirm or cancel the deletion.
CLI Commands
Use admin name create [attribute=value] to create an administrator.
Use admin name delete to delete an administrator.
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push
and reclaim, a list of clusters or "all" may be specified. For push, unless -omitrelated is specified, associated
roles and groups are also pushed (using replace mode).
• admin < name | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
• admin < name | all > push < ensure | replace | exact > cluster-list [-omitrelated] [-report-only | -report]
• admin name reclaim cluster-list [-report-only | -report]
Managing Passwords
Passwords are key to administrator access to the web UI and CLI. In the web UI, you enter the password on
the Login page. In the CLI, you enter the password when you first invoke the nrcmd program. The local or
regional CCM administrator or superuser can change any administrator password.
You can prevent exposing a password on entry. In the web UI, logging in or adding a password never exposes
it on the page, except as asterisks. In the CLI, you can prevent exposing the password by creating an
administrator, omitting the password, then using admin name enterPassword, where the prompt displays
the password as asterisks. You can do this instead of the usual admin name set password command that
exposes the password as plain text.
Administrators can change their own passwords on clusters. If you want the password change propagated
from the regional server to all local clusters, log into the regional cluster. First ensure that your session
admin-edit-mode is set to synchronous, and then update your password.
Note The password should not be more than 255 characters long.
Managing Groups
A superuser, ccm-admin, or regional-admin can create, edit, and delete administrator groups. Creating an
administrator group involves:
• Adding its name.
• Adding an optional description.
• Choosing associated roles.
Adding Groups
To add a group, do the following:
Step 1 From the Administration menu, choose Groups under the User Access submenu. This opens the List/Add Administrator
Groups page (see the Create a Group to Assign to the Host Administrator, on page 118 for an example).
Step 2 Click the Add Groups icon in the Groups pane, enter a name and an optional description in the Add CCMAdminGroup
dialog box, and then click Add CCMAdminGroup.
Step 3 Choose one or more existing roles from the Roles Available list and then click Save.
Editing Groups
To edit a group, click the name of the group that you want to edit in the Groups pane to open the Edit
Administrator Group page. You can modify the name, description, or role membership in this page. You can
view the active roles in the Selected list.
Deleting Groups
To delete a group, select the group in the Groups pane, click the Delete Groups icon, and then confirm the
deletion. You can also cancel the deletion by clicking the Close button.
CLI Commands
Use group name create [attribute=value] to create a group.
Use group name delete to delete a group.
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push
and reclaim, a list of clusters or "all" may be specified. The push operation will also push the related roles
(using replace mode) and related owners and regions (using ensure mode) unless -omitrelated is specified
to prevent this.
• group < name | all > pull < ensure | replace > cluster-name [-report-only | -report]
• group < name | all > push < ensure | replace | exact > cluster-list [-omitrelated] [-report-only | -report]
• group name reclaim cluster-list [-report-only | -report]
Managing Roles
A superuser, ccm-admin, or regional-admin administrator can create, edit, and delete administrator roles.
Creating an administrator role involves:
• Adding its name.
• Choosing a base role.
• Possibly specifying if the role should be unconstrained, or read-only.
• Possibly adding constraints.
• Possibly assigning groups.
Adding Roles
To add a role, do the following:
Step 1 From the Administration menu, choose Roles under the User Access submenu. This opens the List/Add Administrator
Roles page.
Step 2 Click the Add Role icon in the Roles pane, enter a name, and choose a tenant and a base role in the Add Roles dialog
box, and then click Add Role.
Step 3 On the List/Add Administrator Roles page, specify any role constraints, subrole restrictions, or group selections, then
click Save.
Editing Roles
To edit a role, select the role in the Roles pane, then modify the name or any constraints, subrole restrictions,
or group selections on the Edit Administrator Role page. The active subroles or groups should be in the
Selected list. Click Save.
Deleting Roles
To delete a role, select the role in the Roles pane, click the Delete Role icon, and then confirm the deletion.
CLI Commands
To add and edit administrator roles, use role name create base-role [attribute=value] (see the role command
in the CLIGuide.html file in the /docs directory for syntax and attribute descriptions). The base roles have
default groups associated with them. To add other groups, set the groups attribute (a comma-separated string
value).
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. The push
and reclaim commands allow a list of clusters or "all". The push operation will also push the related groups
(using replace mode) and related owners and regions (using ensure mode). The pull operation will pull the
related owners and regions (using ensure mode). For either operation, specify -omitrelated to prevent this
and just push or pull the role.
• role < name | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
• role < name | all > push < ensure | replace | exact > cluster-list [-omitrelated] [-report-only | -report]
• role name reclaim cluster-list [-report-only | -report]
Granular Administration
Granular administration prevents unauthorized users from accidentally making a change on zones, address
blocks, subnets, and router interfaces. It also ensures that only authorized users view or modify specific scopes,
prefixes, and links. Granular administration constraints administrators to specific set of scopes, prefixes, and
links. A constrained administrator can view or make changes to authorized scope, prefix, and link objects
only. The CCM server uses owner and region constraints to authorize and filter IPv4 address space objects,
and DNS zone related objects (CCMZone, CCMReverseZone, CCMSecondaryZone, CCMRRSet, and
CCMHost). The zones are constrained by owners and regions. Owner or region attributes on the CCMSubnet
control access to scopes. Also, owner or region attributes on the Prefix and Link objects control access to
prefixes and links.
Step 1 From the Administration menu, choose Roles to open the List/Add Administrator Roles page.
Step 2 Click the Add Role icon in the Roles pane, enter a name for the custom role, for example, my-dhcp, choose a tenant, and
choose dhcp-admin from the Role drop-down list and click Add Role.
Step 3 Click True or False radio button as necessary, on the Add DHCP Administrator Role page.
Step 4 Choose the required sub roles in the Available field and move them to the Selected field.
Step 5 Click Add Constraint.
a) On the Add Role Constraint page, modify the fields as necessary.
b) Click Add Constraint. The constraint must have an index number of 1.
Step 6 Click Save.
The name of the custom role appears on the list of roles in the List/Add Administrator Roles page.
Related Topics
Scope-Level Constraints, on page 54
Prefix-Level Constraints, on page 55
Link-Level Constraints, on page 56
Scope-Level Constraints
A dhcp admin user can view or modify a scope if any of the following conditions is met:
• Owner of the subnet for the scope matches the dhcp-admin owner.
• Region of the subnet for the scope matches the region role constraints.
• Owner or region of the parent address block matches the dhcp-admin owner or region role constraints.
Note that the most immediate parent address block that has owner or region defined takes precedence.
Note These hierarchical authorization checks for dhcp-admin owner/region constraints are applicable to scopes,
subnets, and parent address blocks. Identical hierarchical authorization checks for addrblock-admin owner/region
constraints apply to address blocks and subnets. If you have dhcp-admin and the addrblock-admin privileges,
you can access address blocks and subnets, if either of the roles allow access.
Scope 'A' has subnet 10.0.0.0/24 has parent CCMSubnet with owner 'red'.
Scope 'B' has subnet 10.0.1.0/24 has parent CCMSubnet with no owner set.
Scope 'C' has subnet 10.10.0.0/24 has parent CCMSubnet with owner 'green' and
primary-subnet 10.0.0.0/24.
Scope 'D' has subnet 100.10.0.0/24 has parent CCMSubnet with owner unset, and no parent
block.
Step 1 From the Design menu, choose Scopes under the DHCPv4 submenu to open the List/Add DHCP Scopes.
Step 2 Click the Add Scopes icon in the Scopes pane, enter a name, subnet, primary subnet, choose policy, enter a selection-tag-list,
and select the scope template in the Add DHCP Scope dialog box.
Step 3 Click Add DHCP Scope. The List/Add DHCP Scopes page appears.
Step 4 Enter values for the fields or attributes as necessary.
Step 5 To unset any attribute value, check the check box in the Unset? column, then click Unset Fields at the bottom of the
page.
Step 6 Click Save to add scope or Revert to cancel the changes.
Tip If you add new scope values or edit existing ones, click Save to save the scope object.
Prefix-Level Constraints
You can view or modify a prefix, if you have either of the following:
• The ipv6-management subrole of the dhcp-admin, or addrblock-admin role on the local cluster.
• The central-cfg-admin, or regional-addr-admin role on the regional cluster.
You can view or modify a prefix if any of the following conditions is true:
• The owner or region of the parent link matches the owner or region role constraints defined for you.
• The owner or region of this prefix matches the owner or region role constraints defined for you.
• The owner or region of the parent prefix matches the owner or region role constraints defined for you.
You can view or modify a prefix if any of the following conditions is true:
• If the matching owner or region constraint for you is marked as read-only, then you can only view the
prefix.
• If the prefix references a parent link, the link owner or region constraints is applicable if the link owner
or region constraints set.
• If no parent link or prefix defines any owner or region constraints, then you can access this prefix only
if owner or region role constraints are not defined for you.
• If you are an unconstrained user, then you have access to all.
Step 1 From the Design menu, choose Address Tree under the DHCPv6 submenu to open the DHCP v6 Address Tree page.
Step 2 View a prefix by adding its name, address, and range, then choosing a DHCP type and possible template (see the "Viewing
IPv6 Address Space" section in Cisco Prime Network Registrar 9.1 DHCP User Guide).
Step 3 Choose the owner from the owner drop-down list.
Step 4 Choose the region from the region drop-down list.
Step 5 Click Add Prefix. The newly added Prefix appears on the DHCP v6 Address Tree page.
Step 1 From the Design menu, choose Prefixes under the DHCPv6 submenu to open the List/Add DHCP v6 Prefixes page.
Step 2 Click the Add Prefixes icon in the Prefixes pane, enter a name, address, and range for the prefix, then choose the DHCP
type and possible template.
Step 3 Choose the owner from the owner drop-down list.
Step 4 Choose the region from the region drop-down list.
Step 5 Click Add IPv6 Prefix. The newly added Prefix appears on the List/Add DHCP v6 Prefixes page and also under the
Prefixes pane on the left.
Link-Level Constraints
You can view or modify a link if:
• You are authorized for the ipv6-management subrole of the dhcp-admin or addrblock-admin role on the
local cluster, or the central-cfg-admin or regional-addr-admin role on the regional cluster.
• The owner or region of the link matches the owner or region role constraints defined for you.
• No owner or region is defined for the link, and only if no owner or region role constraints are defined
for you.
If you are an unconstrained user, then you have access to all links.
The following is an example of Link Level Constraints:
Step 1 From the Design menu, choose Links under the DHCPv6 submenu to open the List/Add DHCP v6 Links page.
Step 2 Click the Add Links icon in the Links pane, enter a name, then choose the link type, and enter a group.
Step 3 Click Add Link. The newly added DHCPv6 Link appears on the List/Add DHCP v6 Links page.
Create, modify, push, pull, or delete groups or roles with associated owners authorization owner-region
or regions
Related Topics
Pushing and Pulling Administrators, on page 58
Pushing and Pulling Groups, on page 62
Related Topics
Pushing Administrators to Local Clusters, on page 58
Pushing Administrators Automatically to Local Clusters , on page 58
Pulling Administrators from the Replica Database, on page 59
CLI Command
When connected to a regional cluster, you can use the admin < name | all > push < ensure | replace | exact
> cluster-list [-omitrelated] [-report-only | -report] command. A list of clusters or "all" may be specified.
For push, unless -omitrelated is specified, associated roles and groups are also pushed (using replace mode).
When synchronous mode is set, all the subsequent changes to user name and password are synchronized with
local clusters. You can modify your password on the regional server, and this change is automatically propagated
to local clusters.
If you are an admin user, you can make multiple changes to the user credentials on the regional cluster. All
these changes are automatically pushed to local clusters.
Step 1 From the Operate menu, choose Manage Servers under Servers submenu to open the Manage Servers page.
Step 2 Click the Local CCM Server link on the Manage Servers pane to open the Edit CCM Server page.
Step 3 Choose the synchronous radio buttons for the regional edit mode values for admin, dhcp, and dns.
Step 4 Choose the webui mode value from the webui-mode drop-down list.
Step 5 Enter the idle-timeout value.
Step 6 To unset any attribute value, check the check box in the Unset? column, then click Unset Fields at the bottom of the
page. To unset the attribute value or to change it, click Save, or Cancel to cancel the changes.
Note Enter values for the attributes marked with asterisks because they are required for CCM server operation. You
can click the name of any attribute to open a description window for the attribute.
Step 1 From the Administration menu, choose Administrators under the User Access submenu.
Step 2 On the List/Add Administrators page, click Pull Data on the Administrators pane. This opens the Select Replica Admin
Data to Pull dialog box.
Step 3 Click the Replica icon in the Update Replica Data column for the cluster. (For the automatic replication interval, see the
Replicating Local Cluster Data, on page 81.)
Step 4 Choose a replication mode using one of the Mode radio buttons. In most cases, you would leave the default Replace mode
enabled, unless you want to preserve any existing administrator properties already defined at the regional cluster by
choosing Ensure, or create an exact copy of the administrator database at the local cluster by choosing Exact (not
recommended).
Step 5 Click Pull Core Administrators next to the cluster, or expand the cluster name and click Pull Administrator to pull
an individual administrator in the cluster.
Step 6 On the Select Replica Admin Data to Pull dialog box, view the change set data, then click OK. You return to the List/Add
Administrators page with the pulled administrators added to the list.
Note If you do not have a regional cluster and would like to copy administrators, roles, or groups from one local
cluster to another, you can export them and then reimport them at the target cluster by using the cnr_exim tool
(see the Using the cnr_exim Data Import and Export Tool, on page 176). However, the tool does not preserve
the administrator passwords, and you must manually reset them at the target cluster. It is implemented this way
to maintain password security. The export command is:
cnr_exim -c admin -x -e outputfile.txt
CLI Command
When connected to a regional cluster, you can use the admin < name | all > pull < ensure | replace | exact
> cluster-name [-report-only | -report] command.
Step 1 From the Administration menu, choose Radius under the External Authentication submenu to view the List/Add
RADIUS Server page in the regional web UI.
Step 2 Click Push All icon in the Radius pane to push all the external authentication servers listed on the page, or Push to push
an individual external authentication server. This opens the Push Data to Local Clusters dialog box.
Step 3 Choose a push mode using one of the Data Synchronization Mode radio buttons.
• If you are pushing all the external authentication servers, you can choose Ensure, Replace, or Exact.
• If you are pushing a single external authentication server, you can choose Ensure or Replace.
In both the above cases, Ensure is the default mode.
Choose Replace only if you want to replace the existing external authentication server data at the local cluster.
Choose Exact only if you want to create an exact copy of the external authentication server data at the local cluster,
thereby deleting all external authentication servers that are not defined at the regional cluster.
Step 1 From the Administration menu, choose Radius under the External Authentication submenu to view the List/Add
Radius Server page in the regional web UI.
Step 2 On the List/Add Radius Server page, click Pull Data on the Radius pane. This opens the Select Replica External
Authentication Server Data to Pull dialog box.
Step 3 Click the Replica icon in the Update Replica Data column for the cluster. (For the automatic replication interval, see the
Replicating Local Cluster Data, on page 81.)
Step 4 Choose a replication mode using one of the Mode radio buttons.
Leave the default Replace mode enabled, unless you want to preserve any existing external authentication server properties
at the local cluster by choosing Ensure.
Note We do not recommend that you create an exact copy of the external authentication server data at the local cluster
by choosing Exact.
Step 5 Click Pull All External Authentication Servers next to the cluster.
Step 6 On the Report Pull Replica Authentication servers page, view the pull details, then click Run.
On the Run Pull Replica Authentication servers page, view the change set data, then click OK. You return to the List/Add
Authentication Server page with the pulled external authentication servers added to the list.
Step 1 From the Administration menu, choose Active Directory under the External Authentication submenu to view the
List/Add Active Directory Server page in the regional web UI.
Step 2 Click Push All on the Active Directory pane to push the external authentication server. This opens the Push Data to
Local Clusters dialog box.
Step 3 Choose a push mode using one of the Data Synchronization Mode radio buttons.
• If you are pushing all the external authentication servers, you can choose Ensure, Replace, or Exact.
• If you are pushing a single external authentication server, you can choose Ensure or Replace.
In both the above cases, Ensure is the default mode.
Choose Replace only if you want to replace the existing external authentication server data at the local cluster. Choose
Exact only if you want to create an exact copy of the external authentication server data at the local cluster, thereby
deleting all external authentication servers that are not defined at the regional cluster.
CLI Command
When connected to a regional cluster, you can use the auth-ad-server < name | all > push < ensure | replace
| exact > cluster-list [-report-only | -report] command. A list of clusters or "all" may be specified.
Step 1 From the Administration menu, choose Active Directory under the External Authentication submenu to view the
List/Add Active Directory Server page in the regional web UI.
Step 2 On the List/Add Active Directory Server page, click Pull Data on the Active Directory pane. This opens the Select
Replica External Authentication Server Data to Pull dialog box.
Step 3 Click the Replica icon in the Update Replica Data column for the cluster (For the automatic replication interval, see
the Replicating Local Cluster Data, on page 81).
Step 4 Choose a replication mode using one of the Mode radio buttons.
Leave the default Replace mode enabled, unless you want to preserve any existing external authentication server properties
at the local cluster by choosing Ensure.
Note We do not recommend that you create an exact copy of the external authentication server data at the local cluster
by choosing Exact.
Step 5 Click Pull All External Authentication Servers next to the cluster.
Step 6 On the Report Pull Replica Authentication servers page, view the pull details, and then click Run.
On the Run Pull Replica Authentication servers page, view the change set data, and then click OK. You return to the
List/Add Authentication Server page with the pulled external authentication servers added to the list.
CLI Command
When connected to a regional cluster, you can use the auth-ad-server < name | all > pull < ensure | replace
| exact > cluster-name [-report-only | -report] command.
Related Topics
Pushing Groups to Local Clusters, on page 62
Pulling Groups from the Replica Database, on page 63
Step 1 From the Administration menu, choose Groups under the User Access submenu.
Step 2 On the List/Add Administrator Groups page, click the Push All icon on Groups pane to push all the groups listed on the
page, or Push to push an individual group. This opens the Push Data to Local Clusters dialog box.
Step 3 Choose a push mode using one of the Data Synchronization Mode radio buttons. If you are pushing all the groups, you
can choose Ensure, Replace, or Exact. If you are pushing a single group, you can choose Ensure or Replace. In both cases,
Ensure is the default mode. You would choose Replace only if you want to replace the existing group data at the local
cluster. You would choose Exact only if you want to create an exact copy of the group data at the local cluster, thereby
deleting all groups that are not defined at the regional cluster.
Step 4 By default, the associated roles and owners are pushed along with the group. Roles are pushed in Replace mode and
owners in Ensure mode. To disable pushing the associated roles or owners, uncheck the respective check box.
Step 5 Choose one or more local clusters in the Available field of the Destination Clusters and move it or them to the Selected
field.
Step 6 Click Push Data to Clusters.
Step 7 On the View Push Group Data Report page, view the push details, then click OK to return to the List/Add Administrator
Groups page.
CLI Command
When connected to a regional cluster, you can use the group < name | all > push < ensure | replace | exact
> cluster-list [-omitrelated] [-report-only | -report] command. A list of clusters or "all" may be specified.
This operation will also push the related roles (using replace mode) and related owners and regions (using
ensure mode). To prevent this and to just push the group, specify -omitrelated.
Step 1 From the Administration menu, choose Groups under the User Access submenu.
Step 2 On the List/Add Administrator Groups page, click the Pull Data icon on the Groups pane. This opens the Select Replica
CCMAdminGroup Data to Pull dialog box.
Step 3 Click the Replica icon in the Update Replica Data column for the cluster. (For the automatic replication interval, see the
Replicating Local Cluster Data, on page 81.)
Step 4 Choose a replication mode using one of the Mode radio buttons. In most cases, you would leave the default Replace mode
enabled, unless you want to preserve any existing group properties at the local cluster by choosing Ensure, or create an
exact copy of the group data at the local cluster by choosing Exact (not recommended).
Step 5 Click Pull Core Groups next to the cluster, or expand the cluster name and click Pull Group to pull an individual group
in the cluster.
Step 6 On the Report Pull Replica Groups page, view the pull details, then click Run.
Step 7 On the Run Pull Replica Groups page, view the change set data, then click OK. You return to the List/Add Administrator
Groups page with the pulled groups added to the list.
CLI Command
When connected to a regional cluster, you can use the group < name | all > pull < ensure | replace >
cluster-name [-report-only | -report] command.
Related Topics
Pushing Roles to Local Clusters, on page 64
Pulling Roles from the Replica Database, on page 65
Step 1 From the Administration menu, choose Roles under the User Access submenu.
Step 2 On the List/Add Administrator Roles page, click the Push All icon in the Roles pane to push all the roles listed on the
page, or Push to push an individual role. This opens the Push Data to Local Clusters dialog box.
Step 3 Choose a push mode using one of the Data Synchronization Mode radio buttons. If you are pushing all the roles, you can
choose Ensure, Replace, or Exact. If you are pushing a single role, you can choose Ensure or Replace. In both cases,
Ensure is the default mode. You would choose Replace only if you want to replace the existing role data at the local
cluster. You would choose Exact only if you want to create an exact copy of the role data at the local cluster, thereby
deleting all roles that are not defined at the regional cluster.
Step 4 By default, the associated groups and owners are pushed along with the role. Groups are pushed in Replace mode and
owners in Ensure mode. To disable pushing the associated roles or owners, uncheck the respective check box:
• If you disable pushing associated groups and the group does not exist at the local cluster, a group based on the name
of the role is created at the local cluster.
• If you disable pushing associated owners and the owner does not exist at the local cluster, the role will not be
configured with its intended constraints. You must separately push the group to the local cluster, or ensure that the
regional administrator assigned the owner-region subrole has pushed the group before pushing the role.
Step 5 Choose one or more local clusters in the Available field of the Destination Clusters and move it or them to the Selected
field.
CLI Command
When connected to a regional cluster, you can use the role < name | all > push < ensure | replace | exact >
cluster-list [-omitrelated] [-report-only | -report] command. A list of clusters or "all" may be specified. This
operation will also push the related groups (using replace mode) and related owners and regions (using ensure
mode). To prevent this and to just push the role, specify -omitrelated.
Step 1 From the Administration menu, choose Roles under the User Access submenu.
Step 2 On the List/Add Administrator Roles page, click the Pull Data icon in the Roles pane. This opens the Select Replica
Administrator Role Data to Pull dialog box.
Step 3 Click the Replica icon in the Update Replica Data column for the cluster. (For the automatic replication interval, see
the Replicating Local Cluster Data, on page 81.)
Step 4 Choose a replication mode using one of the Mode radio buttons. In most cases, you would leave the default Replace mode
enabled, unless you want to preserve any existing role properties at the local cluster by choosing Ensure, or create an
exact copy of the role data at the local cluster by choosing Exact (not recommended).
Step 5 If you have the owner-region subrole permission, you can decide if you want to pull all the associated owners with the
role, which is always in Ensure mode. This choice is enabled by default.
Step 6 Click Pull Core Roles next to the cluster, or expand the cluster name and click Pull Role to pull an individual role in
the cluster.
Step 7 On the Report Pull Replica Roles page, view the pull details, then click Run.
Step 8 On the Run Pull Replica Roles page, view the change set data, then click OK. You return to the List/Add Administrator
Roles page with the pulled roles added to the list.
CLI Command
When connected to a regional cluster, you can use the role < name | all > pull < ensure | replace | exact >
cluster-name [-report-only | -report] command. This operation will pull the related owners and regions (using
ensure mode). To prevent this and to just pull the role, specify -omitrelated.
Step 1 From the Administration menu, choose Tenants under the User Access submenu to view the List/Add Tenants page in
the regional web UI.
Step 2 Click the Push All icon in the Tenants pane to push all the tenants listed on the page, or Push to push an individual
tenant. This opens the Push Tenant Data to Local Clusters page.
Step 3 Choose a push mode using one of the Data Synchronization Mode radio buttons.
• If you are pushing all the tenant, you can choose Ensure, Replace, or Exact.
• If you are pushing a single tenant, you can choose Ensure or Replace.
In both cases, Ensure is the default mode.
Choose Replace only if you want to replace the tenant data at the local cluster. Choose Exact only if you want to
create an exact copy of the tenant data at the local cluster, thereby deleting all tenants that are not defined at the
regional cluster.
CLI Command
When connected to a regional cluster, you can use the tenant < tag | all > push < ensure | replace | exact >
cluster-list [-report-only | -report] command. A list of clusters or "all" may be specified.
Step 1 From the Administration menu, choose Tenants under the User Access submenu to view the List/Add Tenants page.
Step 2 On the List/Add Tenants page, click the Pull Data icon in the Tenants pane. This opens the Select Replica Tenant Data
to Pull dialog box.
Step 3 Click the Replica icon in the Update Replica Data column for the cluster. (For the automatic replication interval, see the
Replicating Local Cluster Data, on page 81.)
Step 4 Choose a replication mode using one of the Mode radio buttons.
Leave the default Replace mode enabled, unless you want to preserve any existing tenant data at the local cluster by
choosing Ensure.
Note We do not recommend that you create an exact copy of the tenant data at the local cluster by choosing Exact.
CLI Command
When connected to a regional cluster, you can use the tenant < tag | all > pull < ensure | replace | exact >
cluster-name [-report-only | -report] command.
Managing Owners
You can create owners to associate with address blocks, subnets, prefixes, links, and zones. You can list and
add owners on a single page. Creating an owner involves creating a tag name, full name, and contact name.
Step 1 From the Administration menu, choose Owners under the Settings submenu to open the List/Add Owners page. The
regional cluster includes pull and push functions also.
Step 2 Click the Add Owners icon in the Owners pane on the left. This opens the Add Owner page.
Step 3 Enter a unique owner tag.
Step 4 Enter an owner name.
Step 5 Enter an optional contact name.
Step 6 Click Add Owner.
Step 7 To edit an owner, click its name in the Owners pane on the left.
CLI Commands
Use owner tag create name [attribute=value] to create an owner. For example:
nrcmd> owner owner-1 create "First Owner" contact="Contact at owner-1"
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push
and reclaim, a list of clusters or "all" may be specified.
• owner < tag | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
• owner < tag | all > push < ensure | replace | exact > cluster-list [-report-only | -report]
• owner tag reclaim cluster-list [-report-only | -report]
Managing Regions
You can create regions to associate with address blocks, subnets, prefixes, links, and zones. You can list and
add regions on a single page. Creating a region involves creating a tag name, full name, and contact name.
Step 1 From the Administration menu, choose Regions under the Settings submenu to open the List/Add Regions page. The
regional cluster includes pull and push functions also.
Step 2 Click the Add Regions icon in the Regions pane on the left.
Step 3 Enter a unique region tag.
Step 4 Enter a region name.
Step 5 Enter an optional contact name.
Step 6 Click Add Region.
Step 7 To edit a region, click its name in the Regions pane on the left.
CLI Commands
Use region tag create name [attribute=value]. For example:
nrcmd> region region-1 create "Boston Region" contact="Contact at region-1"
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push
and reclaim, a list of clusters or "all" may be specified.
• region < tag | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
• region < tag | all > push < ensure | replace | exact > cluster-list [-report-only | -report]
• region tag reclaim cluster-list [-report-only | -report]
Related Topics
Pushing and Pulling Owners or Regions, on page 71
Related Topics
Pushing Owners or Regions to Local Clusters, on page 71
Pulling Owners and Regions from the Replica Database, on page 72
Regional Web UI
Step 1 From the Administration menu, choose Owners or Regions under the Settings submenu.
Step 2 On the List/Add Owners or List/Add Regions page, click the Push All icon in the left pane, or click Push at the top of
the Edit Owner page or Edit Region page, for a particular owner or region. This opens the Push Owner or Push Region
page.
Step 3 Choose a push mode using one of the Data Synchronization Mode radio buttons.
• If you are pushing all the owners or regions, you can choose Ensure, Replace, or Exact.
• If you are pushing a single owner or region, you can choose Ensure or Replace.
In both the above cases, Ensure is the default mode.
Choose Replace only if you want to replace the existing owner or region data at the local cluster. Choose Exact only
if you want to create an exact copy of the owner or region data at the local cluster, thereby deleting all owners or
regions that are not defined at the regional cluster.
Step 4 Choose one or more local clusters in the Available field of the Destination Clusters and move it or them to the Selected
field.
Step 5 Click Push Data to Clusters.
Step 6 On the View Push Owner Data Report or View Push Region Data Report page, view the push details, then click OK to
return to the List/Add Owners or List/Add Regions page.
CLI Commands
When connected to a regional cluster, you can use the following push commands. For push command, a list
of clusters or "all" may be specified.
• owner < tag | all > push < ensure | replace | exact > cluster-list [-report-only | -report]
• region < tag | all > push < ensure | replace | exact > cluster-list [-report-only | -report]
Regional Web UI
Step 1 From the Administration menu in the regional cluster web UI, choose Owners or Regions under the Settings submenu.
Step 2 On the List/Add Owners or List/Add Regions page, click the Pull Data icon in the left pane. This opens the Select Replica
Owner Data to Pull or Select Replica Region Data to Pull page.
Step 3 Click the Replicate icon in the Update Replica Data column for the cluster. (For the automatic replication interval, see
Replicating Local Cluster Data, on page 81.)
Step 4 Choose a replication mode using one of the Mode radio buttons.
Leave the default Replace mode enabled, unless you want to preserve any existing owner or region properties at the local
cluster by choosing Ensure.
Note We do not recommend that you create an exact copy of the owner or region data at the local cluster by choosing
Exact.
Step 5 Click Pull All Owners or Pull All Regions next to the cluster, or expand the cluster name and click Pull Owner or Pull
Region to pull an individual owner or region in the cluster.
Step 6 On the Report Pull Replica Owners or Report Pull Replica Regions page, click Run.
Step 7 On the Run Pull Replica Owners or Run Pull Replica Region page, view the change set data, then click OK. You return
to the List/Add Owners or List/Add Regions page with the pulled owners or regions added to the list.
CLI Commands
When connected to a regional cluster, you can use the following pull commands.
• owner < tag | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
• region < tag | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
These functions are available only to administrators assigned the central-cfg-admin role. (The full list of
functions for the central-cfg-admin are listed in Table 5: Regional Cluster Administrator Predefined and Base
Roles, on page 39.) Note that central configuration management does not involve setting up administrators
and checking the status of the regional servers. These functions are performed by the regional administrator,
as described in Licensing, on page 75 and Managing Servers, on page 131.
53 TCP/UDP DNS
Firewall Considerations
When DNS (caching or authoritative) servers are deployed behind a stateful firewall (whether physical hardware
or software, such as conntrack), it is recommended that:
• For at least UDP DNS traffic, stateful support be disabled if possible.
• If it is not possible to disable the stateful support, the number of allowed state table entries may need to
be significantly increased.
DNS queries typically arrive from many different clients and requests from the same client may use different
source ports. With thousands of queries per second, the number of these different sources can be large and if
a firewall is using stateful tracking, it has to keep this state and does so for a period of time. Hence, you need
to assure that the firewall can hold sufficient state - given the query traffic rates and the state time interval.
Licensing
Cisco Prime Network Registrar requires separate license for CCM, Authoritative DNS, Caching DNS, and
DHCP services or for combinations of these services. For more details on the Licensing, see the “License
Files” section in the Overview chapter of the Cisco Prime Network Registrar 9.1 Installation Guide.
See Logging In to the Web UIs, on page 11 for entering license data the first time you try to log in. You can
add the additional service based licenses in the regional server after you log in.
Whenever you log into a regional or local cluster, the overall licensing status of the system is checked. If there
are any violations, you will be notified of the violation and the details. This notification is done only once for
each user session. In addition, you will be able to see a message on each page indicating the violation.
Regional Web UI
Choose Licenses from Administration > User Access to open the List/Add Product Licenses page. Click
Browse to locate the license file, click the file, then click Open. If the license ID in the file is valid, the license
key appears in the list of licenses with the message “Successfully added license file “filename.” If the ID is
not valid, the License field shows the contents of the file and the message “Object is invalid” appears.
The License Utilization section at the top of the page lists the type of license, the number of nodes allowed
for the license, and the actual number of nodes used. Expand the section by clicking the plus (+) sign. The
license utilization for each licensed service is listed separately in this section.
The Right To Use and the In Use counts are displayed for each licensed service. The Right To Use value will
be the aggregation of the counts across all added licenses for that service. The ‘total in use’ value will be the
aggregation of the latest utilization numbers obtained from all the local clusters. Only the services having a
positive Right to use or In Use count will be listed in this section.
Licenses and usage count of earlier versions of Cisco Network Registrar will be listed under a separate section
“ip-node”.
The Expert mode attribute lets you specify how often license utilization is collected from all the local clusters.
Changes to this setting require a server restart to take effect. You can set this attribute at the Edit CCM Server
page. The default value is 4 hours.
Adding License
Cisco will e-mail you one or more license files after you register the Cisco Prime Network Registrar Product
Authorization Key (PAK) on the web according to the Software License Claim Certificate shipped with the
product. Cisco administers licenses through a FLEXlm system.
Note If a license file fails to load, check that the file is properly formatted text file without any extraneous characters
in it. Extracting the file from email and moving it between systems can sometimes result in these problems.
Step 1 Locate the license file or files in a directory (or on the desktop) that is easy to find.
Step 2 On the List/Add Product Licenses page, browse for each file by clicking the Choose File button.
Note The List/Add Product Licenses option is only available at the Regional.
Step 3 In the Choose file window, find the location of the initial license file, then click Open.
Step 4 If the license key is acceptable, the Add Superuser Administrator page appears immediately.
Step 5 To add further licenses, from Administration menu, choose Licenses under the User Access submenu to open the
List/Add Product Licenses page. Click Choose File to locate the additional license file, then click Open. If the key in
the file is acceptable, the key, type, count, and expiration date appear, along with whether it is an evaluation key. If the
key is not acceptable, the page shows the license text along with an error message. For the list of license types, see
Licensing, on page 75.
Above the table of licenses is a License Utilization area that, when expanded, shows the license types along with the total
nodes that you can use and those actually used.
If Cisco Prime Network Registrar is installed as a distributed system, the license management is done from the regional
cluster. You will not have the option of adding licenses in local cluster.
CLI Commands
Use license file create to register licenses that are stored in file. The file referenced should include its absolute
path or path relative to where you execute the commands. For example:
nrcmd-R> license "C:\licenses\product.licenses" create
Use license list to list the properties of all the created licenses (identified by key), and license listnames to
list just the keys. Use license key show to show the properties of a specific license key.
local cluster is behind a NAT instance, then the registration may fail because the initial request does not reach
the regional cluster.
In Cisco Prime Network Registrar 8.3 and later, you can register a local cluster that is behind a NAT instance
by initiating the registration from the local cluster. To register a local cluster that is spanned by a NAT instance,
you must ensure that Cisco Prime Network Registrar 8.3 or later is installed on both the regional and local
clusters. You can also verify the license utilization for the local cluster.
Note To register a local cluster when the regional cluster is behind a NAT instance, you need to register the local
cluster from the regional server by registering the local cluster from the regional server, selecting the services
and resynchronizing the data.
Step 1 From Administration menu, choose Licenses under the User Access submenu to open the List Licenses page.
On the List Licenses page, add the details of the regional cluster.
a) Enter the IP address (IPv4 and/or IPv6) of the regional cluster.
b) Enter the SCP port of the regional cluster (1244 is the preset value).
c) Select the IP address (IPv4 and/or IPv6) of the local cluster that you want to register.
d) Select the component services that you want to register for the local cluster.
Step 2 Click Register.
Note The regional CCM server maintains the license utilization history for all the local clusters in the Cisco Prime
Network Registrar system for all counted services (DHCP, DNS, and CDNS).
To view the license utilization for the local cluster, click Check Poll Status.
CLI Commands
Use the following commands to register or re-register a local cluster:
nrcmd> license register [cdns|dns|dhcp[,...]] [<regional-ip>|<regional-ipv6>]
[<regional-port>] [-new-uuid]
License History
The License History page allows you to view the licenses utilized in the specified time frame. Starting from
release 9.1, you can view the license history in the form of chart, wherein you can see the license utilization
history for various services over a period of time in one view. Also, the data is displayed in reverse chronological
order, so that the most recent data is displayed on top. Based on usage and services configured, the chart's
Y-axis may vary.
To view the license history, do the following:
Regional Web UI
Step 1 From the Administration menu, choose License History under the User Access submenu to open the View License
Utilization History page.
Step 2 Specify the filter settings in the Set License History Filter attribute. Enable the Down-sample results checkbox to
down-sample the data set that matches the filter options to fit within the specified number of time buckets.
Step 3 Click Apply Filter to view the license history for the specified time frame.
• The details appear in the form of chart under the License History Charts tab. You can change the chart type by
clicking the Chart Type icon present below the chart. The different types of chart available are: Column Chart,
Line Chart, Area Chart, and Scatter Chart. Click the Table View icon below the chart to view the chart data in the
form of table.
• Click the License Table tab to view the license history details in the form of table.
CLI Command
Use license showUtilization to view the number of utilized IP nodes against the RTUs (Right-to-Use) (see
the license command in the CLIGuide.html file in the /docs directory for syntax and attribute descriptions).
License Utilization
The regional CCM server periodically collects license utilization information from the local clusters and
updates the local clusters about whether licensing is in compliance or not based on the collected usage and
registered licenses.
The regional server collects the following metrics from the local clusters to determine the license counts:
• DHCP services—The count of active leases is obtained by summing the DHCPv4 and DHCPv6 lease
counts.
The DHCPv4 count is calculated from the DHCP server’s server category active-leases + reserved-leases
– reserved-active-leases statistics.
For Cisco Prime Network Registrar 9.1.3 and later 9.x releases, the DHCPv6 count is calculated from
the DHCP server’s dhcpv6 category active-leases + reserved-leases – reserved-active-leases statistics.
For 9.x releases prior to 9.1.3, the DHCPv6 count uses the DHCP server’s dhcpv6 category
allocation-leases statistics.
• Auth DNS services—The count is from the DNS server’s server category total-rrs statistic.
• Caching DNS services—The count is 1 if CDNS has been licensed on the cluster.
Note For failover-pairs and HA-DNS pairs, only one of the clusters is contacted; usually the main if it is reachable.
If the regional does not have valid failover-pair and HA-DNS information, it may calculate incorrect license
utilization for DHCP or DNS.
Related Topics
Adding Local Clusters, on page 79
Editing Local Clusters, on page 80
Connecting to Local Clusters, on page 81
Synchronizing with Local Clusters, on page 81
Replicating Local Cluster Data, on page 81
Viewing Replica Data, on page 82
Purging Replica Data, on page 83
Deactivating, Reactivating, and Recovering Data for Clusters, on page 83
Viewing Cluster Report, on page 84
Polling Utilization and Lease History Data, on page 99
Enabling Lease History Collection, on page 101
You can also set whether you want outbound connections to local servers to be secure by setting the use-ssl
attribute to optional or required. It is set to optional by default, and it requires the Cisco Prime Network
Registrar Communications Security Option installed to be effective.
Regional Web UI
From the Operate menu, choose Manage Servers under the Servers submenu. This opens the Manage Servers
page. View the local clusters on this page. You can also add server clusters on the List/Add Remote Clusters
page. The List/Add Remote Clusters page provides the following functions:
• Connect to a local cluster web UI for local administration.
• Resynchronize with a local cluster to reconcile updates there.
• Pull data over to a regional cluster replica database.
• Purge replica to clear the bad replica data without deleting/re-adding the cluster. Whenever you perform
purge replica, you must perform manual replication to the get the replica data again.
• Query DHCP utilization data from a local cluster. This function appears only if you are assigned the
regional-addr-admin role with at least the subnet-utilization subrole.
• Query lease history data from a local cluster. This function appears only if you are assigned the
regional-addr-admin role with at least the lease-history subrole.
To add a cluster, click the Add Cluster icon in the Manage Clusters pane. This opens the Add Cluster dialog
box. For an example of adding a local cluster, see Create the Local Clusters, on page 120. Click Add Cluster
to return to the List/Add Remote Clusters page.
Local Web UI
You can also manage clusters in the local web UI. See Configuring Clusters in the Local Web UI, on page
19 for details.
CLI Commands
To add a cluster, use cluster name create <address | ipv6-address> [attribute=value ...] to give the cluster a
name and address and set the important attributes. For example:
nrcmd> cluster example-cluster create 192.168.100.101 admin=admin password=changeme
Note that the administrator must be a superuser to fully synchronize at the local cluster.
Regional Web UI
To edit a local cluster, click its name on the Manage Clusters pane to open the Edit Remote Cluster page. This
page is essentially the same as the List/Add Remote Clusters page, except for an additional attribute unset
function. You can choose the service (dhcp, dns, cdns, or none) that you want to run in the local by
checking/unchecking the check boxes provided in the Local Services area. Make your changes, then click
Save.
Local Web UI
You can also edit clusters in the local web UI. See Configuring Clusters in the Local Web UI, on page 19 for
details.
CLI Commands
To edit a local cluster, use cluster name set attribute=value [attribute=value ...] to set or reset the attributes.
For example:
nrcmd> cluster Example-cluster set poll-replica-interval=8h
Note When you resynchronize clusters at the regional cluster, an automatic reinitialization of replica data occurs.
The result is that for larger server configurations, resynchronization might take several minutes. The benefit,
however, is that you do not need a separate action to update the replica data.
Replication happens at a given time interval. You can also force an immediate replication by clicking the
Replicate icon on the List/Add Remote Clusters page.
You can set the automatic replication interval on the Add Server Cluster page, or adjust it on the Edit Server
Cluster page, using the poll-replica-interval attribute. This interval is preset at four hours. You can also set
the fixed time of day to poll replica data by using the poll-replica-offset attribute; its default value is zero
hours (no offset). The poll-replica-rrs attribute controls the replication of RR data without disabling other
data replication. This attribute is present in Manage Servers and Manage Clusters page and has the values -
none, all, and protected. If poll-replica-rrs is set to none, no RR data will be replicated for this cluster. If
unset, the CCM server setting will apply.
Caution If the replica database is corrupted in any way, the regional CCM server will not start. If you encounter this
problem, stop the regional service, remove (or move) the replica database files located in the
install-path/regional/data/replica directory (and the log files in the /logs subdirectory), then restart the regional
server. Doing so recreates the replica database without any data loss.
Regional Web UI
Select the:
1. Cluster in the Select Cluster list.
2. Object class in the Select Class list.
3. Replicate the data for the cluster and class chosen. Click the Replicate Data for Cluster button.
4. View the replica data. Click View Replica Class List. This opens a List Replica Data for Cluster page
for the cluster and specific class of object you choose. On this page, you can:
• Click the name of an object to open a View page at the regional cluster. Return to the List Replica page
by clicking Return to object List.
Note The List Replica Address Blocks and List Replica Subnets pages do not provide
this function. To view the address blocks or subnets for the local cluster, use the
Go Local icon.
• Click the Connect icon to go to the List page for the object at the local cluster. Return to the List Replica
object page by clicking the Return icon.
Click Return on the List Replica Data for Cluster page to return to the View Replica Class List page.
Note If the local secret db is lost, the old references are no longer valid, even though
they are restored. To recover your passwords, you have to use central management
for your admins, and then push them to your local clusters. Routers, since they
have their own secrets, also need to be centrally managed and then should be
re-pushed. For the local cluster partner objects, running the sync from regional
will create valid objects, but the old cluster objects may need to be deleted first.
• Lease history
• Extension scripts
Note Restoring the data to a different IP address requires some manual reconfiguration of such things as DHCP
failover server pair and High-Availability (HA) DNS server pair addresses.
Regional Web UI
Deactivate a cluster by clicking the Deactivate button for the cluster. This immediately changes the button
to Reactivate to show the status of the cluster. Deactivating a cluster disables deleting, synchronizing, replicating
data, and polling DHCP utilization and lease history. These operations are not available while the cluster is
deactivated.
Deactivating the cluster also displays the Recover icon in the Recover Data column of the cluster. Click this
icon to recover the replica data. This opens a separate “in process” status window that prevents any operations
on the web UI pages while the recovery is in process. As soon as the recovery is successful, the disabled
functions are again enabled and available.
To reactivate the cluster, click the Reactivate button to change back to the Deactivate button and show the
status as active.
CLI Commands
The following cluster commands are only available when connected to a regional cluster:
Action Command
View Replica Data cluster name viewReplicaData < class-name | cli-command > [-listbrief | -listcsv]
Step 1 From the Operate menu, choose Manage Clusters under the Servers submenu to open the List/Add Remote Clusters
page.
Step 2 Click the cluster name on the left pane.
Step 3 Click the Cluster Report tab on the Edit Remote Cluster page. The relevant information for the selected cluster is
displayed. The current system and resource metrics for the cluster are displayed in the form of chart/table. Use the Show
icon ( ) present below the chart to display the data in the form of chart or table and use the Chart Type icon ( )
to change the type of chart. The different types of chart available are: Column Chart, Line Chart, Area Chart, and Scatter
Chart.
Step 1 To access the CCM server properties, choose Manage Servers under the Operate menu to open the Manage Servers
page.
Step 2 Click Local CCM Server in the Manage Servers pane on the left. The Edit Local CCM Server page appears. This page
displays all the CCM server attributes.
Step 3 Modify the settings as per your requirement.
Step 4 Click Save to save the CCM server attribute modifications.
Related Topics
Viewing and Editing the TFTP Server, on page 86
Managing the TFTP Server Network Interfaces, on page 86
Step 1 From the Operate menu, choose Manage Servers under the Servers submenu to open the Manage Servers page (see
Managing Servers, on page 131).
Step 2 Click the Local TFTP Server link in the left pane to open the Edit Local TFTP Server page.
You can click the name of any attribute to open a description window for the attribute.
Step 3 To unset any attribute value, check the check box in the Unset? column.
Step 4 Click Save to save the changes or Revert to cancel the changes.
CLI Commands
Use tftp show to show the attribute values. Use tftp set attribute=value [attribute=value ...] or tftp enable
attribute to set or enable attributes. You can also use tftp serverLogs show, and tftp serverLogs nlogs=number
logsize=size.
interfaces, and create and edit additional ones. To create and edit them, you must be assigned the
server-management subrole of the ccm-admin role.
The columns in the Network Interfaces page are:
• Name—Name of the network interface, such as the LAN adapter, loopback, and Fast Ethernet interfaces.
If the name is under the Configured Interfaces column, you can edit and delete the interface. Clicking
the name opens the Edit TFTP Server Network Interface page so that you can edit the interface name
and addresses. Make the changes and then click Save on this page.
• IP Address—IP address of the network interface.
• IPv6 Address—IPv6 address, if applicable, of the network interface.
• Flags—Flags for whether the interface should be zero-broadcast, virtual, v4, v6, no-multicast, or
receive-only.
• Configure—To configure a new network interface, click the Configure icon next to the interface name.
This creates another interface based on the one selected, but with a more general IP address, and adds
this interface to the Configured Interfaces for this TFTP Server.
• List of available interfaces for this TFTP server—User-configured network interfaces, showing each
name and associated address. Click the interface name to edit it or click the Delete icon to delete it.
To return to managing the server, click Revert.
CLI Commands
Use the tftp-interface commands.
Refer to the Management Information Base (MIB) for the details. The SNMP server supports only reads of
the MIB attributes. Writes to the attributes are not supported.
The following MIB files are required:
• Traps—CISCO-NETWORK-REGISTRAR-MIB.my and CISCO-EPM-NOTIFICATION-MIB.my
• DNS server—CISCO-DNS-SERVER-MIB.my
Note The Caching DNS server requires only a subset of the DNS MIB when it is
operating. Caching DNS server only supports the server-start and server-stop
notification events.
• DHCPv4 server—CISCO-IETF-DHCP-SERVER-MIB.my
• DHCPv4 server capability—CISCO-IETF-DHCP-SERVER-CAPABILITY.my
• DHCPv4 server extensions—CISCO-IETF-DHCP-SERVER-EXT-MIB.my
• DHCPv4 server extensions capability—CISCO-IETF-DHCP-SERVER-EXT-CAPABILITY.my
• DHCPv6 server—CISCO-NETREG-DHCPV6-MIB.my (experimental)
Note The MIB, CISCO-NETREG-DHCPV6-MIB is defined to support query of new DHCP v6 related statistics
and new DHCP v6 traps.
These MIB files are available in the /misc directory of the Cisco Prime Network Registrar installation path.
The following URL includes all files except the experimental CISCO-NETREG-DHCPV6-MIB.my file:
ftp://ftp.cisco.com/pub/mibs/supportlists/cnr/cnr-supportlist.html
The following dependency files are also required:
• Dependency for DHCPv4 and DHCPv6—CISCO-SMI.my
• Additional dependencies for DHCPv6—INET-ADDRESS-MIB.my
These dependency files are available along with all the MIB files at the following URL:
ftp://ftp.cisco.com/pub/mibs/v2/
To get the object identifiers (OIDs) for the MIB attributes, go to the equivalently named .oid file at:
ftp://ftp.cisco.com/pub/mibs/oid/
Related Topics
Setting Up the SNMP Server, on page 88
How Notification Works, on page 89
Handling SNMP Notification Events, on page 92
Handling SNMP Queries, on page 96
Step 1 From the Operate menu, choose Manage Servers under the Servers submenu to open the Manage Servers page (see
Managing Servers, on page 131).
Step 2 Click the Local SNMP Server link to open the Edit Local SNMP Server page.
Step 3 The Community string attribute is the password to access the server. (The community string is a read community string
only.) The preset value is public.
Step 4 You can specify the Log Settings, Miscellaneous Options and Settings, and Advanced Options and Settings:
• trap-source-addr—Optional sender address to use for outgoing traps.
Step 5 To manage the SNMP server interfaces, in the Advanced mode, click the Network Interfaces tab. You can view the
default configured network interfaces, and create and edit additional ones. To create and edit them, you must be assigned
the server-management subrole of the ccm-admin role. The interface properties are similar to those for the TFTP server
(see Managing the TFTP Server Network Interfaces, on page 86).
Step 6 To manage trap recipients for the server:
a) Click the Trap Recipients tab.
b) Enter the name of the trap recipient.
c) Enter the IPv4 and/or IPv6 address of a trap recipient.
d) Click Add Trap Recipient.
e) Repeat for each additional trap recipient.
f) To set the port, community string, and agent address for a trap recipient, click its name on the Trap Recipients tab to
open the Edit Trap Recipient page, then set the values.
Step 7 Complete the SNMP server setup by clicking Save.
CLI Commands
To set the community string in the CLI so that you can access the SNMP server, use snmp set
community=name. Use snmp set trap-source-addr=value to set the trap source IPv4 address. Use snmp
set trap-source-ip6address=value to set the trap source IPv6 address. Use snmp disable server-active to
deactivate the SNMP server and snmp set cache-ttl=time to set the cache time-to-live.
To set trap recipients, use trap-recipient name set attribute=value [attribute=value ...]. For example:
nrcmd> trap-recipient example-recipient set ip-addr=192.168.0.34
nrcmd> trap-recipient example-recipient set ip6address=2001:4f8:ffff:0:8125:ef1b:bdcb:4b4e
You can also add the agent-address, community, and port-number values for the trap recipient.
Other SNMP-related commands include snmp disable server-active to prevent the server from running when
started and the snmp-interface commands to configure the interfaces. The addr-trap command is described
in Managing the TFTP Server Network Interfaces, on page 86.
Event Notification
Address conflict with another DHCP server detected An address conflicts with another DHCP server.
(address-conflict)
DNS queue becomes full (dns-queue-size) The DHCP server DNS queue fills and the DHCP
server stops processing requests. (This is usually a
rare internal condition.)
Duplicate IP address detected (duplicate-address and A duplicate IPv4 or IPv6 address occurs.
duplicate-address6)
Free-address thresholds (free-address-low and The high trap when the number of free IPv4 or IPv6
free-address-high; or free-address6-low and addresses exceeds the high threshold; or a low trap
free-address6-high) when the number of free addresses falls below the
low threshold after previously triggering the high trap.
High-availability (HA) DNS configuration mismatch An HA DNS configuration does not match between
(ha-dns-config-error) partners.
HA DNS partner not responding An HA DNS partner stops responding to the DNS
(ha-dns-partner-down) server.
HA DNS partner responding (ha-dns-partner-up) An HA DNS partner responds after having been
unresponsive.
DNS masters not responding (masters-not-responding) Master DNS servers stop responding to the DNS
server.
DNS masters responding (masters-responding) Master DNS servers respond after having been
unresponsive.
Other server not responding (other-server-down) A DHCP failover partner, or a DNS or LDAP server,
stops responding to the DHCP server.
Other server responding (other-server-up) DHCP failover partner, or a DNS or LDAP server,
responds after having been unresponsive.
DNS secondary zones expire A DNS secondary server can no longer claim authority
(secondary-zone-expired) for zone data when responding to queries during a
zone transfer.
For more information on resource limit alarms, see Monitoring Resource Limit Alarms, on page 109.
• On the scope or prefix (or its template) level by setting the free-address-config attribute.
• For the DNS server, which includes a traps-enabled setting.
To use SNMP notifications, you must specify trap recipients that indicate where trap notifications should go.
By default, all notifications are enabled, but you must explicitly define the recipients, otherwise no notifications
can go out. The IP address you use is often localhost.
The DHCP server provides special trap configurations so that it can send notifications, especially about free
addresses for DHCPv4 and DHCPv6. You can set the trap configuration name, mode, and percentages for
the low threshold and high threshold. The mode determines how scopes aggregate their free-address levels.
DHCP v4 Notification
The DHCP v4 modes and thresholds are (see also Handling Deactivated Scopes or Prefixes, on page 94):
• scope mode—Causes each scope to track its own free-address level independently (the default).
• network mode—Causes all scopes set with this trap configuration (through the scope or scope template
free-address-config attribute) to aggregate their free-address levels if the scopes share the same
primary-subnet.
• selection-tags mode—Causes scopes to aggregate their free-address levels if they share a primary subnet
and have a matching list of selection tag values.
• low-threshold—Free-address percentage at which the DHCP server generates a low-threshold trap and
re-enables the high threshold. The free-address level for scopes is the following calculation:
100 * available-nonreserved-leases
total-configured-leases
DHCP v6 Notification
The DHCP v6 modes and thresholds are (see also Handling Deactivated Scopes or Prefixes, on page 94):
• prefix mode—Causes each prefix to track its own free-address level independently.
• link mode—Causes all prefixes configured for the link to aggregate their own free-address levels if all
prefixes share the same link.
• v6-selection-tags mode—Causes prefixes to aggregate their free-address levels if they share a link and
have a matching list of selection tag values.
• low-threshold—Free-address percentage at which the DHCP server generates a low-threshold trap and
re-enables the high threshold. The free-address level for prefixes is the following calculation:
100 * max-leases - dynamic-leases
max-leases
Step 1 In Advanced mode, from the Deploy menu, choose Traps under the DHCP submenu to access the DHCP trap
configurations. The List/Add Trap Configurations page appears.
Step 2 Click the Add Traps icon in the left pane to open the Add AddrTrapConfig page.
Step 3 Enter the name, mode, and threshold percentages, then click Add AddrTrapConfig.
Step 1 Click the desired trap name in the Traps pane to open the Edit Trap Configuration page
Step 2 Modify the name, mode, or threshold percentages.
Step 3 Click the on option for the enabled attribute to enable the trap configuration.
Step 4 Click Save for the changes to take effect.
In the regional web UI, you can add and edit trap configurations as in the local web UI. You can also pull
replica trap configurations and push trap configurations to the local cluster on the List/Add Trap Configurations
page.
Note Other failover partner or LDAP server or DNS server or HA DNS partner up or down traps occur only to
communicate with that partner or server, and therefore may not occur when the other partner or server goes
down or returns to service.
CLI Commands
To set the trap values for the DHCP server at the local cluster, use dhcp set traps-enabled=value. You can
also set the default-free-address-config attribute to the trap configuration. For example:
nrcmd> dhcp set traps-enabled=server-start,server-stop,free-address-low,free-address-high
Note If you do not define a default-free-address-config (or v6-default-free-address-config for IPv6), Cisco Prime
Network Registrar creates an internal, unlisted trap configuration named default-aggregation-addr-trap-config.
Because of this, avoid using that name for a trap configuration you create.
To define trap configurations for DHCPv4 and DHCPv6, use addr-trap name create followed by the attribute
=value pairs for the settings. For example:
nrcmd> addr-trap v4-trap-conf create mode=scope low-threshold=25% high-threshold=30%
When connected to a regional cluster, you can use the following pull, push, and reclaim commands. For push
and reclaim, a list of clusters or "all" may be specified.
• addr-trap < name | all > pull < ensure | replace | exact > cluster-name [-report-only | -report]
• addr-trap < name | all > push < ensure | replace | exact > cluster-list [-report-only | -report]
• addr-trap name reclaim cluster-list [-report-only | -report]
CISCO-IETF-DHCP-SERVER-MIB::cDhcpv4CountDiscovers.0 = Counter32: 0
C:\net-snmp5.2.2\bin>snmpget -m ALL -v 2c -c public
192.168.241.39:4444
1.3.6.1.4.1.9.10.102.1.3.1
CISCO-IETF-DHCP-SERVER-MIB::cDhcpv4CountDiscovers.0 = Counter32: 0
Both commands return the same results. The first one queries the full MIB attribute name, while the second
one queries its OID equivalent (which can be less error prone). As previously described, the OID equivalents
of the MIB attributes are located in the relevant files at the following URL:
ftp://ftp.cisco.com/pub/mibs/oid/
For example, the CISCO-IETF-DHCP-SERVER-MIB.oid file includes the following OID definition that
corresponds to the previous query example:
"cDhcpv4CountDiscovers" "1.3.6.1.4.1.9.10.102.1.3.1"
• For IPv6:
The community string public and the port number 4444 may have to be replaced if the Cisco Prime Network
Registrar SNMP server has been configured with different values for those settings.
NET-SNMP is commonly available on Linux and other Unix-like systems. On other systems, similar
mechanisms may also be available.
Step 1 To access the BYOD web server properties, choose Manage Servers under the Operate menu to open the Manage
Servers page.
Step 2 Click BYOD web server in the Manage Servers pane on the left. The Local BYOD Web Server page appears. This page
displays the BYOD web server attributes.
• KeyStore Settings: Redirects the "http call" of the BYOD web server to secure "https" with a combination of key
store file and key store password.
• LDAP Settings: Specifies the remote LDAP server used for client registration.
• Additional Attributes (Auto- start): Indicates if the BYOD server should be started automatically after every server
agent restart.
Step 1 From the Deploy menu, choose Theme under the BYOD submenu to open the List/Add Custom Theme page.
Step 2 Click the Add Theme icon in the Theme pane.
The Add Custom Theme window appears.
Step 3 Enter the Theme Name in the Add Custom Theme window.
Step 4 Click Add Custom Theme to create a new BYOD Theme.
Step 5 Update the Edit Custom Theme page with required theme attributes.
Step 6 Click the Review Theme icon in the top right corner of the List/Add Custom Theme page.
The Theme Preview window appears displaying the BYOD page with the newly added theme.
Note You can navigate between the BYOD pages with Register and Reboot to view how the theme is applied to
the BYOD pages. By default, the Theme preview window loads the BYOD Device Registration page.
Step 7 Click Reboot to preview your theme in the Device Activation page.
Note You must close the Theme Preview window after preview to return to the List/Add Custom Theme page in the
regional server.
Step 8 Click Save in the List/Add Custom Theme page in the regional server to apply the theme to the BYOD web server or
click Revert to change the attribute values prior to saving the Custom Theme.
Note You can modify and preview the theme any number of times. Only the recently saved theme is applied to the
BYOD web server.
Step 1 From the Deploy menu, choose Content under the BYOD submenu to open the Edit BYOD content page.
Step 2 Upload the file or enter relevant text in the Edit BYOD content page.
Note You must upload only .html, .htm, or .txt files.
Step 3 Click Review to preview the content in the Edit BYOD content page before saving. A Content Review window containing
the contents appears.
Step 4 Click on About/Terms of Service/Contact/Help in the content review page to preview the content added in the EDIT
BYOD content page of the regional server.
Step 5 Click Save to publish the added BYOD content to the BYOD web server.
Polling Process
When the regional cluster polls the local cluster for DHCP utilization or lease history, it first requests all
available data up to the current time. This time is recorded in the history databases, and subsequent polls
request only new data from this time forward. All times are stored relative to each local cluster time, adjusted
for that cluster time zone.
If the times on each server are not synchronized, you might observe odd query results. For example, if the
regional cluster time lags behind that of a local cluster, the collected history might be in the future relative to
the time range queries at the regional cluster. If so, the result of the query would be an empty list. Data merged
from the several clusters could also appear out of sequence, because of the different time skews between local
clusters. This type of inconsistency would make it difficult to interpret trends. To avoid these issues, using a
network time service for all clusters is strongly recommended.
Lease History icon on the List/Add Remote Clusters page. For this manual polling, if the server is in a failover
relationship, data is only retrieved for the subnets where the server is the main.
If you have address space privileges (you are assigned the regional-addr-admin role with at least the
subnet-utilization and lease-history subroles), you can query the DHCP utilization or lease history data by
choosing the Utilization or Lease History options from Operate menu (see the "Generating Utilization History
Reports" section in Cisco Prime Network Registrar 9.1 DHCP User Guide, or the "Running IP Lease Histories"
section in Cisco Prime Network Registrar 9.1 DHCP User Guide).
Related Topics
Polling Process, on page 99
Adjusting the Polling Intervals, on page 100
Note If lease history collection is not explicitly turned on at the local cluster DHCP server (see Enabling Lease
History Collection, on page 101), no data is collected, even though polling is on by default. DHCP utilization
collection at the DHCP server is distinct from polling at the regional cluster, and polling does not automatically
trigger collection. DHCP utilization collection must occur before new polling picks up any new data. Because
this collection is preset to every 15 minutes, the polling interval should be set higher than this interval (the
automatic polling interval is preset to every 1 hour).
Table 11: DHCP Utilization and Lease History Polling Regional Attributes
The polling offset attribute ensures that polling occurs at a specific hour of the day, set as 24-hour time, in
relation to the polling interval. For example, if you set the interval to 4h and the offset to 6h (6 A.M.), the
polling occurs at 2 A.M., 6 A.M., 10 A.M., 2 P.M., 6 P.M., and 10 P.M. each day.
Step 1 Configure the local cluster DHCP server with scopes and address ranges so that clients have requested leases.
Step 2 Explicitly enable lease history data collection. The DHCP server attributes to set are:
• ip-history—Enable or disable the lease history database for v4-only (DHCPv4), v6-only (DHCPv6), or both.
• ip-history-max-age—Limit on the age of the history records (preset to 4 weeks).
In the CLI, set the attributes using the dhcp set ip-history=<value> (v4-only, v6-only, both, or disable) command.
Step 3 If in staged dhcp edit mode, reload the local cluster DHCP server.
Step 4 At the regional cluster, create the cluster that includes this DHCP server.
Step 5 In the regional web UI, go to the Lease History Settings section of the List/Add Remote Clusters page.
Step 6 Set the attributes in Table 11: DHCP Utilization and Lease History Polling Regional Attributes, on page 100.
Step 7 Click Save.
Step 8 On the List/Add Remote Clusters page, click the Replica icon next to the cluster name.
Step 9 Click the Lease History icon for the cluster involved to obtain the initial set of lease history data. This data is refreshed
automatically at each polling interval.
Related Topics
Pushing Scope Templates to Local Clusters, on page 101
Pulling Scope Templates from Replica Data, on page 102
• If you want to push all of the available scope templates, click the Push All icon at the top of the Scope
Templates pane. This opens the Push Data to Local Clusters page.
Regional Web UI
The Push DHCP Scope Template page and Push Data to Local Clusters page identify the data to push, how
to synchronize it with the local cluster, and the cluster or clusters to which to push it. The data synchronization
modes are:
• Ensure (preset value)—Ensures that the local cluster has new data without affecting any existing data.
• Replace—Replaces data without affecting other objects unique to the local cluster.
• Exact—Available for “push all” operations only. Use this with caution, because it overwrites the data
and deletes any other objects unique to the local cluster.
Choose the destination cluster or clusters in the Available field and move it or them to the Selected field.
Tip The synchronization mode and cluster choice settings are persistent for the duration of the current login session,
so that they are in effect each time you access this page, unless you change them.
After making these choices, click Push Data to Clusters. This opens the View Push Scope Template Data
Report page.
CLI Command
When connected to a regional cluster, you can use the scope-template < name | all > push < ensure | replace
| exact > cluster-list [-report-only | -report] command. A list of clusters or "all" may be specified.
Regional Web UI
The Select Replica DHCP Scope Template Data to Pull page shows a tree view of the regional server replica
data for the local clusters’ scope templates. The tree has two levels, one for the local clusters and one for the
scope templates in each cluster. You can pull individual scope templates from the clusters, or you can pull all
of their scope templates. To pull individual scope templates, expand the tree for the cluster, then click Pull
Scope Template next to its name. To pull all the scope templates from a cluster, click Pull All Scope
Templates.
To pull the scope templates, you must also choose a synchronization mode:
• Ensure—Ensures that the regional cluster has new data without affecting any existing data.
• Replace (preset value)—Replaces data without affecting other objects unique to the regional cluster.
• Exact—Available for “pull all” operations only. Use this with caution, because it overwrites the data
and deletes any other objects unique to the regional cluster.
CLI Command
When connected to a regional cluster, you can use the scope-template < name | all > pull < ensure | replace
| exact > cluster-name [-report-only | -report] command.
Related Topics
Pushing Policies to Local Clusters, on page 103
Pulling Policies from Replica Data, on page 104
Regional Web UI
The Push DHCP Policy Data to Local Clusters page identifies the data to push, how to synchronize it with
the local cluster, and the cluster or clusters to which to push it. The data synchronization modes are:
• Ensure (preset value)—Ensures that the local cluster has new data without affecting any existing data.
• Replace—Replaces data without affecting other objects unique to the local cluster.
• Exact—Available for push-all operations only. Use this with caution, because it overwrites the data and
deletes any other objects unique to the local cluster.
Choose the destination cluster or clusters in the Available field and move it or them to the Selected field. Then
click Push Data to Clusters to open the View Push Policy Data Report page.
Tip The synchronization mode and cluster choice settings are persistent for the duration of the current login session,
so that they are in effect each time you access this page, unless you change them.
CLI Command
When connected to a regional cluster, you can use the policy < name | all > push < ensure | replace | exact
> cluster-list [-report-only | -report] command. A list of clusters or "all" may be specified.
Regional Web UI
The Select Replica DHCP Policy Data to Pull page shows a tree view of the regional server replica data for
the local clusters’ policies. The tree has two levels, one for the local clusters and one for the policies in each
cluster. You can pull individual policies from the clusters, or you can pull all of their policies. To pull individual
policies, expand the tree for the cluster, then click Pull Policy next to its name. To pull all the policies from
a cluster, click Pull All Policies.
To pull all the policies, you must also choose a synchronization mode:
• Ensure—Ensures that the regional cluster has new data without affecting any existing data.
• Replace (preset value)—Replaces data without affecting other objects unique to the regional cluster.
• Exact—Available for “pull all” operations only. Use this with caution, because it overwrites the data
and deletes any other objects unique to the regional cluster.
CLI Command
When connected to a regional cluster, you can use the policy < name | all > pull < ensure | replace | exact
> cluster-name [-report-only | -report] command.
Related Topics
Pushing Client-Classes to Local Clusters, on page 105
Pushing Client-Classes to Local Clusters, on page 105
Regional Web UI
The Push DHCP Client Class page and Push Data to Local Clusters page identifies the data to push, how to
synchronize it with the local cluster, and the cluster or clusters to which to push it. The data synchronization
modes are:
• Ensure (preset value)—Ensures that the local cluster has new data without affecting any existing data.
• Replace—Replaces data without affecting other objects unique to the local cluster.
• Exact—Available for “push all” operations only. Use this with caution, because it overwrites the data
and deletes any other objects unique to the local cluster.
Choose the destination cluster or clusters in the Available field and move it or them to the Selected field. Then
click Push Data to Clusters to open the View Push Client-Class Data Report page.
Tip The synchronization mode and cluster choice settings are persistent for the duration of the current login session,
so that they are in effect each time you access this page, unless you change them.
CLI Command
When connected to a regional cluster, you can use the client-class < name | all > push < ensure | replace |
exact > cluster-list [-report-only | -report] command. A list of clusters or "all" may be specified.
Regional Web UI
The Select Replica DHCP Client-Class Data to Pull page shows a tree view of the regional server replica data
for the local clusters’ client-classes. The tree has two levels, one for the local clusters and one for the
client-classes in each cluster. You can pull individual client-classes from the clusters, or you can pull all of
their client-classes. To pull individual client-classes, expand the tree for the cluster, then click Pull Client-Class
next to its name. To pull all the client-classes from a cluster, click Pull All Client-Classes.
To pull the client-classes, you must also choose a synchronization mode:
• Ensure—Ensures that the regional cluster has new data without affecting any existing data.
• Replace (preset value)—Replaces data without affecting other objects unique to the regional cluster.
• Exact—Available for “pull all” operations only. Use this with caution, because it overwrites the data
and deletes any other objects unique to the regional cluster.
CLI Command
When connected to a regional cluster, you can use the client-class < name | all > pull < ensure | replace |
exact > cluster-name [-report-only | -report] command.
Related Topics
Pushing VPNs to Local Clusters, on page 106
Pulling VPNs from Replica Data, on page 107
Regional Web UI
The Push VPN page and Push Data to Local Clusters page identify the data to push, how to synchronize it
with the local cluster, and the cluster or clusters to which to push it. The data synchronization modes are:
• Ensure (preset value)—Ensures that the local cluster has new data without affecting any existing data.
• Replace—Replaces data without affecting other objects unique to the local cluster.
• Exact—Available for “push all” operations only. Use this with caution, because it overwrites the data
and deletes any other objects unique to the local cluster.
Choose the destination cluster or clusters in the Available field and move it or them to the Selected field. Then
click Push Data to Clusters to open the View Push VPN Data Report page.
Tip The synchronization mode and cluster choice settings are persistent for the duration of the current login session,
so that they are in effect each time you access this page, unless you change them.
CLI Command
When connected to a regional cluster, you can use the vpn < name | all > push < ensure | replace | exact >
cluster-list [-report-only | -report] command. A list of clusters or "all" may be specified.
CLI Command
When connected to a regional cluster, you can use the vpn < name | all > pull < ensure | replace | exact >
cluster-name [-report-only | -report] command.
Regional Web UI
Step 1 On the List/Add DHCP Failover Pairs page or View Unified Address Space page, click the Pull v4 Data or Pull v6 Data
icon in the Failover Pairs pane.
Step 2 Choose the data synchronization mode (Update, Complete, or Exact) on the Select Pull Replica Address Space page.
The results of choosing these modes are described in the table on the page.
Step 3 Click the Report button in the Synchronize Failover Pair tab and click Return.
Step 4 Click Run on the Report Pull Replica Address Space page.
Step 5 Click OK on the Run Pull Replica Address Space page.
CLI Commands
When connected to a regional cluster, you can use the following commands to pull the address space (and
reservations):
• ccm pullAddressSpace < update | complete | exact > [-omitreservations] [-report-only | -report]
• ccm pullIPv6AddressSpace < update | complete | exact > [-report-only | -report]
Related Topics
DHCPv4 Reservations, on page 108
DHCPv6 Reservations, on page 108
DHCPv4 Reservations
To create DHCPv4 reservations, the parent subnet object must exist on the regional server. If there are pending
reservation edits at regional, these can be pushed to the subnet local cluster or failover pair. If the subnet has
never been pushed, the parent scope is added to the local cluster or pair.
Once a subnet is pushed to a local cluster or pair, reservations are pushed to that cluster or pair. To move the
scopes and subnet to another local cluster or failover pair, the subnet must first be reclaimed.
DHCPv6 Reservations
To create DHCPv6 reservations, the parent prefix must exist on the regional server. When there are pending
reservation or prefix changes, you can push the updates to the local cluster.
Once a prefix is pushed to a local cluster, it can only update that local cluster. To move the prefix to another
local cluster, it must first be reclaimed.
Regional Web UI
The ensuing page identifies the data to push, how to synchronize it with the local cluster, and the cluster or
clusters to which to push it. The data synchronization modes are:
• Ensure—Ensures that the local cluster has new data without affecting any existing data.
• Replace (preset value)—Replaces data without affecting other objects unique to the local cluster.
• Exact—Available for “push all” operations only. Use this with caution, because it overwrites the data
and deletes any other objects unique to the local cluster.
Choose the destination cluster or clusters in the Available field and move it or them to the Selected field.
Tip The synchronization mode and cluster choice settings are persistent for the duration of the current login session,
so that they are in effect each time you access this page, unless you change them.
After making these choices, click Push Data to Clusters. This opens the View Push Reservations Data Report
page. Click OK on this page.
You can also pull the replica address space on the List/Add DHCP v6 Reservations page, and opt whether to
omit reservations when doing so. You should use this option only to reduce processing time when you are
sure that there are no pending changes to reservations to merge. To omit reservations for the pull, check the
Omit Reservations? check box, then click Pull Data.
See the "DHCPv6 Addresses” section in Cisco Prime Network Registrar 9.1 DHCP User Guide.
Note The log messages related to resource limits are logged to the ccm_monitor_log files. For more information
on log files, see Log Files, on page 134.
You can reset the predefined threshold levels for both critical and warning levels for each monitored resource.
Cisco Prime Network Registrar reports the current status, the current value, and the peak value of the monitored
resources in the web UI and CLI. The peak value is compared to the configured warning or critical limit for
the resource limit alarm and the status of the resource limit alarm is displayed as OK, Warning, or Critical.
Cisco Prime Network Registrar displays the alarms on the web UI and CLI until the resulting condition no
longer occurs and the peak value is reset.
The resource limit alarms are updated at regular intervals based on the polling interval you configure. For
more information on setting up the polling interval, see Setting Resource Limit Alarms Polling Interval, on
page 111.
If SNMP traps are enabled for the resource limit alarms, Cisco Prime Network Registrar generates SNMP
traps when the monitored resources exceed the critical or warning levels. SNMP traps are generated whenever
the current value exceeds the configured warning or critical level.
The resource limit alarms can be configured both at the regional and in the local cluster. The resource limit
alarms data is consolidated at the individual local cluster level. The resource limits alarms available on the
regional cluster level pertain to only the regional cluster. The table below lists the types of resource limit
alarms that are available on the regional or the local cluster.
CCM Memory ✓ ✓
Tomcat Memory ✓ ✓
DHCP Memory x ✓
CDNS Memory x ✓
DNS Memory x ✓
SNMP Memory ✓ ✓
TFTP Memory x ✓
Lease Count x ✓
Zone Count x ✓
Step 1 To access the CCM server properties, choose Manage Servers under the Operate menu to open the Manage Servers
page.
Step 2 Click Local CCM Server in the Manage Servers pane on the left. The Edit Local CCM Server page appears. This page
displays all the CCM server attributes.
Step 3 Click the Configure Resource Limits tab.
Step 4 Modify the settings as per your requirement.
Note To enable the SNMP traps for the resource limit alarms, select the Enable Traps option in the Trap Configuration
group.
CLI Commands
To set the resource limit alarms on the local or regional cluster, use resource set attribute=value
[attribute=value ...]. Use resource show to review the current setting and use resource report [all | full |
levels] command to report on the resources.
To view the defined warning and critical levels, use resource report levels command.
A 109 status message is reported (if at least one resource is in the critical or warning state) under the following
scenarios.
• Execute resource report command.
• Connect to a cluster via CLI.
• Exit from CLI.
Step 1 To edit the alarm poll interval, you need to edit the user preferences by going to User Preferences under the Settings
drop-down list (at the top of the main page).
Step 2 After making the user preference settings, click Modify User Preferences.
Note When a resource is in a warning or critical state, the resource limit alarm is also displayed on the Configuration
Summary page.
Step 1 Click the Alarms icon at the top of the web UI to open the Alarms page.
Step 2 Select the Alarm for which you want to reset the peak value.
Step 3 Click the Reset Alarm button to clear the peak value.
CLI Commands
To reset the peak value on the local or regional cluster, use resource reset [name [,name [,...]]].
Step 1 Click the Alarms icon at the top of the web UI to open the Alarms page.
Step 2 Click Export to CSV.
Step 3 The File Download pop-up window displays. Click Save.
Step 4 In the Save As pop-up window, choose the location you want to save the file to and click Save.
Related Topics
Administrator Responsibilities and Tasks, on page 113
Create the Administrators, on page 113
Create the Address Infrastructure, on page 114
Create the Zone Infrastructure, on page 114
Create a Host Administrator Role with Constraints, on page 116
Create a Group to Assign to the Host Administrator, on page 118
Test the Host Address Range, on page 118
c) Click Save.
Note For a description on how to apply constraints to the administrator, see the Create a Host Administrator Role
with Constraints, on page 116.
Step 1 At the local cluster, log out as superuser, then log in as the example-cluster-admin user with password exampleadmin.
Because the administrator is a superuser, all features are available.
Step 2 Click Advanced to enter Advanced mode.
Step 3 From the Design menu, choose Subnets under the DHCPv4 submenu to open the List/Add Subnets page.
Step 4 On the List/Add Subnets page, enter the boston.example.com subnet address:
a) Click the Add Subnets icon in the Subnets pane, enter 192.168.50 in the Address field.
b) Choose 24 in the mask drop-down list—This subnet will be a normal Class C network.
c) Leave the Owner, Region, and Address Type fields as is. Add description if desired.
d) Click Add Subnet.
Step 5 Click the 192.168.50.0/24 address to open the Edit Subnet page.
Step 6 In the IP Ranges fields, enter the static address range:
a) Enter 100 in the Start field. Tab to the next field.
b) Enter 200 in the End field.
c) Click Add IP Range. The address range appears under the fields.
Step 7 Click Save.
Step 8 Click Address Space to open the View Unified Address Space page. The 192.168.50.0/24 subnet should appear in the
list. If not, click the Refresh icon.
Related Topics
Create the Forward Zones, on page 115
Step 1 At the local cluster, log in as the example-zone-admin user with password examplezone.
Step 2 From the Design menu, choose Forward Zones under the Auth DNS submenu. This opens the List/Add Forward Zones
page.
Step 3 Create the example.com zone (tab from field to field):
a) Click the Add Forward Zone icon in the Forward Zones pane, enter example.com in the Name field.
b) In the Nameserver FQDN field, enter ns1.
c) In the Contact E-Mail field, enter hostadmin.
d) In the Serial Number field, enter the serial number.
e) Click Add Zone.
Step 4 Create the boston.example.com zone in the same way, using the same values as in the previous steps:
a) Creating a zone with a prefix added to an existing zone opens the Create Subzone in Parent Zone page, because the
zone can be a potential subzone. Because you do want to create this zone as a subzone to example.com, click Create
as Subzone on the Create Subzone in Parent Zone page.
b) Because nameservers are different in each zone, you must create a glue Address (A) record to tie the zones together.
Enter 192.168.50.1 in the A record field, then click Specify Glue Records. Then click Report, Run, and Return.
c) The List/Add Zones page should now list example.com and boston.example.com.
Step 5 Click Advanced, then Show Forward Zone Tree to show the hierarchy of the zones. Return to list mode by clicking
Show Forward Zone List.
Step 1 At the local cluster, you should be logged in as the example-zone-admin user, as in the previous section.
Step 2 From the Design menu, choose Reverse Zones under the Auth DNS submenu.
Step 3 On the List/Add Reverse Zones page, click the Add Reverse Zone icon in the Reverse Zones pane, enter
50.168.192.in-addr.arpa in the Name field. (There is already a reverse zone for the loopback address, 127.in-addr.arpa.)
Step 4 Enter the required fields to create the reverse zone, using the forward zone values:
a) Nameserver—Enter ns1.example.com. (be sure to include the trailing dot).
b) Contact E-Mail—Enter hostadmin.example.com. (be sure to include the trailing dot).
c) Serial Number—Enter the serial number.
Step 5 Click Add Reverse Zone to add the zone and return to the List/Add Reverse Zones page.
Step 6 Do the same for the boston.example.com zone, using 60.168.192.in-addr.arpa as the zone name and the same nameserver
and contact e-mail values as in Step 4. (You can cut and paste the values from the table.)
Step 1 Log out as the example-zone-admin user and log in as the example-cluster-admin user (with password exampleadmin).
Step 2 Click Advanced to enter Advanced mode.
Step 3 From the Administration menu, choose Roles under the User Access submenu to open the List/Add Administrator Roles
page.
Step 4 Add the example-host-role:
a) Click the Add Role icon in the Roles pan to open the Add Roles dialog box.
b) Enter example-host-role in the Name field.
c) Click Add Role. The example-host-role should now appear in the list of roles on the List/Add Administrator Roles
page.
Step 5 Add the constraint for the role:
a) Click Add Constraint.
b) On the Add Role Constraint for Role page, scroll down to Host Restrictions.
c) For the all-forward-zones attribute, click the false radio button.
d) For the zones attribute, enter boston.example.com.
e) For the ipranges attribute, enter the range 192.168.50.101–192.168.50.200.
f) The zone-regexpr and host-regexpr attribute fields are for entering regular expressions to match zones and hosts,
respectively, in regex syntax. (See the following table for the commonly used regex values.)
Value Matches
^ Beginning of a line.
$ End of a line.
Step 1 As example-cluster-admin, still in Advanced mode, from the Administration menu, choose Groups submenu to open
the List/Add Administrator Groups page.
Step 2 Create the example-host-group and assign the example-host-role to it:
a) Click the Add Groups icon in the Groups pane, enter example-host-group in the Name field.
b) From the Base Role drop-down list, choose example-host-role.
c) Click Add Group.
d) Add a description such as Group for the example-host-role, then click Save.
Step 3 Log out as example-cluster-admin, then log in as the example-zone-admin user (with password examplezone).
Step 4 As example-zone-admin, assign the example-host-group to the example-host-admin:
a) In Basic mode, from the Administration menu, choose Administrators.
b) On the List/Add Administrators page, click example-host-admin to edit the administrator.
c) On the Edit Administrator page, choose example-host-group in the Available list, then click << to move it to the
Selected list.
d) Click Save. The example-host-admin should now show the example-host-group in the Groups column on the List/Add
Administrators page.
Step 1 At the local cluster, log out as example-zone-admin, then log in as example-host-admin (with password examplehost).
Step 2 Click Advanced to enter Advanced mode.
Step 3 From the Design menu, choose Hosts from the Auth DNS submenu.
Step 4 On the List/Add Hosts for Zone page, try to enter an out-of-range address (note the range of valid addresses in the Valid
IP Ranges field):
a) Enter userhost3 in the Name field.
b) Deliberately enter an out-of-range address (192.168.50.3) in the IP Address(es) field.
c) Click Add Host. You should get an error message.
Step 5 Enter a valid address:
a) Enter userhost103.
Related Topics
Administrator Responsibilities and Tasks, on page 119
Create the Regional Cluster Administrator, on page 120
Create the Central Configuration Administrator, on page 120
Create the Local Clusters, on page 120
Add a Router and Modify an Interface, on page 121
Add Zone Management to the Configuration Administrator, on page 122
Create a Zone for the Local Cluster, on page 122
Pull Zone Data and Create a Zone Distribution, on page 123
Create a Subnet and Pull Address Space, on page 123
Push a DHCP Policy, on page 124
Create a Scope Template, on page 125
Create and Synchronize the Failover Pair, on page 125
Regional Web UI
Regional Web UI
Step 1 Log out as superuser, then log in as example-regional-admin with password examplereg. Note that the administrator
has all but host and address space administration privileges.
Step 2 From the Administration menu, choose Administrators under the User Access submenu to open the List/Add
Administrators page.
Step 3 Click the Add Administrators icon in the Administrators pane, enter example-cfg-admin in the Name field, then
cfgadmin in the Password and Confirm Password fields in the Add Admin dialog box, then click Add Admin.
Step 4 Click Add in the Groups section of the Edit Administrator page to open the Groups window. Select
central-cfg-admin-group and regional-addr-admin-group and click Select. The selected groups appear under the
Groups section of the Edit Administrator page.
Step 5 Click Save. The example-cfg-admin now appears with the two groups assigned.
You can also add constraints for the administrator. Click Add Constraint and, on the Add Role Constraint for Role page,
choose the read-only, owner, or region constraints, then click Add Constraint.
Regional Web UI
Step 1 Log out as example-regional-admin, then log in as example-cfg-admin with password cfgadmin.
Step 2 From the Operate menu, choose Manage Clusters from the Servers submenu to open the List/Add Remote Clusters
page.
Step 3 Click the Add Manage Clusters icon in the Manage Clusters pane.
Step 4 On the Add Cluster dialog box, create the Boston cluster based on data provided by its administrator:
a) Enter Boston-cluster in the name field.
b) Enter the IPv4 address of the Boston server in the IPv4 Address field.
c) Enter the IPv6 address of the Boston server in the IPv6 Address field.
d) Enter example-cluster-admin in the Admin Name field, then exampleadmin in the Admin Password field.
e) Enter in the SCP Port field the SCP port to access the cluster as set at installation (1234 is the preset value).
f) Click Add Cluster.
Step 5 Create the Chicago cluster in the same way, except use Chicago-cluster in the name field, enter the remaining values
based on data provided by the Chicago administrator, then click Add Cluster. The two clusters should now appear on
the List/Add Remote Clusters page.
Step 6 Connect to the Boston cluster. Click the Go Local icon next to Boston-cluster. If this opens the local cluster Manage
Servers page, this confirms the administrator connectivity to the cluster. To return to the regional cluster web UI, click
the Go Regional icon.
Step 7 Connect to the Chicago cluster to confirm the connectivity in the same way.
Step 8 Confirm that you can replicate data for the two forward zones from the Boston cluster synchronization:
a) From the Operate menu, choose View Replica Data under the Servers submenu.
b) On the View Replica Class List page, click Boston-cluster in the Select Cluster list.
c) In the Select Class list, click Forward Zones.
d) Click Replicate Data.
e) Click View Replica Class List. On the List Replica Forward Zones for Cluster page, you should see the
boston.example.com and example.com zones.
Step 1 As example-cfg-admin, from the Deploy menu, choose Router List under the Router Configuration submenu.
Step 2 On the List/Add Routers page, click the Add Router icon in the Router List pane.
Step 3 On the Add Router dialog box, add the router based on data from its administrator:
a) Give the router a distinguishing name in the name field. For this example, enter router-1.
b) Enter the router description in the description field.
c) Enter the management interface address for the router in the address field.
d) Enter the IPv6 management interface address for the router in the ip6address field.
e) Choose a owner and a region.
f) Click Add Router. The router should now appear on the List/Add Routers page.
Step 4 Confirm that the router is created. Click Router Tree to view the hierarchy of router interfaces for router-1 on the View
Tree of Routers page.
Step 5 Configure a DHCP relay agent for the router:
a) Create a new interface for the router.
b) Click the interface names on the View Tree of Routers page to open the Edit Router Interface page. (Alternatively,
from the List/Add Routers page, click the Interfaces icon associated with the router, then click the interface name
on the List Router Interfaces for Router page.)
c) On the Edit Router Interface page, enter the IP address of the DHCP server in the ip-helper field.
d) Click Save at the bottom of the page.
Step 6 Confirm with the router administrator that the DHCP relay agent was successfully added.
Regional Web UI
Regional Web UI
Regional Web UI
Step 1 As example-cfg-admin, from the Design menu, choose Views under the Auth DNS submenu to view the List/Add Zone
Views page.
Step 2 On the List/Add Zone Views page, pull the zone from the replica database:
a) Click the Pull Data icon in the Views pane.
b) On the Select Replica DNS View Data to Pull dialog box, leave the Data Synchronization Mode defaulted as Update,
then click Report to open the Report Pull Replica Zone Data page.
c) Notice the change sets of data to pull, then click Run.
d) On the Run Pull Replica Zone Data page, click OK.
Step 3 On the List/Add Zone Views page, notice that the Boston cluster zone distribution is assigned an index number (1) in the
Name column. Click the number.
Step 4 On the Edit Zone Views page, in the Primary Server field, click Boston-cluster. (The IP address of the Boston-cluster
becomes the first master server in the Master Servers list.)
Step 5 Because we want to make the Chicago-cluster DNS server a secondary server for the Boston-cluster:
a) Click Add Server in the Secondary Servers area.
b) On the Add Zone Distribution Secondary Server page, choose Chicago-cluster in the Secondary Server drop-down
list.
c) Click Add Secondary Server.
Step 6 On the Edit Zone Distribution page, in the Forward Zones area, move chicago.example.com to the Selected list.
Step 7 In the Reverse Zones area, move 60.168.192.in-addr.arpa to the Selected list.
Step 8 Click Modify Zone Distribution.
Regional Web UI
Step 1 As example-cfg-admin, from the Design menu,choose Subnets under the DHCPv4 submenu to open the List/Add Subnets
page. You should see the subnets created by adding the router (in the Add a Router and Modify an Interface, on page
121).
Step 2 Create an additional subnet, 192.168.70.0/24 by clicking the Add Subnets icon in the Subnets pane:
a) Enter 192.168.70 (the abbreviated form) as the subnet network address in the Address/Mask field.
b) Leave the 24 (255.255.255.0) selected as the network mask.
c) Click Add Subnet.
Step 3 Click Address Space to confirm the subnet you created.
Step 4 On the View Unified Address Space page, click Pull Replica Address Space.
Step 5 On the Select Pull Replica Address Space page, leave everything defaulted, then click Report.
Step 6 The Report Pull Replica Address Space page should show the change sets for the two subnets from the clusters. Click
Run.
Step 7 Click OK. The two pulled subnets appear on the List/Add Subnets page.
Regional Web UI
Step 1 As example-cfg-admin, from the Design menu, choose Policies under the DHCP Settings submenu.
Step 2 On the List/Add DHCP Policies page, click the Add Policies icon in the Policies pane.
Step 3 On the Add DHCP Policy dialog box, create a central policy for all the local clusters:
a) Enter central-policy-1 in the Name field. Leave the Offer Timeout and Grace Period values as is.
b) Click Add DHCP Policy.
c) On the Edit DHCP Policy page, under the DHCPv4 Options section, choose dhcp-lease-time [51] (unsigned time)
from the Name drop-down list, and then enter 2w (two weeks) for the lease period in the Value field.
d) Click Add Option.
e) Click Save.
Step 4 Push the policy to the local clusters:
a) Select the policy, central-policy-1 and click the Push button.
b) On the Push DHCP Policy Data to Local Clusters page, leave the Data Synchronization Mode as Ensure. This ensures
that the policy is replicated at the local cluster, but does not replace its attributes if a policy by that name already
exists.
c) Click Select All in the Destination Clusters section of the page.
d) Click << to move both clusters to the Selected field.
e) Click Push Data to Clusters.
f) View the push operation results on the View Push DHCP Policy Data Report page.
Regional Web UI
Step 1 As the example-cfg-admin user, from the Design menu, choose Scope Templates under the DHCPv4 submenu.
Step 2 On the List/Add DHCP Scope Templates page, click the Add Scope Templates icon in the Scope Templates pane. Enter
scope-template-1 in the Name field, then click Add DHCP Scope Template.
Step 3 The template should appear on the List/Add DHCP Scope Templates page. Set the basic properties for the scope
template—Enter or choose the following values in the fields:
a) Scope Name Expression—To autogenerate names for the derivative scopes, concatenate the example-scope string
with the subnet defined for the scope. To do this, enter (concat “example-scope-” subnet) in the field (including
the parentheses).
b) Policy—Choose central-policy-1 in the drop-down list.
c) Range Expression—Create an address range based on the remainder of the subnet (the second through last address)
by entering (create-range 2 100).
d) Embedded Policy Option Expression—Define the router for the scope in its embedded policy and assign it the first
address in the subnet by entering (create-option “routers” (create-ipaddr subnet 1)).
Step 4 Click Save.
Regional Web UI
Step 1 As the example-cfg-admin user, from the Deploy menu, choose Failover Pairs under the DHCP submenu.
Step 2 On the List/Add DHCP Failover Pairs page, click the Add Failover Pair icon in the Failover Pairs pane.
Step 3 On the Add DHCP Failover Pair dialog box, enter or choose the following values:
a) Failover Pair Name—Enter central-fo-pair.
b) Main Server—Click Boston-cluster.
c) Backup Server—Click Chicago-cluster.
d) Scope Template—Click scopetemplate-1.
e) Click Add Failover Pair.
Step 4 Synchronize the failover pair with the local clusters:
a) On the List/Add DHCP Failover Pairs page, click the Report icon in the Synchronize column.
b) On the Report Synchronize Failover Pair page, accept Local Server as the source of network data.
c) Accept Main to Backup as the direction of synchronization.
d) Accept the operation Update.
e) Click Report at the bottom of the page.
f) On the View Failover Pair Sync Report page, click Run Update.
g) Click Return.
Step 5 Confirm the failover configuration and reload the server at the Boston cluster:
a) On the List/Add DHCP Failover Pairs page, click the Go Local icon next to Boston-cluster.
b) On the Manage DHCP Server page, click the Reload icon.
c) Click the Go Regional icon at the top of the page to return to the regional cluster.
Step 6 Confirm the failover configuration and reload the server at the Chicago cluster in the same way.
CLI Commands
Use failover-pair name create main-cluster/address backup-cluster/address [attribute=value ...] to create a
failover pair. For example:
nrcmd> failover-pair example-fo-pair create Example-cluster Boston-cluster
Adding Routers
Local Advanced and Regional Web UI
Step 1 From the Deploy menu, choose Router List (in regional web UI) or Routers (in local web UI) under the Router
Configuration submenu. This opens the List/Add Routers page.
Step 2 Click the Add Routers icon. This opens the Add Router page.
Step 3 On the Add Router dialog box, add the router based on data from its administrator:
a) Give the router a distinguishing name in the name field.
b) Enter the router description in the description field.
c) Enter the router IP address in the address field.
d) Enter the management interface address for the router in the address field.
e) Enter the IPv6 management interface address for the router in the ip6address field.
f) Choose a owner and region.
Step 4 Click Add Router.
CLI Commands
Add a router using router name create address [attribute=value]. The address can be either IPv4 or IPv6.
For example:
nrcmd> router router-1 create 192.168.121.121
Editing Routers
Editing routers involves modifying some of the router attributes.
CLI Commands
Edit a router attribute using router name set attribute=value [attribute=value ...]. For example:
nrcmd> router router-1 set owner=owner-1
Note Modifying a router interface is done as a delete and then an add of the router interface.
CLI Commands
Edit a router interface attribute using router-interface name set attribute=value. For example:
nrcmd> router-interface Ethernet1/0 set ip-helper=192.168.121.122
Related Topics
Changeable Router Interface Attributes, on page 128
Bundling Interfaces, on page 129
• Name
• MAC address
• Description
• Address of the primary subnet address on the interface
• Addresses of the secondary subnets on the interface
• Address of any IP helper (DHCP relay agent) for the interface
• Address of any cable helper of the DHCP server to accept unicast packets for the interface
• Link associated with the router interface
• IPv6 address of the router interface
• IPv6 DHCP relay destination addresses configured for the interface
Bundling Interfaces
An interface bundle provides load balancing among the router interfaces. When you define a bundle, all the
participating interfaces in the bundle must have the same bundle identifier (ID), which is the name of the
interface specified as the master.
If you want to use bundling, the following attributes are in the Interface Bundling Settings section of the Edit
Router Interface page, or set them using the router-interface command in the CLI:
• bundle-id—Interface bundle identifier, the name of the master interface. All participating interfaces in
the bundle must have the same bundle ID.
• is-master—This interface is the master interface in the bundle.
Managing Servers
If you are assigned the server-management subrole of the ccm-admin role, you can manage the Cisco Prime
Network Registrar servers as follows:
• Start—Load the database and start the server.
• Stop—Stop the server.
• Reload—Stop and restart the server. (Note that you do not need to reload the server for all RR updates,
even protected RR updates. For details, see the "Managing DNS Update” chapter in Cisco Prime Network
Registrar 9.1 DHCP User Guide.)
• Check statistics—See the Displaying Statistics, on page 144.
• View logs—See the Searching the Logs, on page 137.
• Manage interfaces—See the specific protocol pages for how to manage server interfaces.
Starting and stopping a server is self-explanatory. When you reload the server, Cisco Prime Network Registrar
performs three steps—stops the server, loads configuration data, and restarts the server. Only after you reload
the server does it use your changes to the configuration.
Note The CDNS, DNS, DHCP, and SNMP servers are enabled by default to start on reboot. The TFTP server is
not enabled by default to start on reboot. You can change this using [server] type enable or disable
start-on-reboot in the CLI.
Note If exit-on-stop attribute of DHCP, DNS, or TFTP server is enabled, then the statistics and scope utilization
data only from the last start (reload) is reported while if the attribute is disabled, information across reloads
is displayed.
• Local cluster DNS administrator—Choose DNS Server from the Deploy menu to open the Manage
DNS Authoritative Server page.
Along with the Statistics, Startup Logs, Logs, HA DNS Server Status, Start Server, Stop Server, and
Restart Server functions, you can also perform other functions when you click the Commands button
to open the DNS Commands dialog box.
The server command functions are:
• Forcing all zone transfers (see the "Enabling Zone Transfers" section in Cisco Prime Network
Registrar 9.1 Authoritative and Caching DNS User Guide)—Click the Run icon. This is the
equivalent of dns forceXfer secondary in the CLI.
• Scavenging all zones (see the "Scavenging Dynamic Records" section in Cisco Prime Network
Registrar 9.1 DHCP User Guide)—Click the Run icon. This is the equivalent of dns scavenge in
the CLI.
• Local cluster Caching DNS server—Choose CDNS Server from the Deploy menu to open the Manage
DNS Caching Server page.
Along with the Statistics, Startup Logs, Logs, Start Server, Stop Server, and Restart Server functions,
you can also perform other functions when you click the Commands button to open the CDNS Commands
dialog box.
In Advanced and Expert modes, you can flush Caching CDNS cache and flush the resource records.
Click the Commands button to execute the commands.
• Local cluster DHCP administrator—Click DHCP Server from the Deploy menu to open the Manage
DHCP Server page.
Along with the Statistics, Startup Logs, Logs, Start Server, Stop Server, and Restart Server functions,
you can also perform other functions when you click the Commands button to open the DHCP Server
Commands dialog box.
This page provides the Get Leases with Limitation ID feature, to find clients that are associated through
a common limitation identifier (see the "Administering Option 82 Limitation" section in Cisco Prime
Network Registrar 9.1 DHCP User Guide). Enter at least the IP address of the currently active lease in
the IP Address field, then click the Run icon. You can also enter the limitation ID itself in the form
nn:nn:nn or as a string ("nnnn"), in which case the IP address becomes the network in which to search.
This function is the equivalent of dhcp limitationList ipaddress [limitation-id] show in the CLI.
CLI Commands
In the CLI, the regional cluster allows CCM server management only:
• To start the server, use server type start (or simply type start; for example, dhcp start).
• To stop the server, use server type stop (or simply type stop; for example, dhcp stop). If stopping the
server, it is advisable to save it first using the save command.
• To reload the server, use server type reload (or simply type reload; for example, dhcp reload). Cisco
Prime Network Registrar stops the server you chose, loads the configuration data, and then restarts the
server.
• To set or show attributes for the server, use [server] type set attribute=value or [server] type show. For
example:
nrcmd> ccm set ipaddr=192.168.50.10
Step 1 From the Operate menu, choose Schedule Tasks under the Servers submenu to open the List/Add Scheduled Tasks
page.
Step 2 Click the Add Scheduled Task icon in the Scheduled Tasks pane on the left to open the Add Scheduled Task page.
Step 3 Enter values in the appropriate fields:
a) Name of the scheduled task. This can be any identifying text string.
b) Pull down from the available list of task types, which are:
• dhcp-reload—Reloads the DHCP server
• dns-reload—Reloads the DNS server
• cdns-reload—Reloads the Caching DNS server
• sync-dhcp-pair—Synchronizes the DHCP failover server pair
• sync-dns-pair—Synchronizes the HA DNS failover server pair
• sync-zd-map—Synchronizes zone distribution maps
• sync-dns-update-map—Synchronizes DNS update maps
c) Enter the time interval for the scheduled task, such as 60m or 4w2d in the Schedule Interval field.
Step 4 Click Add Scheduled Task.
Step 5 If you click the name of the task on the List/Add Scheduled Tasks page, on the Edit Scheduled Task page you can view
(in the Task Status section) the last status or the list of last errors (if any) that occurred during the task execution. Click
Run Now to run the task immediately.
Note The DNS server startup and background loading slows down when HA is enabled before the HA DNS server
communicates to its partner. You need to allow the HA DNS server to communicate with its partner before
reloading or restarting the DNS server.
Logs
Log Files
The following table describes the Cisco Prime Network Registrar log files in the install-path/logs directory.
DNS, DHCP, CDNS, CCM, and TFTP servers can generate a number of log files, each with a preconfigured
maximum size of 10 MB. This preconfigured value applies to new installs only.
Note Upgrades from pre-9.1 versions will use the old preconfigured (or explicitly configured) value of 1,000,000
bytes for log files.
The first log file name has the _log suffix. When this file reaches its maximum size, it gets the .01 version
extension appended to its name and a new log file is created without the version extension. Each version
extension is incremented by one for each new file created. When the files reach their configured maximum
number, the oldest file is deleted and the next oldest assumes its name. The usual maximum number is 10 for
the DNS, DHCP, CDNS, CCM, and TFTP servers.
Cisco Prime Network Registrar also has server_startup_log files. This applies to the CCM, DHCP, DNS, and
TFTP servers. These files log the start up and shut down phases of the server (the information is similar to
the normal log file information). Server startup log files are useful in diagnosing problems that have been
reported when the server was last started.
The number of these start-up logs is fixed at four for a server, and the size is fixed at 10 MB per server.
Note Some user commands can create User authentication entries in the Server Agent log because of separate
connections to the cluster. Do not interpret these as a system security violation by another user.
Logging can also be directed to syslog. See Modifying the cnr.conf File, on page 158.
CLI Commands
You can check the configured maximums for the DNS, DHCP, and TFTP servers using [server] type
serverLogs show in the CLI, which shows the maximum number (nlogs) and size (logsize) of these protocol
server log files. You can adjust these parameters using [server] type serverLogs set nlogs=nlogs
logsize=logsize. You cannot adjust these maximums for any of the other log files.
Note A change to the server logs will not take effect until you restart Cisco Prime Network Registrar.
Tip To avoid filling up the Windows Event Viewer and preventing Cisco Prime Network Registrar from running,
in the Event Log Settings, check the Overwrite Events as Needed box. If the events do fill up, save them to
a file, then clear them from the Event Log.
Related Topics
Searching the Logs, on page 137
Logging Format and Settings, on page 137
Note Warnings and errors go to the Event Viewer on Windows (see the Tip in Logging Server Events, on page
136). For a description of the log messages for each server module, see the
install-path/docs/msgid/MessageIdIndex.html file.
CLI Commands
Use dns set log-settings=value, dhcp set log-settings=value, and tftp set log-settings=value for the respective
servers.
To view the full message text, click the name of the log message. Click Close on the Log Search Result page
to close the browser window.
Step 1 From the Deploy menu, choose DHCP Server under the DHCP submenu. The Manage DHCP Server page appears.
Step 2 Click the name of the DHCP server in the left pane to open the Edit DHCP Server page.
Step 3 Modify the log settings as desired.
Step 4 Click Save at the bottom of the page. The new log settings are applied to the DHCP server. The Manage DHCP Server
page is displayed with an updated page refresh time.
Step 1 From the Deploy menu, choose DNS Server under the DNS submenu. This opens the Manage DNS Server page.
Step 2 Click the name of the DNS server in the left pane to open the Edit DNS Server page.
Step 3 Modify the log settings as desired.
Step 4 Click Save at the bottom of the page. The new log settings are applied to the DNS server. The Manage DNS Server page
is displayed with an updated page refresh time.
Note If the dhcp-edit-mode or dns-edit-mode is set to synchronous, and if the server running, the change in server
log settings is communicated to the server.
CLI Commands
To dynamically update the DHCP or DNS server log settings using the CLI, you must have the appropriate
edit-mode set to synchronous. After changing the server log settings, use the save command to save the settings.
For example:
nrcmd> session set dhcp-edit-mode=synchronous
nrcmd> dhcp set log-settings=new-settings
nrcmd> save
Note You must set the locale parameters on UNIX to en_US.UTF-8 when running Java tools that use Java SDK,
such as cnr_rules.
The List Consistency Rules page includes functions to select all rules and clear selections. You can show the
details for each of the rule violations as well as view the output. The rule selections you make are persistent
during your user session.
Step 1 From the Operate menu, choose Consistency Reports under the Reports submenu.
The List Consistency Rules page appears.
Step 2 Check the check boxes for each of the listed consistency rules that you want to apply.
• To select all the rules, click the Select All Rules link.
• To clear all selections, click the Clear Selection link.
Step 4 Click Return to Consistency Rules to return to the List Consistency Rules page.
CLI Tool
Use the cnr_rules consistency rules tool from the command line to check for database inconsistencies. You
can also use this tool to capture the results of the rule in a text or XML file.
The cnr_rules tool is located at:
• Windows—...\bin\cnr_rules.bat
• Linux—.../usrbin/cnr_rules
To run the cnr_rules tool, enter:
> cnr_rules -N username -P password [options]
Option Description
Example
Option Description
–run Run the available rules. Optionally, you can run a subset of the available rules by applying
[rule-match] a case-insensitive rule-match string.
• Runs only the rules whose names contain the string “dhcp”:
> cnr_rules -N admin -P changeme -run dhcp
Tip To match a string containing spaces, enclose the string using double-quotation
marks ("). For example: > cnr_rules -N admin -P changeme -run "router
interface"
–details Includes details of the database objects that violate consistency rules in the results.
Runs the DNS rules, and includes details of the database object in the results:
> cnr_rules -N admin -P changeme -run DNS -details
–path classpath Changes the Java classpath that is searched to locate the available consistency rules
(optional).
In order to run a new, custom consistency rule, you can use this option. You must get
the support of a support engineer to do this.
You can redirect the output of any of these preceding commands to another file. Use the following syntax to
capture the rule results in a:
• Text file:
> cnr_rules -N username -P password -run -details > filename.txt
• XML file:
> cnr_rules -N username -P password -run -xml > filename.xml
Related Topics
Server States, on page 142
Displaying Health, on page 143
Displaying Statistics, on page 144
Displaying IP Address Usage, on page 154
Displaying Related Servers, on page 154
Displaying Leases, on page 157
Server States
All Cisco Prime Network Registrar protocol servers (DNS, DHCP, SNMP, and TFTP) pass through a state
machine consisting of the following states:
• Loaded—First step after the server agent starts the server (transitional).
• Initialized—Server was stopped or fails to configure.
• Unconfigured—Server is not operational because of a configuration failure (transitional).
• Stopped—Server was administratively stopped and is not running (transitional).
• Running—Server is running successfully.
The two essential states are initialized and running, because the server transitions through the states so quickly
that the other states are essentially invisible. Normally, when the server agent starts the server, it tells the
server to be up. The server process starts, sets its state to loaded, then moves up to running. If you stop the
server, it walks down the states to initialized, and if you restart, it moves up to running again. If it fails to
configure for some reason, it drops back to initialized, as if you had stopped it.
There is also an exiting state that the server is in very briefly when the process is exiting. The user interface
can also consider the server to be disabled, but this rarely occurs and only when there is no server process at
all (the server agent was told not to start one).
Displaying Health
You can display aspects of the health of a server, or how well it is running. The following items can decrement
the server health, so you should monitor their status periodically. For the:
• Server agent (local and regional clusters)
• CCM server (local and regional clusters)
• DNS server (local cluster):
• Configuration errors
• Memory
• Disk space usage
• Inability to contact its root servers
• Caching DNS server (local cluster)
• DHCP server (local cluster):
• Configuration errors
• Memory
• Disk space usage
• Packet caching low
• Options not fitting in the stated packet limit
• No more leases available
• TFTP server (local cluster):
• Memory
• Socket read or write error
• Exceeding the overload threshold and dropping request packets
Note Depending on the level of activity and the size and number of log files, the condition that reduced the server
health might not be visible in the log files. It is important to review the log files, but the servers do not log all
the conditions that reduce the server health.
Tip Health values range from 0 (the server is not running) to 10 (the highest level of health). It is recommended
that the health status can be ignored, with the understanding that zero means server is not running and greater
than zero means server is running. On Linux, you can run the cnr_status command, in the install-path/usrbin/
directory, to see if your local cluster server is running. For more information on how to check whether the
local cluster server is running, see Cisco Prime Network Registrar 9.1 Installation Guide.
CLI Commands
Use [server] type getHealth. The number 10 indicates the highest level of health, 0 that the server is not
running.
Displaying Statistics
To display server statistics, the server must be running.
CLI Total Counters since the start of the last Sampled counters since the last sample
DHCP server process (dhcp getStats) interval (dhcp getStats sample)
CLI Total Counters since the start of the last Sampled counters since the last sample
server process (dns getStats) interval (dns getStats sample)
CLI Total Counters since the start of the last Sampled counters since the last sample
server process (cdns getStats total) interval (cdns getStats sample)
To set up the sample counters, you must activate either the collect-sample-counters attribute for the server or
a log-settings attribute value called activity-summary. You can also set a log-settings value for the sample
interval for each server, which is preset to 5 minutes. The collect-sample-counters attribute is preset to true
for the DNS server, but is preset to false for the DHCP server. For example, to enable the sample counters
and set the interval for DHCP, set the following attributes for the DHCP server:
• Enable collect-sample-counters (dhcp enable collect-sample-counters)
• Set log-settings for activity-summary (dhcp set log-settings=activity-summary)
• Set activity-summary-interval to 5m (dhcp set activity-summary-interval=5m)
CLI Commands
In the CLI, if you use [server] type getStats, the statistics are encoded in curly braces followed by sets of
digits, as described in Table 17: DNS Statistics for DNS, Table 19: DHCP Statistics for DHCP, and Table
20: TFTP Statistics for TFTP. The server type getStats all command is more verbose and identifies each
statistic on a line by itself. Using the additional sample keyword shows the sample statistics only.
Reset the counters and total statistic by using dhcp resetStats, dns resetStats, or cdns resetStats.
DNS Statistics
The DNS server statistics in the web UI appear on the DNS Server Statistics page, click on the statistic’s name
to read its description. You can refresh the DNS Server Statistics.
The DNS server statistics that you can view are:
• Attribute—Displays server statistics such as server identifier, recursive service, process uptime, time
since reset, and so on.
Total Statistics
• Performance Statistics—Displays the total statistics of the DNS Server performance.
• Query Statistics—Displays the total statistics of the queries.
• HA Statistics—Displays the total statistics of the HA DNS Server.
• Push Notification Statistics—Displays the total statistics of DNS Push Notifications.
• Host Health Check Statistics—Displays the total statistics of DNS Host Health Check.
• DB Statistics—Displays the total statistics of DNS Database.
• Cache Statistics—Displays the total statistics of DNS Query Cache.
• Security Statistics—Displays the total statistics of the security.
• IPv6 Statistics—Displays the total statistics of the IPv6 packets received and sent.
• Error Statistics—Displays the total statistics of the errors.
• Max Counter Statistics—Displays the total statistics of the maximum number of concurrent threads,
RRs, DNS update latency, concurrent packets, and so on.
Sample Statistics
• Performance Statistics—Displays the sample statistics about the DNS Server performance.
• Query Statistics—Displays the sample statistics about the queries.
• HA Statistics—Displays the sample statistics about the HA DNS Server.
• Push Notification Statistics—Displays the sample statistics of DNS Push Notifications.
• Host Health Check Statistics—Displays the sample statistics of DNS Host Health Check.
• DB Statistics—Displays the sample statistics of DNS Database.
• Cache Statistics—Displays the sample statistics of DNS Query Cache.
Note To get the most recent data, click the Refresh Server Statistics icon at the top left of the Statistics page.
The dns getStats all command is the most commonly used. The dns getStats command without all option
returns the statistics in a single line of positional values in the following format (the table below shows how
to read these values):
nrcmd> dns getStats
100 Ok
{1} 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
3 config-up-time Time (in seconds) elapsed since the last server startup.
4 config-reset-time Time (in seconds) elapsed since the last server reset (restart).
5 config-reset Status or action to reinitializes any name server state—If using the (2) reset
action, reinitializes any persistent name server state; the following are
read-only statuses: (1) other—server in some unknown state, (3) initializing,
or (4) running.
12 counter-errors Number of responses answered with errors (RCODE values other than 0 or
3).
13 counter-rel-names Number of requests received for names of only one label (relative names).
CDNS Statistics
The CDNS server statistics in the web UI appear on the DNS Caching Server Statistics page, click on the
name of the statistics to read its description. You can refresh the CDNS Server Statistics.
DHCP Statistics
The DHCP server statistics in the web UI appear on the DHCP Server Statistics page, click on the statistic’s
name to read its description.
The DHCP server statistics details are available for:
• Attribute—Displays the server statistics such as server start time, server reload time, server up time, and
statistics reset time.
• Total Statistics—Displays the total statistics of the scopes, request buffers, response buffers, packets and
so on.
• Lease Counts (IPv4)—Displays the sample statistics of the IPv4 lease counts such as active leases,
configured leases, reserved leases, and reserved active leases.
• Packets Received (IPv4)—Displays the sample statistics of the IPv4 packets received.
• Packets Sent (IPv4)—Displays the sample statistics of the IPv4 packets sent.
• Packets Failed (IPv4)—Displays the statistics of the failed IPv4 packets.
• Failover Statistics—Displays the statistics of the DHCP failover server.
• IPv6 Statistics—Displays the statistics of the IPv6 prefixes configured, timed-out IPv6 offer packets and
so on.
• Lease Counts (IPv6)—Displays the statistics of the IPv6 lease counts of active leases, configured leases,
reserved leases, and reserved active leases.
• Packets Received (IPv6)—Displays the statistics of the IPv6 packets received.
• Packets Sent (IPv6)—Displays the statistics of the IPv6 packets sent.
• Packets Failed (IPv6)—Displays the statistics of the failed IPv6 packets.
Additional Attributes include Top Utilized Aggregations and Activity Summary.
Note To get the most recent data, click the Refresh Server Statistics icon at the top left of the Statistics page.
The dhcp getStats all command is the most commonly used. The dhcp getStats command without all option
returns the statistics in a single line of positional values in the following format (the table below shows how
to read these values):
nrcmd> dhcp getStats
100 Ok
{1} 2 3 4 5 6 7 8
{1} start-time-str Date and time of last server reload, as a text string.
TFTP Statistics
The TFTP server statistics in the web UI appear on the TFTP Server Statistics page, click on the statistic’s
name to read its description. The following table shows the TFTP statistics encoded as output to the generic
tftp getStats command.
When the TFTP server starts up, it allocates sessions (tftp-max-sessions) and packets (tftp-max-packets) for
its use. The TFTP session represents the communication between the TFTP client and TFTP server.
When a read request reaches the TFTP server, the server assigns a packet for the request, increments the
total-packets-in-use and total-read-requests values by one, and responds to the user with a data packet. The
TFTP server backs up the latest communication packet to resend, if needed. The TFTP server picks another
packet from the pool to use it as data packet. When the TFTP server receives an acknowledgment for the
block of data sent to the client, it sends the next data block. The TFTP server queues up packets associated
with a session, if the session is not able to work on the packets immediately.
The TFTP server statistics details are available for:
• Attribute—Displays the server statistics such as port number, default device, home directory, use home
directory as root, and so on.
• Log Settings—Displays the statistics of the log level, log settings, and packet trace level.
Note To get the most recent data, click the Refresh Server Statistics icon at the top left of the page.
TFTP statistics is encoded as an output to the generic tftp getStats command in the following format:
nrcmd> tftp getStats
100 Ok
{1} 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
9 total-packets-drained Number of packets read and discarded since the last start or reload.
11 total-packets-malformed Number of packets received that were malformed since the last start
or reload.
13 total-read-requests-completed Number of read packets completed since the last start or reload.
14 total-read-requests-refused Number of read packets refused since the last start or reload.
15 total-read-requests-ignored Number of read packets ignored since the last start or reload.
16 total-read-requests-timed-out Number of read packets that timed out since the last start or reload.
17 total-write-requests Number of read packets that were write requests since the last start
or reload.
18 total-write-requests-completed Number of write requests completed since the last start or reload.
19 total-write-requests-refused Number of write requests refused since the last start or reload.
20 total-write-requests-ignored Number of write requests ignored since the last start or reload.
21 total-write-requests-timed-out Number of write requests that timed out since the last start or reload.
22 total-docsis-requests Number of DOCSIS requests received since the last start or reload.
23 total-docsis-requests-completed Number of DOCSIS requests completed since the last start or reload.
24 total-docsis-requests-refused Number of DOCSIS requests refused since the last start or reload.
25 total-docsis-requests-ignored Number of DOCSIS requests ignored since the last start or reload.
26 total-docsis-requests-timed-out Number of DOCSIS requests that timed out since the last start or
reload.
CLI Commands
You can generate an IP address usage report using the report command. The command has the following
syntax:
report [column-separator=string]
[dhcp-only]
[dhcpv4]
[dhcpv6]
[file=outputfile]
[vpn=name]
The column-separator specifies the character string that separates the report columns (the preset value is the
space character). If you want to include more than one space, precede them with the backslash (\) escape
character (enclosed in quotation marks). You can specify DHCPv4 or DHCPv6 addresses (dhcp-only is the
same as dhcpv4). Not specifying the VPN returns the addresses in the current VPN only.
Related Topics
Monitoring Remote Servers Using Persistent Events, on page 154
DNS Zone Distribution Servers, on page 156
DHCP Failover Servers, on page 156
addition, the algorithm prevents a misconfigured or offline DNS server from using up all the available update
resources.
At startup, the DHCP server calculates the number of related servers in the configuration that require persistent
events. A preconfigured Maximum Pending Events attribute (an Expert mode attribute that specifies the
number of in-memory events that is preset to 40,000) is divided by the number of servers to obtain a limit on
the number of events permitted for each remote server. This calculation covers related DNS and LDAP servers
(DHCP failover does not use persistent storage for events). The DHCP server uses this calculation to issue
log messages and take the action described in the following table. The table shows a hypothetical case of a
DHCP server with four related DNS servers each having a limit of 10K events.
50% of the calculated per-server limit (Maximum Issues an INFO log message every 2 minutes, as long
Pending Events value divided by the number of total as the limits are exceeded:
related servers); for example, 5K events on a related The queue of events for the name remote server
server out of a total of 40K maximum pending events at address has x events, and has reached the
info limit of y/2
events out of an upper limit of y events per
remote server. The remote server may be
misconfigured, inoperative, or unreachable.
100% of the calculated per-server limit and less than Issues a WARNING log message every 2 minutes, as
50% of the Maximum Pending Events value; for long as the limits are exceeded:
example, 10K events on a related server, with fewer The queue of events for the name remote server
than 10K total maximum pending events at address has x events, has exceeded the
limit of y events per remote server, but is
below the limit of z total events in memory.
The remote server may be misconfigured,
inoperative, or unreachable.
100% of the calculated per-server limit and 50% or Issues an ERROR log message every 2 minutes, as
more of the Maximum Pending Events value; for long as the limits are exceeded:
example, 10K events on a related server, with 20K The queue of events for the name remote server
total maximum pending events at address has x events, and has grown so
large that the server cannot continue to queue
new events to the remote server. The limit
of y events per remote server and z/2 total
events in memory has been reached. This and
future updates to this server will be dropped.
The current eventID n is being dropped.
100% of the Maximum Pending Events value; for Issues an ERROR log message:
example, 40K events across all related servers The queue of pending events has grown so large
that the server cannot continue to queue new
events. The queue's size is
z, and the limit is z.
SNMP traps and DHCP server log messages also provide notification that a related server is unreachable.
Regional Web UI
From the Deploy menu, choose Zone Distribution under the DNS submenu. This opens the List/Add Zone
Distributions page. The regional cluster allows creating more than one zone distribution. Click the zone
distribution name to open the Edit Zone Distribution page, which shows the name of the zone distribution
map, primary, authoritative, and secondary servers in the zone distribution.
Note Default zone distribution names are not editable. However, non-default zone distribution names are editable
and can be saved.
CLI Commands
Create a zone distribution using zone-dist name create primary-cluster [attribute=value], then view it using
zone-dist list. For example:
nrcmd> zone-dist distr-1 create Boston-cluster
CLI Commands
Use dhcp getRelatedServers to display the connection status between the main and partner DHCP servers.
If there are no related servers, the output is simply 100 Ok.
Displaying Leases
After you create a scope, you can monitor lease activity and view lease attributes.
Related Topics
Immediate Troubleshooting Actions, on page 157
Modifying the cnr.conf File, on page 158
Troubleshooting Server Failures, on page 160
Troubleshooting and Optimizing the TFTP Server, on page 162
Linux Troubleshooting Tools, on page 161
Using the TAC Tool, on page 161
Directory paths must be in the native syntax for the operating system. The format allows the use of colons (:)
in directory paths, but not as name-value pair separators; it does not allow line continuation or embedded
unicode characters. Other modifications to the file might include the location of the log directory (see Log
Files, on page 134) or the time cnr_shadow_backup backups should occur (see Setting Automatic Backup
Time, on page 167).
In rare cases, you might want to modify the file; for example, to exclude certain data from daily backups due
to capacity issues. To do this, you need to add the appropriate settings manually.
Caution We recommend that you use the default settings in this file. If you must change these settings, do so only in
consultation with the Cisco Technical Assistance Center (TAC) or the Cisco Prime Network Registrar
development team.
setting. Disabling the automatic operation means that you must run the operation manually, preferably
on a separate machine, or at a time when the Cisco Prime Network Registrar servers are relatively idle.
• cnr.daily-backup—Specify whether to run the daily back up. The default is true.
Syslog Support
Cisco Prime Network Registrar supports logging to a Syslog server (on Linux). The Syslog support is not
enabled by default. To configure which messages need to be logged, based on logging levels, the cnr.conf
file must be updated.
In addition, on Windows, event logging for Warnings and Errors is enabled by default (for Windows Event
log). In this release, you can log more (or less) to the event log by changing the log settings.
The following cnr.conf configuration parameters are supported:
• cnr.syslog.enable—Specifies whether logging to Syslog server or Windows Event log is enabled for
Prime Network Registrar servers.
• To disable all logging, the value can be 0, off, or disabled.
• To enable all logging, the value can be 1, on, or enabled.
• By default, this parameter is disabled for Linux and enabled for Windows.
• cnr.syslog.levels—Specifies the severity levels to be logged to Syslog or Windows Event log. If Syslog
is enabled, this defaults to warning and error. The value can be a case-blind, comma separated, list of
the following keywords: error, warning, activity, info, and debug. This parameter is ignored if Syslog is
disabled.
Caution While it is possible to enable all of the severity levels and thus all messages
written to the server log files are also logged to Syslog, this is not recommended.
The performance impact on Syslog and the servers may vary greatly depending
on how logging is configured. Syslog may rate limit the messages, so useful
messages may also be lost.
Cisco highly recommends reviewing the Syslog settings and messages in order
to minimize the number of messages written. Writing too many messages to
Syslog will cause a performance impact on the Cisco Prime Network Registrar
servers and Syslog.
• cnr.syslog.facility-Specifies the facility under which Syslog logs (Linux OS). This parameter is ignored
for Windows. The valid facility keywords are daemon (the default), local0, local1, local2, local3, local4,
local5, local6, local7.
Note • These parameters apply to all Cisco Prime Network Registrar servers (cnrservagt, ccm, cdns, cnrsnmp,
dns, dhcp, and tftp).
• To apply any change to the cnr.conf parameters, Cisco Prime Network Registrar must be restarted.
The following cnr.conf configuration parameters allow server-specific overrides of the above parameters.
server is one of cnrservagt, ccm, cdns, cnrsnmp, dns, dhcp, and tftp.
• cnr.syslog.server.enable—Specifies whether Syslog or Windows Event logging is enabled for the specified
server (cnr.syslog.enable is ignored for that server).
• cnr.syslog.server.levels—Specifies the severity levels for the specified server (cnr.syslog.levels is ignored
for that server).
• cnr.syslog.server.facility—Specifies the Syslog facility for the specified server (cnr.syslog.facility is
ignored for that server).
The server specific configuration value is used, if specified. Otherwise, all parameters of the server are used.
For example, to enable Syslog only for DHCP, add the following to the cnr.conf file:
cnr.syslog.dhcp.enable=1
Tip Syntax or other errors in the cnr.conf parameters are not reported and are ignored (that is, if a levels keyword
is mistyped, that keyword is ignored). Therefore, if a configuration change does not work, check if the
parameter(s) have been specified correctly.
Step 1 If the server takes a significantly long time to restart, stop and restart the server agent. On:
• Windows:
• Linux:
Step 2 Keep a copy of all the log files. Log files are located in the install-path/logs directory on Linux, and the install-path\logs
folder on Windows. The log files often contain useful information that can help isolate the cause of a server failure.
Step 3 Use the TAC tool, as described in Using the TAC Tool, on page 161, or save the core or user.dmp file, if one exists,
depending on the operating system:
• Windows—The user.dmp file is located in the system directory, which varies depending on the Windows system.
Search for this file and save a renamed copy.
• Linux—The core file is located in the install-path. Save a renamed copy of this file that Cisco Prime Network
Registrar does not overwrite.
Step 4 On Windows, use the native event logging application to save the System and Application event logs to files. You can
do this from the Event Viewer. These event logs often contain data that helps debug Cisco Prime Network Registrar
server problems. For a description of the log messages for each server module, see the
install-path/docs/msgid/MessageIdIndex.html file.
top
vmstat
grep /var/log/messages*
ifconfig -a
The output directory is optional and normally is the temp directory of the installation directories (in the /var
path on Linux). You may specify the -n option to indicate that when the cnr_exim tool is run, it is run without
exporting any resource records (this specifies the -a none option to cnr_exim). If you do not supply the
username and password on the command line, you are prompted for them:
> cnr_tactool
user:
password:
[processing messages....]
The tool generates a packaged tar file whose name includes the date and version. The tar file contains all the
diagnostic files.
Related Topics
Tracing TFTP Server Activity, on page 162
Optimizing TFTP Message Logging, on page 162
Enabling TFTP File Caching, on page 163
Note Setting and getting the trace level only works if the TFTP server is started. Turn on packet tracing only for
debugging purposes, and then not for any extended time, for performance reasons.
• Log settings (use the log-settings attribute)—This is the second level of logging control and takes only
two values, default or no-success-messages. The default log setting does not alter the default value of
log level 3 (error, warning, and informational messages). However, you may want to disable writing
success informational messages, and thereby improve server performance, by changing the log settings
to no-success-messages.
• Log file count and size (use the log-file-count attribute)—Sets how many log files to maintain and how
large to allow them to get in the /logs directory. The default value is to maintain a maximum of ten files
of 10 MB each.
Step 1 Determine where you want the TFTP cache files to go. This becomes a subdirectory of the TFTP home directory, which
is preset to install-path/data/tftp (on Linux, it is /var/nwreg2/{local | regional}/data/tftp). If you want a different location,
set the home-directory attribute.
Step 2 Change to the TFTP home directory and create the cache directory, such as CacheDir, in the home directory, using the
mkdir Cachedir command. Note that Cisco Prime Network Registrar ignores any files in any subdirectories of this cache
directory.
Step 3 Use the file-cache-directory attribute to set up the TFTP server to point to the cache directory. You cannot use absolute
path or relative path in the directory name. The file-cache-directory name is either appended to the path given in the
home-directory or the default home directory path (if you do not specify one).
Step 4 Use the file-cache-max-memory-size attribute to set the maximum memory size, in bytes, of the cache. The preset value
is 32 KB. Cisco Prime Network Registrar loads all files into cache that cumulatively fit this memory size. If you set the
value to 0, Cisco Prime Network Registrar does not cache any data, even if you enable file caching.
Step 5 Copy all of the files you want cached into the cache directory, and not into any subdirectory. Because all files in this
directory are loaded into cache, do not include large files.
Step 6 Enable the file-cache attribute to enable file caching, then reload the server. Cisco Prime Network Registrar logs the name
of each cached file, and skips any it cannot load. It reads in all files as binary data and translates them as the TFTP client
requests. For example, if a client requests a file as NetASCII, the client receives the cached data in that form.
Step 7 Writing to cache is not allowed. If you need to update a cache file, overwrite it in the cache directory, then reload the
server.
Backing Up Databases
Because the Cisco Prime Network Registrar databases do a variety of memory caching and can be active at
any time, you cannot rely on third-party system backups to protect the database. They can cause backup data
inconsistency and an unusable replacement database.
For this purpose, Cisco Prime Network Registrar provides a shadow backup utility, cnr_shadow_backup.
Once a day, at a configurable time, Cisco Prime Network Registrar takes a snapshot of the critical files. This
snapshot is guaranteed to be a consistent view of the databases.
Recommendation
When upgrading to 9.1 (or later) from a pre-9.1 version of CPNR and when there are significant number of
DHCPv6 leases (and/or DHCPv6 lease history records), customers SHOULD schedule a DHCP database
dump and load (see Using the cnrdb_util Utility , on page 180) to reduce the size of the DHCPv4 database
after the upgrade. The upgrade does NOT reduce the size of the original dhcp.ndb database when the DHCPv6
leases (active + history) are moved to the new dhcp6.ndb and the only way to reduce the size of the original
database is to do a dump and load. Viewing the size of the dhcp6.ndb file (using the ls (Unix) or dir (Windows)
commands) will give you an estimate as to the size by which the database can be reduced.
Related Topics
Syntax and Location, on page 166
Backup Strategy, on page 166
Database Recovery Strategy, on page 169
Note Use only the approved utilities for each type of database. In Windows, if you want to run the utility from
outside the installed path, you must set the CNR_HOME environment variable.
Backup Strategy
The backup strategy involves either:
• Making CCM perform a nightly shadow backup for you (See the Setting Automatic Backup Time, on
page 167) and using the shadow backups for permanent backup and then doing an explicit backup - either
using the cnr_shadow_backup utility and backing up the backup files (*.bak DBs)
or
Shutting down Cisco Prime Network Registrar and performing a backup using TAR or other similar tools.
Note If you change the location of the data directory, you must edit the cnr.conf file, which is located in .../conf
(see Modifying the cnr.conf File, on page 158). Change the cnr.datadir variable to the full path to the data
directory. For example, the following is the default value on Windows:
cnr.datadir=C:\\NetworkRegistrar\\{Local|Regional}\\data
The most basic component of a backup strategy is the daily shadow backup. When problems occur with the
operational database, you might need to try recovering based on the shadow backup of the previous day.
Therefore, you must recognize and correct any problems that prevent a successful backup.
The most common problem is disk space exhaustion. To get a rough estimate of disk space requirements, take
the size of the .../data directory and multiply by 10. System load, such as usage patterns, application mix, and
the load on Cisco Prime Network Registrar itself, may dictate that a much larger reserve of space be available.
You should regularly archive existing shadow backups (such as to tape, other disks, or other systems) to
preserve them for possible future recovery purposes.
Caution Using a utility on the wrong type of database other than the one recommended can cause database corruption.
Use only the utilities indicated. Also, never use the database utilities on the operational database, only on a
copy.
Related Topics
Setting Automatic Backup Time, on page 167
Performing Manual Backups, on page 167
Using Third-Party Backup Programs with cnr_shadow_backup, on page 168
Note You must restart Cisco Prime Network Registrar for a change to cnr.backup-time to take effect.
Note To restore DHCP data from a failover partner that is more up to date than a backup, see Restoring DHCP
Data from a Failover Server, on page 183.
• Replica—The operational database and log files are in the .../data/replica directory.
The file names are:
• Database—dhcp.ndb, dhcp6.ndb, clientdb.ndb, dns.ndb, and the *.db files used by CCM.
• Log files—log.0000000001 through log.9999999999. The number of files varies with the rate of change
to the server. There are typically only a small number. The specific filename extensions at a site vary
over time as the database is used. These log files are not humanly readable.
Step 3 Restart Cisco Prime Network Registrar when the backup is complete.
Note Technically the backups do not need to include the *.bak directories (and subdirectories of those directories)
as those contain nightly shadow backups. However, unless your available storage space is severely limited, we
recommend a full backup of the entire data directory (and subdirectories) including the shadow backups.
it is best to retain the DHCP server databases rather than recovering it, or if recovery is needed, delete
it and recover the current leases from the partner via failover (see Restoring DHCP Data from a Failover
Server, on page 183).
The general approach to recovering a Cisco Prime Network Registrar installation is:
1. Stop the Cisco Prime Network Registrar server agent.
2. Restore or repair the data.
3. Restart the server agent.
4. Monitor the server for errors.
After you are certain that you executed a successful database recovery, always manually execute the
cnr_shadow_backup utility to make a backup of the current configuration and state.
Step 5 Create a new data directory and then untar or recover the backed up directory.
We recommend that you run the DB directory and recovery tools to ensure that the databases are good.
Note Ensure that the logs subdirectory is present in the same directory or the logs path is mentioned in the
DB_CONFIG file.
Step 1 Shut down Cisco Prime Network Registrar. Run /etc/init.d/nwreglocal stop (for RHEL/CentOS 6.x) or systemctl stop
nwreglocal (for RHEL/CentOS 7.x) to ensure that Cisco Prime Network Registrar is down.
Step 2 Rename the active data directory (such as mv data old-data).
Note You must have sufficient disk space for twice the size of the data directory (and all the files in it and its
subdirectories). If you do not have sufficient disk space, move the active data directory to another drive.
Step 3 Create a new data directory and then untar or recover the backed up directory.
We recommend that you run the CNRDB directory and recovery tools to ensure that the databases are good.
Step 1 Shut down Cisco Prime Network Registrar. Run /etc/init.d/nwreglocal stop (for RHEL/CentOS 6.x) or systemctl stop
nwreglocal (for RHEL/CentOS 7.x) to ensure that Cisco Prime Network Registrar is down.
Step 2 Rename the active data directory (such as mv data old-data).
Note You must have sufficient disk space for twice the size of the data directory (and all the files in it and its
subdirectories). If you do not have sufficient disk space, move the active data directory to another drive.
Step 3 Create a new data directory and then untar or recover only the files in that directory (and its subdirectories) from the
backup.
We recommend that you run the CNRDB integrity and recovery tools to ensure that the CNRDB are good.
Step 4 Repeat Step 2 to Step 3 for other DBs that have to be recovered.
Step 5 Start Cisco Prime Network Registrar.
While the regional cluster databases are very reliable (as they are transaction based), there are some situations
(for example, running out of disk space or physical disk issues such as bad blocks) that can result in database
problems, where CCM is unable to start or unable to perform certain functions.
There are four main databases used by the regional cluster:
• The CCM database (ccm directory) which contains the configuration objects.
• The lease history databases (lease6hist and leasehist) which contain the lease history collected from local
clusters (if enabled).
• The subnet utilization database (subnetutil) which contains the scope and prefix utilization history
collected over time (if enabled).
• The replica database (replica) which contains the configuration periodically pulled from local clusters.
The following sections describe the steps used if one or more of these databases develop issues (this can be
determined from the config_ccm_1_log file and errors reported there – possibly including the inability of the
regional to start).
Note Before proceeding with any of these steps, you should first see if the Troubleshooting Databases, on page 176
section can help correct the database, and if not, confirm whether a recent backup is available that might be
restored.
Note These steps may also be used if you decide to no longer want to collect lease history and wish to delete all
history. Before performing Step 1, be sure to disable all lease history collection.
Note These steps may also be used if you decide to no longer want to collect utilization data and wish to delete all
collected data. Before performing Step 1, be sure to disable all utilization history collection.
It is usually a good idea to pull the (IPv4 and IPv6) address space (if using DHCP) and the zone data once
the replica database has been updated to assure that the regional cluster is consistent with the local clusters.
the issue, it may be necessary to completely rebuild the regional. In some cases, it may be necessary to rebuild
the regional cluster on a new system.
If the existing regional cluster is operating, it may be possible to extract the configuration data. However, this
is problematic as it may also extract old or corrupt data (and for some database corruptions, it may loop
exporting the same data over and over). To do this, you can run the cnr_exim tool to export the configuration
in binary mode (use the -x option). If successful, this can later be imported. However, not all data is imported
and therefore, it is important to follow the steps below.
If this is a new system:
Note You MUST NEVER retain the replica database as its data will not be usable if the ccm database is deleted.
Failure to delete the replica database can cause significant issues.
Step 1 Assure that all of the replica data is up-to-date - this can be done by pulling the replicas for each local cluster (either in
web UI or using the cluster name updateReplicaData command).
Step 2 Pull the v4 and v6 address space if using DHCP (either in web UI or using the ccm pullAddressSpace and ccm
pullIPv6AddressSpace commands).
Step 3 Pull the zone data if using DNS (either in web UI or using the ccm pullZoneData command).
Step 4 Pull the administrators or other objects (policies, templates, and so on) as appropriate from one of the local clusters that
has this information (either in web UI or using the pull subcommand).
Troubleshooting Databases
The following sections describe troubleshooting the Cisco Prime Network Registrar databases.
Related Topics
Using the cnr_exim Data Import and Export Tool, on page 176
Using the cnrdb_recover Utility, on page 179
Using the cnrdb_verify Utility, on page 180
Using the cnrdb_checkpoint Utility, on page 180
Using the cnrdb_util Utility , on page 180
Restoring DHCP Data from a Failover Server, on page 183
Some of the advantages that come with the use of multi-tenant architecture are that you can move configurations
for a tenant from one cluster to another to export a tenant template data and them import that data as another
tenant.
Note A user constrained to a specific tenant can only export or import data for that tenant.
The cnr_exim tool also serves to export unprotected resource record information. However, cnr_exim simply
overwrites existing data and does not try to resolve conflicts.
Note You cannot use cnr_exim tool for import or export of data from one version of Cisco Prime Network Registrar
to another. It can be used only for import or export of data from or to the same versions of Cisco Prime Network
Registrar.
Before using the cnr_exim tool, exit from the CLI, then find the tool on:
• Windows—...\bin\cnr_exim.exe
• Linux—.../usrbin/cnr_exim
You must reload the server for the imported data to become active.
Note that text exports are for reading purposes only. You cannot reimport them.
The text export prompts for the username and password (the cluster defaults to the local cluster). The syntax
is:
> cnr_exim –e exportfile [–N username –P password –C cluster]
To export DNS server and zone components as binary data in raw format, use the –x and –c options:
> cnr_exim –e exportfile –x –c "dnsserver,zone"
The data import syntax is (the import file must be in raw format):
> cnr_exim –i importfile [–N username –P password –C cluster]
The following table describes all the qualifying options for the cnr_exim tool.
Option Description
–a Allows exporting and importing of protected or unprotected RRs. Valid values are:
protectedRR, unprotectedRR, and none
Export:
All RRs are exported by default, so you must explicitly specify the export of protected or
unprotected RRs using the option "-a protectedRR", "-a unprotectedRR", or "-a none". If this
option is not specified, all RRs are exported.
Import:
All RRs are imported by default, so you must explicitly specify the import of protected or
unprotected RRs using the option "-a protectedRR" or " -a unprotectedRR". If this option is
not specified, all RRs are imported.
–i importfile Imports the configuration to the specified file. The import file must be in raw format.
–t exportfile Specifies a file name to export to, exports data in s-expression format.
–x When used with the –e (export) option, exports binary data in (importable) raw format.
–g Specifies the destination tenant. Valid for import only. The tenant-id can not be changed when
exporting data, only when the data is imported.)
Option Description
–b Specifies that the core (base) objects are to be included in the import/export. This includes all
objects either with an explicit tenant-id of 0 and those that have no tenant-id attribute.
–w Specifies the view tag to export. This option allows the user to export zone and RRs data which
has the same view tag as mentioned in “w” option. All other objects will not take this option
into consideration and will be exported as earlier if it is used.
Option Description
–c Performs a catastrophic recovery instead of a normal recovery. It not only examines all the log files
present, but also recreates the .ndb (or .db) file in the current or specified directory if the file is
missing, or updates it if is present.
–e Retains the environment after running recovery, rarely used unless there is a DB_CONFIG file in
the home directory.
–h dir Specifies a home directory for the database environment. By default, the current working directory
is used.
–t Recovers to the time specified rather than to the most current possible date. The time format is
[[CC]YY]MMDDhhmm[.ss] (the brackets indicating optional entries, with the omitted year defaulting
to the current year).
–V Writes the library version number to the standard output, and exits.
In the case of a catastrophic failure, restore a snapshot of all database files, along with all log files written
since the snapshot. If not catastrophic, all you need are the system files at the time of failure. If any log files
are missing, cnrdb_recover –c identifies the missing ones and fails, in which case you need to restore them
and perform the recovery again.
Use of the catastrophic recovery option is highly recommended. In this way, the recovery utility plays back
all the available database log files in sequential order. If, for some reason, there are missing log files, the
recovery utility will report errors. For example, the following gap in the log files listed:
log.0000000001
log.0000000053
results in the following error that might require you to open a TAC case:
db_recover: Finding last valid log LSN:file:1 offset 2411756
db_recover: log_get: log.0000000002: No such file or directory
db_recover: DBENV->open: No such for or directory
Option Description
usage: cnrdb_checkpoint [-1Vv] [-h home] [-k kbytes] [-L file] [-P password][-p min]
Important It is strongly recommended that a backup be done before performing any operation on the CPNR databases.
If existing backup files are to be retained, they must be backed up as well.
The following tables describe all of the qualifying operations and options.
Operation Description
Option Description
Option Description
Important If the source and target directories are the same, the Dump and Load operations will delete the source files
when the target files are created. This is done to minimize the disk space requirements when a dump/load
operation is run to recapture the unused space in large database files.
Note The Dump operation will dump each database to a file in the specified location using the database file name
appended by '.dbdump'. The Load operation will only load database files if a *.dbdump file is found; the name
of the database file is the name without '.dbdump'.
On Windows
1. Set the default path; for example:
SET PATH=%PATH%;.;C:\PROGRA~1\NETWOR~1\LOCAL\BIN
Warning When removing either DHCP databases, BOTH MUST be removed - the DHCPv4 (data/dhcp/ndb) or DHCPv6
(data/dhcp/ndb6) lease databases. Removing only one (and leaving the other) is unsupported and may produce
unpredictable results.
On Linux
1. Stop the server agent:
• RHEL/CentOS 6.x:
/etc/init.d/nwreglocal stop
• RHEL/CentOS 7.x:
systemctl stop nwreglocal
rm /var/nwreg2/data/dhcpeventstore/*.*
rm -r /var/nwreg2/data/dhcp/ndb/
rm -r /var/nwreg2/data/dhcp/ndb6/
Warning When removing either DHCP databases, BOTH MUST be removed - the DHCPv4 (data/dhcp/ndb) or DHCPv6
(data/dhcp/ndb6) lease databases. Removing only one (and leaving the other) is unsupported and may produce
unpredictable results.
• RHEL/CentOS 7.x:
systemctl start nwreglocal
customers. It assigns address space to an ISP, or other organization, for use only within the network of that
organization and only for the purposes documented in its requests and reports to ARIN.
Note ARIN manages IP address resources under the auspices of the Internet Corporation for Assigned Names and
Numbers (ICANN). In other geographies, ICANN has delegated authority for IP resources to different regional
Internet Registries. Cisco Prime Network Registrar does not currently support the reports that these registries
might require, nor does it now support IPv6 reports or autonomous system (AS) numbers.
ARIN maintains detailed documentation about its policies and guidelines on its website.
http://www.arin.net
Be sure that you are familiar with these policies and guidelines before proceeding with ARIN reports.
The three options that you can specify for ARIN reports are:
• New—For a newly added POC or organization.
• Modify—Includes changed POC or organization data, such as phone numbers and addresses.
• Remove—Signals that you want to remove the POC or organization from the ARIN database.
Related Topics
Managing Point of Contact and Organization Reports, on page 186
Managing IPv4 Address Space Utilization Reports, on page 189
Managing Shared WHOIS Project Allocation and Assignment Reports, on page 190
Related Topics
Creating a Point of Contact Report, on page 187
Registering a Point of Contact, on page 187
Editing a Point of Contact Report, on page 187
Creating an Organization Report, on page 188
Registering an Organization, on page 188
Step 1 From the Administration menu, choose Contacts under the Settings submenu to open the List/Add ARIN Points of
Contact page.
Step 2 Click the Add Contact icon in the Contacts pane on the left to open the Add Point of Contact page.
Step 3 Enter data in the fields on the page:
• Name—A unique identifier for the POC (required).
• First Name—The first name of the point of contact (required).
• Last Name—The last name of the point of contact (required).
• Type—From the drop-down list, choose Person or Role (optional, with preset value Person).
Step 1 From the Administration menu, choose Contacts under the Settings submenu to open the List/Add ARIN Points of
Contact page.
Step 2 Click the required contact in the Contacts pane on the left.
Step 3 Click the Register Report tab to view the ARIN template file.
Step 4 Copy and paste the template file into an e-mail and send the file to ARIN.
Step 1 From the Administration menu, choose Contacts under the Settings submenu to open the List/Add ARIN Points of
Contact page.
Step 2 Click the required contact in the Contacts pane on the left. The Edit Point of Contact page opens.
Step 3 Enter values for Middle Name, Handle, and Description (optional).
Step 1 From the Administration menu, choose Organizations under the Settings submenu to open the List/Add ARIN
Organizations page.
Step 2 Click the Add Organization icon in the Organizations pane on the left to open the Add Organization page.
Step 3 Enter data in the fields on the page:
• Organization Name—Name of the organization that you want to register with ARIN.
• Description—A text description of the organization.
• Organization Admin POC—From the drop-down list, choose the POC who administers IP resources from the
drop-down list.
• Organization Technical Points Of Contact—From the drop-down list, choose one or more POCs who manage
network operations, or click Add Point of Contact to add new contact information.
Step 4 Click Add Organization. This opens the Edit Organization page where you can add more details.
Registering an Organization
You must register your Organization with ARIN to receive an Organization ID.
Step 1 From the Administration menu, choose Organizations under the Settings submenu to open the List/Add ARIN
Organizations page.
Step 2 Click the required organization in the Organizations pane on the left.
Step 3 Click the Register Report tab to view the ARIN template file.
Step 4 Copy and paste the template file into an e-mail and send the file to ARIN.
Step 1 From the Administration menu, choose Organizations under the Settings submenu to open the List/Add ARIN
Organizations page.
Step 2 Click the required organization in the Organizations pane on the left.
Step 3 Enter or change data in the fields.
• Miscellaneous Settings—Add these additional attributes as strings or lists of text.
• Organization Abuse Points of Contact—From the drop-down list, choose one or more POCs who handle network
abuse complaints, or click Add Point of Contact to add new contact information.
• Organization NOC Points of Contact—From the drop-down list, choose one or more POCs in network operations
centers, or click Add Point of Contact to add new contact information.
Note The ARIN website contains extensive information about how it initially allocates address space and its threshold
criteria for requesting additional address space. In general, for a single-homed organization, the minimum
allocation from ARIN is a /20 block of addresses. For a multihomed organization, the minimum allocation is
a /22 block of addresses. ARIN recommends that an organization requiring a smaller block of addresses
contact an upstream ISP to obtain addresses.
The Cisco Prime Network Registrar utilization report corresponds to the ARIN ISP Network Request template
(ARIN-NET-ISP-3.2.2).
Step 1 From the Operate menu, choose ARIN Address Space Usage under the Reports submenu to open the Select Address
Space Report page.
Step 2 In the Select the Report Type field, choose Utilization from the drop-down list. The Select the Filter Type field is updated
with the value, by-owner. The browser redisplays the Select Address Space Report page with two new fields: Network
Name and Network Prefix Length.
Step 3 In the Select Owner field, choose the owner of this address block from the drop-down list.
Step 4 Enter values for the Network Name and Network Prefix Length.
Step 5 Click Generate Report. The browser displays an ARIN template file (ARIN-NET-ISP-3.2.2).
Several sections of the report require that you manually enter data because the information is generated and maintained
outside the Cisco Prime Network Registrar application.
Step 6 Click Save Report. The browser displays the Address Space Utilization Report as an unformatted text file.
Step 7 Copy the Address Space Utilization Report to a text editor to manually enter the data that Cisco Prime Network Registrar
does not generate.
Step 8 Copy and paste the edited report into an e-mail and send the file to ARIN.
Registered Devices
Registered Device report displays the list of devices that are registered through BYOD web server. The report
can be exported in the csv format. Only an admin user is allowed to delete a device using the Registered
Device Report page.
Note You must select the desired server from the cluster pane to view the corresponding registered devices report
in the List BYOD Registered Devices page.
Scopes/Prefix
Scope/Prefix report displays the list of scopes and prefixes that are used for BYOD. The report can be exported
in the csv format.
Scope/Prefix Report
To view the Scope/Prefix Report:
Note You must select the desired server from the cluster pane to view the corresponding scopes and prefixes created
during BYOD setup in the List BYOD Scope/Prefix page.
Step 1 In the vSphere Client window, select the host/server on which the virtual Cisco Prime Network Registrar appliance
resides.
Step 2 Click Storage Views to see the list of the machines hosted by the server and the details about the space currently used
by each machine.
Also, you can go to the Virtual Machines tab to view both the Provisioned Space and the Used Space by machine.
Step 4 Select the virtual machine and click the Summary tab.
The Resources area of the Summary tab displays the disk space details for the machine.
Step 1 Select the virtual machine in the vSphere Client window and either click the Console tab on the right pane or right-click
the virtual machine name and choose Open Console.
Step 2 Log in as root and type df -k. The disk space details are displayed.
If the disk space on the disk mounted is not enough, then you should increase the size of the disk (see Increasing the Size
of the Disk on VMware, on page 196).
Increasing the size of the disk must be done when the VM is not running. You may do this before you install
the VM, when the VM is certainly not running, or you may do this after you have brought up the VM and it
has already run. If the VM is running, you must shut down the VM before you increase the size of the disk.
Once the VM is not running, use the truncate and virt-resize commands to create a larger disk and copy the
data onto the larger disk, as well as to change the partition table and resize the filesystem to use the additional
space.
Following is an example of how you might use these commands to increase the size of the disk from the
default size of 14 GB to 16 GB. In practice, you almost certainly would use a larger size than 16 GB. The
new size of the disk is specified on the truncate command.
Example
**********
Summary of changes:
**********
Resize operation completed with no errors. Before deleting the old disk, carefully check
that the resized disk boots and works correctly.
The operation in the above example took about 5 or 6 minutes on a moderately powerful machine.
The time it will take on your machine will vary depending on a variety of factors.
The truncate command creates a new disk file of a specified size and the virt-resize command
recreates the partitions of the input disk out the output disk, copies the data from the original disk
file onto the new disk file, and enlarges the filesystem in the specified partition to encompass
everything in the partition. After completing this operation, replace the disk of the VM with the new
disk using the virtual machine manager.
Note Though once you have used the new disk, the data on the original disk is old and should not be used,
it is still a working disk and could be saved as a backup. If you returned to using the original disk,
all memory of the processing performed while the new, larger disk was operating will be lost, and
serious conflicts between IP addresses granted to DHCP while the new disk was in use and the DHCP
server's future activity when using the old disk will occur.
If you increase the size of the disk before the installation of the VM, you must rename the new disk
file to be the same as the original disk file: @BUILDNAME-disk1.raw, as that is what the installonkvm
script expects the name of the disk file to be.
Troubleshooting
If you experience any issues while working with the Cisco Prime Network Registrar virtual appliance, we
recommend you to do the following:
Examine the log files in /var/nwreg2/{local | regional}/logs. Look particularly for errors in the log files as
these signal exceptional conditions. If you are unable to resolve the problem and you have purchased Cisco
support, then submit a case to Cisco Technical Assistance Center (TAC) regarding the problem.
B
Berkeley Internet Name Domain (BIND) Implementation of the Domain Name System (DNS)
protocols. See also DNS.
binding Collection of DHCP client options and lease
information, managed by the main and backup DHCP
servers. A binding database is a collection of
configuration parameters associated with all DHCP
clients. This database holds configuration information
about all the datasets.
C
cable modem termination system (CMTS) Cable modem termination system. Either a router or
bridge, typically at the cable head end.
cache Data stored in indexed disk files to reduce the amount
of physical memory.
caching name server Type of DNS server that caches information learned
from other name servers so that it can answer requests
quickly, without having to query other servers for
each transaction.
canonical name Another name for an alias DNS host, inherent in a
CNAME resource record (RR).
case sensitivity Values in Cisco Prime Network Registrar are not
case-sensitive, with the exception of passwords.
Central Configuration Management (CCM) Main database for the Cisco Prime Network Registrar
database web-based user interface (web UI).
chaddr DHCP client hardware (MAC) address. Sent in an
RFC 2131 packet between the client and server.
change logs, changesets A change log is a group of changesets made to the
Cisco Prime Network Registrar databases due to
additions, modifications or deletions in the web UI.
A changeset is a set of changes made to a single object
in the database.
ciaddr DHCP client IP address. Sent in an RFC 2131 packet
between the client and server.
class of address Category of an IP address that determines the location
of the boundary between network prefix and host
suffix. Internet addresses can be A, B, C, D, or E level
addresses. Class D addresses are used for multicasting
and are not used on hosts. Class E addresses are for
experimental use only.
client-class Cisco Prime Network Registrar feature that provides
differentiated services to users that are connected to
a common network. You can thereby group your user
community based on administrative criteria, and then
ensure that each user receives the appropriate class of
service.
cluster In Cisco Prime Network Registrar, a group of DNS,
DHCP, and TFTP servers that share the same
database.
D
Data Over Cable Service Interface Specification Data Over Cable Service Interface Specification.
(DOCSIS) Standard created by cable companies in 1995 to work
toward an open cable system standard and that resulted
in specifications for connection points, called
interfaces.
delegation Act of assigning responsibility for managing a DNS
subzone to another server, or of assigning DHCP
address blocks to local clusters.
DHCP Dynamic Host Configuration Protocol. Designed by
the Internet Engineering Task Force (IETF) to reduce
the amount of configuration that is required when
using TCP/IP. DHCP allocates IP addresses to hosts.
It also provides all the parameters that hosts require
to operate and exchange information on the Internet
network to which they are attached.
DHCP utilization A report that can be generated to determine how many
addresses in the subnet or prefix were allocated and
what the free address space is.
Digital Subscriber Line (DSL) Public network technology that delivers high
bandwidth over conventional copper wiring at limited
distances.
DNS Domain Name System. Handles the growing number
of Internet users. DNS translates names, such as
www.cisco.com, into Internet Protocol (IP) addresses,
such as 192.168.40.0, so that computers can
communicate with each other.
DNS update Protocol ( RFC 2136) that integrates DNS with DHCP.
domain Portion of the DNS naming hierarchy tree that refers
to general groupings of networks based on
organization type or geography. The hierarchy is root,
top- or first-level, and second-level domain.
E
expression Construct commonly used in the Cisco Prime Network
Registrar DHCP implementation to create client
identities or look up clients. For example, an
expression can be used to construct a scope from a
template.
extension and extension point In Cisco Prime Network Registrar, element of a script
written in TCP, C, or C++ that customizes handling
DHCP packets as the server processes them, and
which supports additional levels of customizing DHCP
clients.
F
failover Cisco Prime Network Registrar feature (as described
in RFC 2131) that provides for multiple, redundant
DHCP servers, whereby one server can take over in
case of a failure. DHCP clients can continue to keep
and renew their leases without needing to know or
care which server is responding to their requests.
G
giaddr DHCP gateway (relay agent) IP address. Sent in an
RFC 2131 packet between the client and server.
H
High-Availability (HA) DNS DNS configuration in which a second primary server
can be made available as a hot standby that shadows
the main primary server.
I
IEEE Institute of Electrical and Electronics Engineers.
Professional organization whose activities include
developing communications and network standards.
iterative query Type of DNS query whereby the name server returns
the closest answer to the querying server.
lame delegation Condition when DNS servers listed in a zone are not
configured to be authoritative for the zone.
lease grace period Length of time the lease is retained in the DHCP
server database after it expires. This protects a client
lease in case the client and server are in different time
zones, their clocks are not synchronized, or the client
is not on the network when the lease expires.
lease query Process by which a relay agent can request lease (and
reservation) data directly from a DHCP server in
addition to gleaning it from client/server transactions.
loopback zone DNS zone that enables the server to direct traffic to
itself. The host number is almost always 127.0.0.1.
M
MAC address Standardized data link layer address. Required for
every port or device that connects to a LAN. Other
devices in the network use these addresses to locate
specific ports on the network and to create and update
routing tables and data structures. MAC addresses are
six bytes long and are controlled by the IEEE. Also
known as a hardware address, MAC layer address,
and physical address. A typical MAC address is
1,6,00:d0:ba:d3:bd:3b.
mail exchanger Host that accepts electronic mail, some of which act
as mail forwarders. See also MX record.
master name server Authoritative DNS name server that transfers zone
data to secondary servers through zone transfers.
maximum client lead time (MCLT) In DHCP failover, a type of lease insurance that
controls how much ahead of the backup server lease
expiration the client lease expiration should be.
Multiple Service Operator (MSO) Provides subscribers Internet access using cable or
wireless technologies.
nameserver DNS host that stores data and RRs for a domain.
negative cache time Memory cache the DNS server maintains for a quick
response to repeated requests for negative information,
such as "no such name" or "no such data." Cisco Prime
Network Registrar discards this information at
intervals.
O
on-demand address pool Wholesale IP address pool issued to a client (usually
a VPN router or other provisioning device), from
which it can draw for lease assignments. Also known
as DHCP subnet allocation.
prefix stability Clients can retain the delegated prefix when they
change their location, that is even when they move
from one CMTS to another (CMTS Prefix Stability)
or move within an address space (Universal Prefix
Stability).
recursive query DNS query where the name server asks other DNS
server for any nonauthoritative data not in its own
cache. Recursive queries continue to query all name
servers until receiving an answer or an error.
root hint server DNS name server at the top of the hierarchy for all
root name queries. A root name server knows the
addresses of the authoritative name servers for all the
top-level domains. Resolution of nonauthoritative or
uncached data must start at the root servers.
Sometimes called a hint server.
secondary master DNS name server that gets it zone data from another
name server authoritative for the zone. When a
secondary master server starts up, it contacts the
primary master, from which it receives updates.
secondary subnet A single LAN might have more than one subnet
number applicable to the same LAN or network
segment in a router. Typically, one subnet is
designated as primary, the others as secondary. A site
might support addresses on more than one subnet
number associated with a single interface. You must
configure the DHCP server with the necessary
information about your secondary subnets.
selection tags Mechanisms that help select DHCPv4 scopes and
DHCPv6 prefixes for clients and client-classes.
slave forwarder DNS server that behaves like a stub resolver and
passes most queries on to another name server for
resolution. See also stub resolver.
slave servers DNS server that always forwards queries it cannot
answer from its cache to a fixed list of forwarding
servers instead of querying the root name servers for
answers.
SNMP notification Simple Network Management Protocol messages that
warn of server error conditions and problems. See
also trap.
SOA record DNS Start of Authority resource record (RR).
Designates the start of a zone.
staged edit mode dhcp or dns edit mode in which the data is stored on
the CCM server, but not live on the protocol server.
See also synchronous edit mode.
stub resolver DNS server that hands off queries to another server
instead of performing the full resolution itself.
synchronous edit mode dhcp or dns edit mode in which the data is live on the
protocol server. See also staged edit mode.
transaction signature (TSIG) DHCP mechanism that ensures that DNS messages
come from a trusted source and are not tampered with.
See also access control list (ACL).
trap Criteria set to detect certain SNMP events, such as to
determine free addresses on the network. See also
SNMP notification.
trimming and compacting Trimming is periodic elimination of old historical data
to regulate the size of log and other files. Compacting
is reducing data older than a certain age to subsets of
the records.
Trivial File Transfer Protocol (TFTP) Protocol used to transfer files across the network using
UDP. See also User Datagram Protocol (UDP).
U
Universal Time (UT) International standard time reference that was formerly
called Greenwich Mean Time (GMT), also called
Universal Coordinated Time (UCT).
update configuration, DNS Defines the relationship of a zone with its main and
backup DNS servers for DNS update purposes.
V
virtual channel identifier (VCI) and virtual path 16-bit field in the header of an ATM cell. The VCI,
identifier (VPI) together with the VPI, identifies the next destination
of a cell as it passes through a series of ATM switches
on its way to its destination. ATM switches use the
VPI/VCI fields to identify the next network VCL that
a cell needs to transit on its way to its final destination.
The function of the VCI is similar to that of the DLCI
in Frame Relay.
virtual private network (VPN) Protocol over which IP traffic of private address space
can travel securely over a public TCP/IP network. A
VPN uses tunneling to encrypt all information at the
IP level. See also VRF.
VRF VPN Routing and Forwarding instance. Routing table
and forwarding information base table, populated by
routing protocol contexts. See also virtual private
network (VPN).
W
well-known port Any set of IP protocol port numbers preassigned for
specific uses by transport level protocols, for example,
TCP and UDP. Each server listens at a well-known
port so clients can locate it.
WKS record DNS Well Known Service resource record (RR). Used
to list the services provided by the hosts in a zone.
Common protocols are TCP and UDP.
Y
yiaddr "Your" client IP address, or address that the DHCP
server offers (and ultimately assigns) the client. Sent
in an RFC 2131 packet between the client and server.
zone of authority Group of DNS domains for which a given name server
is an authority.
zone transfer Action that occurs when a secondary DNS server starts
up and updates itself from the primary server. A
secondary DNS server queries a primary name server
with a specific packet type called AXFR (transfer all)
or IXFR (incrementally transfer) and initiates a
transfer of a copy of the database.
A administrators (continued)
regional 120
A record 199 relationship to groups 36
AD external authentication server 61, 62 types 36
pulling 62 agent_server_log file 134
pushing 61 area chart 27
addr-trap command (CLI) 95 Asynchronous Transfer Mode (ATM) 199
create 95 attributes 14, 15
pull 95 displaying 14
push 95 Help window 15
reclaim 95 modifying 14
addrblock-admin role 37 auth-ad-server command (CLI) 62
core functionality 37 pull 62
ipv6-management subrole 37 push 62
ric-management subrole 37
address infrastructure, creating 114
address ranges 114
C
adding 114 cable modem termination system (CMTS) 2
address restrictions, zones 116 cache, refreshing session 12
address space 123 case-sensitivity of values 200
local, pulling from subnets 123 catalina.date.log file 134
address usage reports 154 CCM 134
displaying 154 database 134
addresses 154 logging 134
usage, displaying 154 ccm command (CLI) 100, 108, 133
addresses:IP format 203 polling attribute, setting 100
admin command (CLI) 50, 51, 58, 60 pullAddressSpace 108
create 50 pullIPv6AddressSpace 108
delete 50 set 133
enterPassword 51 CCM database 134, 200
pull 50, 60 files 134
push 50, 58 CCM server 9, 100
reclaim 50 polling attributes 100
set password 51 CCM server properties 85
admin role 199 editing 85
administrators 35, 36, 49, 51, 57, 58, 59, 120, 199 ccm_startup_log file 134
adding 49 ccm_upgrade_status_log file 134
centrally managing 57 ccm-admin role 37
editing 49 authentication subrole 37
passwords 49, 51 authorization subrole 37
adding 49 core functionality 37
changing 51 database subrole 37
managing 51 owner-region subrole 37
pulling replica 59 server-management subrole 37
pushing to local 58
V Windows (continued)
Event Viewer 137
virtual path identifier 211 logging 136
virus scanning, excluding directories 176 WKS records 212
vpn command (CLI) 107
pull 107
push 107
Y
VPNs 106, 107 yiaddr 212
local 106, 107 DHCP field 212
pulling 107
pushing 106
regional 106 Z
zone data 123
W pulling 123
zone distributions 156
Web UI 2, 9, 11, 13, 14, 15, 134 creating 156
attributes 14 listing 156
displaying 14 zone tree, viewing 115
modifying 14 zone-dist command (CLI) 156
changes, committing 14 create 156
deployment scenarios 2 list 156
help 15 zones 114, 115, 116, 210
attributes 15 address restrictions 116
topics 15 infrastructure 114
logging 134 listing 115
logging in 11 restricting hosts 116
navigation 13 subzones 210
session settings 14 delegating 210
user preferences 14 zones:staged edit mode 209
Windows 20, 136, 137 zones:synchronous edit mode 210
CLI location 20