Cisco Prime Infrastructure 3 10 Admin Guide
Cisco Prime Infrastructure 3 10 Admin Guide
Cisco Prime Infrastructure 3 10 Admin Guide
10 Administrator Guide
First Published: 2021-09-24
Last Modified: 2022-02-03
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2021 Cisco Systems, Inc. All rights reserved.
CONTENTS
Add Licenses 21
Delete Licenses 21
Troubleshoot Licenses 21
Controller Licensing 23
MSE Licensing 25
Restore Data 58
Restore an Application Backup 59
Restore an Appliance Backup 59
Recover from Failed Restores 60
How to Manage Disk Space Issues During Backup and Restore 60
Migrate to Another Virtual Appliance Using Backup and Restore 61
Migrate to Another Physical Appliance Using Backup and Restore 62
Backup and Restore with Operations Center 62
Migrate Data from Cisco Prime LMS to Cisco Prime Infrastructure 158
User Interfaces, User Types, and How To Transition Between Them 161
User Interfaces and User Types 161
How to Transition Between the CLI User Interfaces in 163
What is the Difference Between “Major Polling” and “Minor Polling”? 268
Enable Backward Compatibility between Catalyst 9800 WLC Devices and Prime Infrastructure 351
APPENDIX C Configure High Availability for Plug and Play Gateway 381
How Cisco Plug and Play Gateway HA Works 381
Cisco Plug and Play Gateway HA Prerequisites 381
Set up Standalone Cisco Plug and Play Gateway for Prime Infrastructure HA 382
in HA with Virtual IP Address 382
in HA with Different IP Address 382
Cisco Standalone Plug and Play Gateway Server HA Setup 383
Cisco Plug and Play Gateway Status 384
Remove Cisco Plug and Play Gateway in HA 385
Cisco Plug and Play Gateway HA and Combinations 386
Limitations of Cisco Plug and Play Gateway HA 386
Modify the stored Cisco.com credentials (user name and Configure Stored Cisco.com Credentials,
password) used to log on to Cisco.com and: on page 91
• Check for product updates
• Check for device software image updates
• Open or review Cisco support cases
Set up HTTPS on the server for secure interactions between the Secure the Connectivity of the Server, on
server and browser-based GUI client (you can use HTTP but page 79
HTTPS is recommended)
Task See
For server-related traps that signal system problems, customize Customize Server Internal SNMP Traps
the threshold settings and severities, and forward the traps as and Forward the Traps, on page 101
SNMP trap notifications to configured receivers
Set up NTP (Network Time Protocol) so that time is synchronized Set Up NTP on the Server, on page 88
between the server and network devices
Configure FTP/TFTP on the server for file transfers between the Enable FTP/TFTP/SFTP Service on the
server and network devices Server, on page 90
Configure a proxy for the server Set Up the Proxy Server , on page 89
Configure the email server Set Up the SMTP E-Mail Server, on page
90
Configure product feedback to help Cisco improve its products Set Up Defaults for Cisco Support
Requests, on page 102
Configure product feedback to help Cisco improve its products Configure Cisco Product Feedback
Settings, on page 103
# fdisk -l | egrep "Disk /dev/v|Disk /dev/s|Disk /dev/h|Disk /dev/dasd|Disk /dev/cciss" | cut -d' '
-f1-2 | sed 's/Disk/dd if=\/dev\/zero/g' | sed 's/dd if=\/dev\/zero /dd if=\/dev\/zero of=/g' | sed
's/:/ bs=1M count=2048/g' > /tmp/wipeout.sh # cat /tmp/wipeout.sh # sh /tmp/wipeout.sh
Step 6 To confirm the wipe out operation, the run the following command to check for any available partition data.
# fdisk -l
Create web GUI users that have administration Create Web GUI Users with Administrator Privileges, on
privileges, and disable the web GUI root account page 191
Disable and Enable the Web GUI root User, on page 165
Set up user authentication and authorization Configure Local Authentication, on page 210
Create user accounts and user groups Control the Tasks Web Interface Users Can Perform (User
Groups), on page 165
Adjust user security settings (password rules for Configure Global Password Policies for Local
local authentication, idle time logout setting) Authentication, on page 200
Configure the Global Timeout for Idle Users, on page 200
Specify which users can approve jobs Configure Job Approvers and Approve Jobs, on page 199
Create virtual domains to control device access Create Virtual Domains to Control User Access to
Devices, on page 202
Create a message that is displayed when users log Create a Login Banner (Login Disclaimer), on page 91
in to the GUI client
Task See
Configure global settings for alarm and event displays and Configure Global Display and Search Settings
searches: for Acknowledged, Cleared, and Assigned
Alarms, on page 235
• Hide acknowledged, assigned, and cleared alarms in the
Alarms and Events tables
• Include acknowledged and assigned alarms in search
results
• Include device names in alarm messages
Customize the severity for specific events Change Severity Levels, on page 235
Customize the auto-clear interval for specific alarms Change Alarm Auto-Clear Intervals, on page
236
Make the text in the alarm Failure Source field more Change Severity Levels, on page 235
user-friendly
Control generic event handling Disable and Enable Generic Trap Processing,
on page 238
Control if and how users can create Cisco Support Requests Set Up Defaults for Cisco Support Requests,
on page 102
Note You can also activate your operation center license on the Prime Infrastructure server that will
host Operations Center using smart licensing feature. Applying the smart license will also
automatically enableOperations Center as the SSO server for the cluster of Prime Infrastructure
instances it manages. To know more on Smart Licensing, see Smart Licensing, on page 32.
2. Add to Operations Center the instances you want to manage. You can configure each instance as an SSO
client as it is added to Operations Center
3. (Optional) Disable the personal and global idle-user timeouts for Operations Center and all of its managed
instances.
4. (Optional) Configure remote AAA using TACACS+ or RADIUS servers for Operations Center and all
of its managed instances,
Operations Center does not require a separate installation. Instead, you can select or install the server that
you want to use to manage other instances, and then activate an Operations Center license on that server.
Note Enabling Operations Center license will prevent the same server instance from monitoring the devices directly.
The devices will be added to a separate instance.
When activating the license, Operations Center automatically configures itself as the SSO server .
The number of instances you can manage using Operations Center depends on the license you have purchased.
For details, see the Cisco Prime Infrastructure Ordering and Licensing Guide.
Step 1 Select Administration > Licenses and Software Updates > Licenses > Files > License Files. The License Files page
displays.
Step 2 Click Add. The Add a License File dialog box displays.
Step 3 Click Choose File.
Step 4 Navigate to your license file, select it, then click Open.
Step 5 Click OK. will confirm that the Operations Center license has been added.
Step 6 If you are notified that SSO is not set up:
• Click Yes, to configure this new Operations Center as an SSO server automatically.
• Click No to configure SSO with DNS Name. Seamless SSO will Add SSO server with DNS Name.
Step 7 When prompted to log out: Click OK. The newly active license should now be listed in the Licenses > License Files
page.
Step 8 Log out of and then log back in. The login page that appears should display “Cisco Prime Infrastructure Operations
Center [SSO]”, which indicates the license has been applied.
Related Topics
Set Up Operations Center, on page 4
Enable AAA for Operations Center, on page 8
Change User Group Memberships, on page 190
Step 1 If this is the first time you are choosing Smart licenses:
a) Choose Administration > Licenses and Software Updates > Licenses.
After a few moments, Prime Infrastructure displays a dialog box informing you that you cannot access the page
because you are not using traditional licensing. This is normal.
b) In the dialog box, click Smart License Settings.
c) Click the Licensing Settings tab.
Step 2 If you are already using Smart Licensing:
a) Choose Administration > Licenses and Software Updates > Smart Software Licensing.
b) Click the Licensing Settings tab.
Step 3 Click Smart Software Licensing radio button.
Step 4 Choose Prime Infrastructure Operation Center from the Product Name drop-down list and click Enable Smart Software
Licensing.
Note To enable Operation Center SSO, click Yes in the If you want to add SSO for the same server with IP/DNS
dialog box.
Step 5 Select the licenses in the Available Licenses dialog box, then click Save.
c) Click OK again.
Step 6 Repeat these steps to add more servers, up to the license limit.
Note If you configure High Availability on a managed instance after adding it in Prime Operations Center, make
sure that the primary and secondary server details are appearing correctly by navigating to the Monitor >
Managed Elements > Manage and Monitor Servers.
Related Topics
Set Up Operations Center, on page 4
Add SSO Servers
Related Topics
Set Up Operations Center, on page 4
Note Make sure you do not change the AAA setting under Administration > Users > Users, Roles &
AAA > AAA Mode Setting. It should be in SSO mode only.
Note Prime Infrastructure Manage Instance will only fall back to TACACS+ or RADIUS if SSO server
is unreachable or not responding.
What to do Next
When you have completed the setup tasks, you are ready to use Operations Center.
You can enable the Operations Center instance for High Availability (HA). HA uses a pair of linked,
synchronized Prime Infrastructure servers, to minimize or eliminate the impact of application or hardware
failures that may take place on either server. For details, see “Enable HA for Operations Center” in Related
Topics
Related Topics
Set Up Operations Center, on page 4
Enable HA for Operations Center, on page 283
You must also configure your devices to support SNMP traps and syslogs, and the Network Time Protocol
(NTP), as explained in the related topics.
Related Topics
Configure SNMP, on page 9
Configure NTP, on page 10
Configure SNMP
To ensure that can query SNMP devices and receive traps and notifications from them, you must:
• Set SNMP credentials (community strings) on each device you want to manage using.
• Configure these same devices to send SNMP notifications to the server.
Use the following Cisco IOS configuration commands to set read/write and read-only community strings on
an SNMP device:
• admin(config)# snmp-server community private RW
• admin(config)# snmp-server community public RW
where:
• private and public are the community strings you want to set.
After you set the community strings, you can specify that device notifications be sent as traps to the server
using the following Cisco IOS global configuration command on each SNMP device:
admin(config)# snmp-server host Host traps version community notification-type
where:
• Host is the IP address of the server.
• version is the version of SNMP that is used to send the traps.
• community is the community string sent to the server with the notification operation.
• notification-type is the type of trap to send.
You may need to control bandwidth usage and the amount of trap information being sent to the server using
additional commands.
For more information on configuring SNMP, see:
• The snmp-server community and snmp-server host commands in the Cisco IOS Network Management
Command Reference.
• The Configuring SNMP Support section and the list of notification-type values in the Cisco IOS
Configuration Fundamentals Configuration Guide, Release 12.2.
If you are planning on implementing IPSec tunneling between your devices and the server, be advised that
you will not receive syslogs transmitted from those devices to the server after implementing IPSec tunneling
because IPSec does not support free-form syslogs. However, IPSec does support SNMP traps. To continue
getting SNMP notifications of any kind from these devices, you need to configure your devices to send SNMP
traps to the server.
Configure NTP
Network Time Protocol (NTP) must be properly synchronized on all devices in your network as well as on
the server. This includes all -related servers: any remote FTP servers that you use for backups, secondary
high-availability servers, the Plug and Play Gateway, VMware vCenter and the ESX virtual machine, and so
on.
You specify the default and secondary NTP servers during server installation. You can also use ntp server
command to add to or change the list of NTP servers after installation. For details, see How to Connect Via
CLI, on page 119 and the section on the ntp server command in the Command Reference Guide . Note that
cannot be configured as an NTP server; it acts as an NTP client only.
Failure to manage NTP synchronization across your network can result in anomalous results in . Management
of network time accuracy is an extensive subject that involves the organization's network architecture, and is
outside the scope of this Guide. For more information on this topic, see (for example) the Cisco White Paper
Network Time Protocol: Best Practices .
Device Type Cisco IOS Releases Supported NetFlow Export NetFlow Configuration
That Support NetFlow Types
Catalyst 15.0(1)SE TCP and UDP traffic See the Configure NetFlow on Catalyst 3000, 4000, and 6000
3750-X / Family of Switches section in the Cisco Prime Infrastructure
IP base or IP services
3560-X User Guide.
feature set and equipped
with the network
services module.
' 15.0(1)EX TCP and UDP traffic, To configure TCP and UDP traffic, See the Configure NetFlow
Voice & Video on Catalyst 3000, 4000, and 6000 Family of Switches section
Catalyst 3850
in the Cisco Prime Infrastructure User Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
Catalyst 4500 15.0(1)XO and 15.0(2) TCP and UDP traffic, To configure TCP and UDP traffic, See the Configure NetFlow
Voice & Video on Catalyst 3000, 4000, and 6000 Family of Switches section
in the Cisco Prime Infrastructure User Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
Catalyst 6500 SG15.1(1)SY TCP and UDP traffic, To configure TCP and UDP traffic, See the Configure NetFlow
Voice & Video on Catalyst 3000, 4000, and 6000 Family of Switches section
in the Cisco Prime Infrastructure User Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
ISR 15.1(3) T TCP and UDP traffic, To configure TCP and UDP traffic, use this CLI template:
Voice & Video
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Collecting
Traffic Statistics
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
Device Type Cisco IOS Releases Supported NetFlow Export NetFlow Configuration
That Support NetFlow Types
ISR G2 15.2(1) T and 15.1(4)M TCP and UDP traffic, To configure TCP, UDP, and ART, see the Configure NetFlow
application response time, on ISR Devices section in Cisco Prime Infrastructure User
Voice & Video Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
ISR G2 15.2(4) M2 or later, TCP and UDP traffic, To configure TCP, UDP, and ART, see the Improve
15.3(1)T or later application response time, Application Performance With Application Visibility and
Voice and Video Control chapter in the Cisco Prime Infrastructure User Guide.
Use a configuration like the following example to ensure that gets the Medianet data it needs:
• flow record type performance-monitor PerfMonRecord
• match ipv4 protocol
• match ipv4 source address
• match ipv4 destination address
• match transport source-port
• match transport destination-port
• collect application media bytes counter
• collect application media bytes rate
• collect application media packets counter
• collect application media packets rate
• collect application media event
• collect interface input
• collect counter bytes
• max-dropout 2
• max-reorder 4
• ! Enter IP-CBR monitor metric configuration mode
• monitor metric ip-cbr
• ! Rate for monitoring the metrics (1 packet per sec)
• rate layer3 packet 1
• interface interfacename
• service-policy type performance-monitor input PerfMonPolicy
• service-policy type performance-monitor output PerfMonPolicy
For more information on Medianet configuration, see the Medianet Reference Guide.
As of version 2.1, supports Flexible NetFlow versions 5 and 9. Note that you must enable NetFlow on each
physical interface for which you want to collect data. These will normally be Ethernet or WAN interfaces.
This applies to physical interfaces only. You do not need to enable NetFlow on VLANs and Tunnels, as they
are included automatically whenever you enable NetFlow on a physical interface.
Use the following commands to enable NetFlow on Cisco IOS devices:
• Device(config)# interface interfaceName
• Device(config)# ip route-cache flow where interfaceName is the name of the interface (such as fastethernet
or fastethernet0/1) on which you want to enable NetFlow.
Once NetFlow is enabled on your devices, you must configure exporters to export NetFlow data to . You can
configure an exporter using these commands:
• Device(config)# ip flow-export version 5
• Device(config)# ip flow-export destination PrInIP PiInPort
• Device(config)# ip flow-export source interfaceName where:
If you configure multiple NetFlow exporters on the same router, make sure that only one of them exports to
the server. If you have more than one exporter on the same router exporting to the same destination, you risk
data corruption.
Use the following commands to verify that NetFlow is working on a device:
• Device# show ip flow export
• Device# show ip flow export
• Device# show ip cache flow
• Device# show ip cache verbose flow
If your NAMs are deployed properly, then no other pre installation work is required. When you conduct
discovery using Cisco Prime AM, you will need to enter HTTP access credentials for each of your NAMs.
uses a more efficient REST interface to query NAMs. For this reason, it does not support the direct export of
NetFlow data from NAMs. Any device exporting NetFlow data must export that NetFlow data directly to ,
not via a NAM. Exporting NetFlow data from any NAM to will result in data duplication.
Router (config)# collect art all where application name is the name of the application whose flow data you
want to collect.To Configure teh PA flow Monitor type:
• Router (config)# flow monitor type mace mace-monitor
• Router (config)# record mace-record
• Router (config)# exporter mace-export
To configure a PA policy map and forward the PA traffic to the correct monitor:
• Router (config)# policy-map type mace mace_global
• Router (config)# class mace-traffic
• Router (config)# flow monitor mace-monitor
For more information on configuring Performance Agent, see the Cisco Performance Agent Deployment
Guide.
Install Patches
You may need to install patches to get your version of to the level at which upgrade is supported. You can
check the version and patch version you are running by using the CLI commands show version and show
application.
Different patch files are provided for each version of and its predecessor products. Download and install only
the patch files that match the version of your existing system and that are required before you upgrade to a
later version. You can find the appropriate patches by pointing your browser to the Cisco Download Software
navigator .
Before installing a patch, you will need to copy the patch file to your server’s default repository. Many users
find it easy to do this by first downloading the patch file to a local FTP server, then copying it to the repository.
You can also copy the patch file to the default repository using any of the following methods:
• cdrom—Local CD-ROM drive (read only)
• disk—Local hard disk storage
• ftp—URL using an FTP server
• http—URL using an HTTP server (read only)
• https—URL using an HTTPS server (read only)
• nfs—URL using an NFS server
• sftp—URL using an SFTP server
• tftp—URL using a TFTP server
Step 1 Download the appropriate point patch to a local resource in your environment:
a) With the Cisco Download Software navigator displayed in your browser, choose Products > Cloud and Systems
Management > Routing and Switching Management > Network Management Solutions > .
b) Select the version of that most closely matches the one you are currently using.
c) Click Prime Infrastructure Patches to see the list of available patches for that version of the product.
d) Next to each patch that is required, click Download, then follow the prompts to download the file.
Step 2 Open a command-line interface session with the server (see How to Connect Via CLI, on page 119 ).
Step 3 Copy the downloaded patch file to the default local repository. For example:
admin# copy source path/defaultRepo
Where:
• source is the downloaded patch file’s location and name.
• path is the complete path to the default local backup repository, defaultRepo (for example: /localdisk )
To ensure you have the licenses to achieve these goals, do the following:
1. Familiarize yourself with the types of license packages available to you, and their requirements.
2. View the existing licenses. See for help on ordering and downloading licenses.
3. Calculate the number of licenses you will need, based both on the package of features you want and the
number of devices you need to manage.
4. Add new licenses.
5. Delete existing licenses.
Note As Prime Infrastructure no longer supports the node-locked licensing approach, the UDI information required
to generate licenses are limited to a standard syntax as shown below:
• PID = PRIME-NCS-APL (For Physical Appliance)
PID = PRIME-NCS-VAPL (For Virtual Appliance/Virtual Machine)
• SN = ANY:ANY
You must provide the subtleties in the mentioned format to generate new licenses.
For more information, see Cisco Prime Infrastructure Ordering and Licensing Guide.
Related Topics
Verify License Details , on page 20
Add Licenses , on page 21
Delete Licenses, on page 21
Add Licenses
You need to add new licenses when:
• You have purchased a new Prime Infrastructure license.
• You are already using Prime Infrastructure and have bought additional licenses.
Step 1 Choose Administration > Licenses and Software Updates > Licenses.
Step 2 In the Summary folder, click Files, then click License Files.
Step 3 Click Add.
Step 4 Browse to the location of the license file, then click OK.
Related Topics
Delete Licenses, on page 21
Troubleshoot Licenses, on page 21
MSE License Structure Matrix, on page 25
Verify Assurance License Details, on page 30
Delete Licenses
When you delete licenses from Prime Infrastructure, all licensing information is removed from the server.
Make a copy of your original license file in case you want to add it again later. There are several reasons you
might want to delete licenses:
• You installed temporary licenses and want to delete them before applying your permanent licenses.
• You want to move your licenses to a different server. You must first delete the licenses from the original
server, then send an email to [email protected] requesting a re-host for your licenses. You can then
apply the re-hosted licenses to the new server.
Step 1 Choose Administration > Licenses and Software Updates > Licenses.
Step 2 Click Files > License Files.
Step 3 Select the license file you want to delete, then click Delete.
Related Topics
Add Licenses , on page 21
Troubleshoot Licenses, on page 21
MSE License Structure Matrix, on page 25
Verify Assurance License Details, on page 30
Troubleshoot Licenses
To troubleshoot licenses, you will need to get details about the licenses that are installed on your system. to:
• Get a quick list of the licenses you have: Click Help > About Prime Infrastructure.
• Get license details: Choose Administration > Licenses and Software Updates > Licenses.
When troubleshooting licenses, it is important to remember that Prime Infrastructure has six types of licenses:
• Base: Required for every Prime Infrastructure installation. The requirement stems primarily from the
need to do accurate royalty accounting by knowing how many Prime Infrastructure instances have been
purchased. A Base license is required for each instance of Prime Infrastructure, and is a prerequisite for
all other license types.
• Lifecycle: Regulates the total number of devices under Prime Infrastructure management. Lifecycle
license is consumed only for admin VDC in Prime Infrastructure. The child VDC does not consume any
license. It is either auto-added by admin or added separately.
• Assurance: Regulates the total number of NetFlow devices under Prime Infrastructure management.
• Collector: Regulates the total number of NetFlow data flows per second that Prime Infrastructure can
process.
Lifecycle and Assurance licenses are supplied in either evaluation or permanent form (there is no explicit
evaluation version of the Base or Collector licenses):
• Evaluation: These licenses permit or extend access to Prime Infrastructure for a pre-set period. You can
apply only one evaluation license of each type (that is, only one Lifecycle evaluation license, one Assurance
evaluation license, and so on). You cannot apply an evaluation license over a permanent form of the
same license.
• Permanent License: These permit access to Prime Infrastructure features as specified and are not
time-limited. Permanent licenses can be applied over evaluation licenses, and can also be applied
incrementally (that is, you can have multiple permanent Assurance licenses, and so on).
Prime Infrastructure also performs the following basic license checks:
• A Lifecycle license is a required prerequisite for Assurance licenses.
• An Assurance license is a required prerequisite for Collector licenses.
Also note that:
• From Release 3.0 Prime Infrastructure enables the user to set threshold limit for generating an alarm for
all licenses. To set threshold limit for licenses, see “Configuring Notifications” in Related Topics.
• Prime Infrastructure hides Assurance-related features, menu options and links until an Assurance license
is applied. Even if you have purchased an Assurance license, these features remain hidden until you
apply it.
• Whenever you apply an Assurance license, you automatically apply a Collector license permitting an
instance of Prime Infrastructure to process up to 20,000 NetFlow data flows per second. Collector licenses
permitting 80,000 flows per second can be applied only with the Professional or equivalent configurations,
due to the hard disk requirements imposed by this data rate.
• You can add Lifecycle and Assurance permanent licenses incrementally. However, you can add only
one Collector 80K license, and then only with the Professional or equivalent configuration.
The following table provides some scenarios and tips for troubleshooting.
Prime Infrastructure The license file may be corrupted and unusable. 1. Delete the existing license.
reports a Licensing This can occur anyone attempts to modify the 2. Download and install a new license.
error. license file.
Unable to add new Some types of license must be added in the correct 1. Add the Base license
licenses. order. The Base license is a prerequisite for adding 2. Add Lifecycle licenses
Lifecycle licenses. A Lifecycle license is a 3. Add Assurance licenses
prerequisite for adding an Assurance license. An 4. Add Datacenter licenses
Assurance license is a prerequisite for adding a
5. Add Collector licenses
Collector license (a Collector license is added
automatically with the Assurance license).
The state of the devices The device limit must be less than or equal to 1. Delete the additional devices.
has changed to lifecycle license limit. The state of the inventoried 2. The state of the devices will change to managed after
unmanaged. devices will change to unmanaged if you add or the 24 hours synchronization.
delete devices.
To verify that the status of the inventoried devices has
changed to “managed” after synchronization:
1. Choose Monitor > Network Devices.
2. Check the Inventory Collection Status column for
the row listing the devices in which you are
interested. This will give you a summary of current
collection status efforts for those devices.
3. For details about the collection status, hover the
mouse cursor over the cross-hair icon in the Inventory
Collection Status column.
Related Topics
Configure Notifications, on page 376
Add Licenses , on page 21
Delete Licenses, on page 21
MSE License Structure Matrix, on page 25
Verify Assurance License Details, on page 30
Controller Licensing
To view controller licenses, choose Administration > Licenses and Software Updates > Licenses, then
select Files > Controller Files from the left sidebar menu.
Note Prime Infrastructure does not directly manage controller licenses, rather it simply monitors the licenses. To
manage the licenses you can use command-line interface (CLI) commands, Web UI, or Cisco License Manager
(CLM), or Cisco Smart Software Manager (CSSM).
For every physical license installed, two license files display in the controller: a feature level license and an
ap-count license. For example if you install a “WPlus 500” license on the controller, “wplus” and
“wplus-ap-count” features are displayed. There are always two of these features active at any one time that
combine to enable the feature level (WPlus or Base) and the AP count.
You can have both a WPlus and a Base license, but only one can be active at any given time.
• AP Limit
AP Limit—The maximum capacity of access points allowed to join this controller.
• EULA status—Displays the status of the End User License Agreement and is either Accepted or Not
Accepted.
• Comments
Comments—User entered comments when the license is installed.
• Type
Type—The four different types of licenses are as follows:
• Permanent
Permanent—Licenses are node locked and have no usage period associated with them. They are
issued by Cisco licensing portal and must be installed using management interfaces on the device.
Upon installation of these licenses, you have the necessary permissions across different versions.
• Evaluation—Licenses are non-node locked and are valid only for a limited time period. They are
used only when no permanent, extension, or grace period licenses exist. Before using an evaluation
license, you must accept an End User License Agreement (EULA). Even though they are non-node
locked, their usage is recorded on the device. The number of days left displays for the evaluation
license with the fewest number of remaining active license days.
• Extension—Licenses are node locked and metered. They are issued by Cisco licensing portal and
must be installed using management interfaces on the device. Before using an extension license,
you must accept a EULA during installation.
• Grace Period—Licenses are node locked and metered. These licenses are issued by Cisco licensing
portal as part of the permission ticket to rehost a license. They are installed on the device as part of
the rehost operation, and you must accept a EULA as part of the rehost operation.
Types other than Permanent display the number of days left until the license expires. Licenses not currently
in use do not have their counts reduced until they become “In Use.”
• Status
• In Use—The license level and the license are in use.
• Inactive—The license level is being used, but this license is not being used.
• Not In Use—The license level is not being used and this license is not currently recognized.
• Expired In Use—The license is being used, but is expired and will not be used upon next reboot.
• Expired Not In Use—The license has expired and can no longer be used.
• Count Consumed—The ap-count license is In Use.
If you need to filter the list of license files, you can enter a controller name, feature, or type and click Go.
MSE Licensing
The MSE packages together multiple product features related to network topology, design such as NMSP,
Network Repository along with related Service Engines, and application processes, such as the following:
• Context-Aware Service
• Wireless Intrusion Prevention System(WIPS)
To enable smooth management of MSE and its services, various licenses are offered.
You must have a Cisco Prime Infrastructure license to use MSE and its associated services.
Related Topics
MSE License Structure Matrix, on page 25
Sample MSE License File, on page 25
Revoke and Reuse an MSE License, on page 26
MSE Services Coexistence, on page 27
Manage MSE Licenses, on page 27
MSE Platform High-end appliance and infrastructure Low-end appliance and infrastructure —
platform, such as the Cisco 3350 and 3355 platform, such as Cisco 3310 mobility
mobility services engines services engine
Context Aware 25,000 Tags 2000 Tags Validity 60 days, 100 Tags
Service and 100 Elements
25,000 Elements 2000 Elements
wIPS 3000 access points 2000 access points Validity 60 days, 20 access
points
Related Topics
Sample MSE License File, on page 25
Revoke and Reuse an MSE License, on page 26
MSE Services Coexistence, on page 27
Manage MSE Licenses, on page 27
Note Limits for individual services differ. For example, a low-end mobility services engine (MSE-3310) tracks a
total of 2,000 CAS elements; a high-end mobility services engine (MSE-3350) tracks a total of 25,000 CAS
elements.A low-end mobility services engine has a maximum limit of 2000 wIPS elements; a high-end mobility
services engine has a maximum limit of 3000 wIPS elements.
Tag licenses are installed using the AeroScout System Manager only if the tags are tracked using the Partner
engine. Otherwise the tags will be counted along with the CAS element license. Because tag licenses are
added and managed using appropriate vendor applications, tag licenses are not displayed in this page. For
more information, see the AeroScout Support Page in Related Topics. Evaluation (demo) licenses are also
not displayed.
For more information, see AeroScout Support Page.
Related Topics
Register Product Authorization Keys, on page 28
Install Client and wIPS License Files, on page 29
Delete Mobility Services Engine License Files, on page 29
Step 1 Point your browser to the Cisco Product License Registration Portal (see Related Topics).
You can also access this site by clicking the Product License Registration link located on the License Center page of
Prime Infrastructure.
Step 4 In the Designate Licensee page, enter the mobility service engine UDI in the host ID text box. This is the mobility services
engine on which the license will be installed.
UDI information for a mobility services engine is found in the General Properties area at Services > Mobility Services
Engine > Device Name > System.
Step 5 Select the Agreement check box. Registrant information appears beneath the check box.
Modify information as necessary.
Ensure that the phone number does not include any characters in the string for the registrant and end user. For example,
enter 408 555 1212 rather than 408.555.1212 or 408-555-1212.
Step 6 If registrant and end user are not the same person, select the License (End-User) check box beneath registrant information
and enter the end-user information.
Step 7 Click Continue.
Step 8 At the Finish and Submit page, review registrant and end-user data. Click Edit Details to correct information, if necessary,
then click Submit. For more information, see AeroScout Support Page and Cisco Product License Registration Portal.
Related Topics
Install Client and wIPS License Files, on page 29
Delete Mobility Services Engine License Files, on page 29
Step 1 Choose Administration > Licenses and Software Updates > Licenses.
Step 2 From the left sidebar menu, choose Files > MSE Files.
Step 3 Click Add to open the Add a License File dialog box.
Step 4 From the MSE Name drop-down list, choose the mobility services engine to which you want to add the license file.
Note Verify that the UDI of the selected mobility services engine matches the one you entered when registering the
PAK.
Step 5 Enter the license file in the License File text box or browse to the applicable license file.
Step 6 Once displayed in the License File text box, click Upload. Newly added license appears in mobility services engine
license file list.
Note • A Context Aware Service (CAS) restarts if a client or tag license is installed; a wIPS service restarts if a
wIPS license is installed.
• Services must come up before attempting to add or delete another license.
Related Topics
Delete Mobility Services Engine License Files, on page 29
Step 1 Choose Administration > Licenses and Software Updates > Licenses, then select Files > MSE Files from the left
sidebar menu.
Step 2 Select the check box of the mobility services engine license file that you want to delete.
Step 3 Click Delete, then click OK to confirm the deletion.
Related Topics
Register Product Authorization Keys, on page 28
Install Client and wIPS License Files, on page 29
Assurance Licensing
As explained in “Purchasing Prime Infrastructure Licenses” (see Related Topics), licenses for Assurance
features are based on the number of NetFlow-monitored devices and Network Analysis Module (NAM) data
collection-enabled devices you have in your network. You manage, verify, and troubleshoot Assurance licenses
much as you do with other feature licenses, as explained in “Add Licenses”, “Delete Licenses” and
“Troubleshoot Licenses”.
In addition to these functions, Prime Infrastructure also lets you choose which NetFlow and NAM devices
you want to manage using Assurance features. For example, if you have only 50 Assurance feature licenses
and more than 50 NetFlow and NAM devices, you can choose to manage only your most critical devices. If
you later purchase additional Assurance licenses, you can add license coverage for the devices previously left
unmanaged.
Related Topics
Purchase Prime Infrastructure Licenses, on page 20
Verify Assurance License Details, on page 30
Add Licenses , on page 21
Delete Licenses, on page 21
Troubleshoot Licenses, on page 21
To see Choose
The NetFlow-enabled devices in your network that are under Assurance Administration > Licenses and Software Updates
management, as a percentage of the total number of Assurance licenses you > Licenses > Summary.
have.
The total number of Assurance licenses you have and the files associated with Administration > Licenses and Software Updates
them. > Licenses > Files.
A list of the devices sending NetFlow or NAM polling data to Prime Administration > Licenses and Software Updates
Infrastructure. > Licenses > Assurance Licenses (link is in upper
right corner of the page)
The number of Assurance Licenses in use.
By default, the total count of Assurance licenses on the Assurance Licenses page and on the Summary and
Files > License Files pages is always updated whenever you add or delete Assurance licenses. Addition or
removal of devices covered under these added or deleted Assurance licenses takes place as part of a System
Defined Job, which runs automatically once every 12 hours. It can take up to 12 hours for the added or deleted
devices to appear.
You can always access the Administration > Licenses and Software Updates > Licenses > Assurance
Licenses page from the Assurance Licenses link in the upper right corner of the Administration > Licenses
and Software Updates > Licenses > Summary and Administration > Licenses and Software Updates >
Licenses > Files pages.
Related Topics
Install Client and wIPS License Files, on page 29
Delete Mobility Services Engine License Files, on page 29
Step 1 Choose Administration > Licenses and Software Updates > Licenses > Assurance Licenses (the Assurance Licenses
link is in the upper right corner of the page).
Step 2 Above the list of devices currently under Assurance management, click Add Device.
Step 3 Select the check box next to each device you want to put under Assurance management, then click Add License. Prime
Infrastructure adds the devices immediately.
Step 4 When you are finished, click Cancel.
Related Topics
Delete License Coverage for NetFlow and NAM Devices, on page 31
Step 1 Choose Administration > Licenses and Software Updates > Licenses > Assurance Licenses (the Assurance Licenses
link is in the upper right corner of the page).
Prime Infrastructure displays the list of devices currently under Assurance management. It also displays the total number
of Assurance licenses you have, and the total number of devices under Assurance management.
Step 2 Select the check box next to each device you want to remove from Assurance management, then click Remove Device.
Related Topics
Add License Coverage For NetFlow and NAM Devices , on page 31
Smart Licensing
Smart Licensing feature provides a standardized licensing platform that simplifies user experience.When
Smart Licensing is first enabled, Prime Infrastructure is in Evaluation mode until you register Prime
Infrastructure with the Smart Software Manager (which resides on a centralized Cisco web site).
If you are currently using traditional licensing, Cisco recommends that you convert to Smart Licensing. For
information on the differences between the two types of licensing, refer to the Cisco Smart Licensing Overview
on Cisco.com .
The purpose of the smart licensing feature is to reduce license-related complexity by enabling users to:
• Purchase additional licenses and automatically update the information.
• Monitor current purchases and entitlements (duration and number of units).
• Monitor current usage information and trending information.
• Easily track if adequate licenses are purchased.
• Save time with the ability to transfer licenses across the company.
Note From Cisco Prime Infrastructure Release 3.5, Smart Licensing is supported for Operation Center.
Step See:
1. Create a Smart Account with Cisco Systems. Go to: Smart Account Request and follow the
instructions on the web site
2. Set up communication between Prime Infrastructure and Setting Up the Transport Mode Between Prime
the Cisco Smart Software Manager (CSSM) on Infrastructure and Cisco Smart Software
Cisco.com. Manager
3. Enable Smart Licensing in Prime Infrastructure (you Enabling Smart License on Prime Infrastructure
will have to restart the web GUI).
4. Register Prime Infrastructure with the CSSM on Registering Prime Infrastructure with the Cisco
Cisco.com, then enter the license tokens into the Prime Smart Software Manager
Infrastructure web GUI (you will have to restart the web
GUI).
5. Choose the licenses you want to use in Prime Choosing Smart Software Licenses
Infrastructure.
6. Set up the Smart License Dashboard to signal when you Configuring License Thresholds for the Prime
are running out of licenses. Infrastructure License Dashboard
Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart
Software Manager
Step 1 Choose Administration > Settings > System Settings > General > Account Credentials and select Smart Licensing
Transport tab.
Alternatively, you can click the link mentioned in the Smart Software Licensing page to direct you to the Smart
Licensing Transport tab to set up transport settings.
Step 3 Click Test Connectivity to test the connection status. Click Save to update the smart licensing transport mode.
Step 4 Proceed to Enabling Smart License on Prime Infrastructure .
Related Topics
Smart Licensing, on page 32
Step 1 Choose Administration > Licenses and Software Updates > Smart Software Licensing.
Step 2 In the Licensing Settings tab, select Smart Software Licensing.
Step 3 Choose Prime Infrastructure from the Product Name drop-down list.
Step 4 Click Enable Smart Software Licensing. Prime Infrastructure displays a dialog box informing you that you must log
out of Prime Infrastructure and log back in, before you can proceed to the configuration step.
Step 5 Click OK in the dialog box.
Once the smart license is enabled and before it is registered, the product will be in Evaluation Mode for 90 days and
you can manage any number of devices.
Note If you prefer traditional licenses, then in the Licensing Settings tab, select Traditional Licensing as the
Licensing Mode and click Register. The Administration > Licenses and Software Updates > Licenses page
is displayed.
Related Topics
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart Software Manager, on page
33
Perform Additional Actions, on page 38
View the Licensing Dashboard, on page 37
Disable Smart Licensing, on page 38
Reference: Product Registration and License Authorization Statuses, on page 39
Note Refer to the Cisco Smart Software Manager User Guide for information on other actions you can perform
from the CSSM—for example, renewing license registration and license authorization, unregistering the
product from Cisco Smart Licensing, and so forth.
Related Topics
Generate Token ID, on page 35
Register Product Instance, on page 36
Generate Token ID
If this is a new installation (you are not converting from traditional licensing), follow these steps:
Step 6 Copy the Token ID to your clipboard and proceed to Registering Product Instance.
Step 1 Choose Administration > Licenses and Software Updates > Smart Software Licensing.
Step 2 Under the Licensing Settings tab, paste your token into the Registration Token field.
Step 3 Click Register.
Step 4 Log out of Prime Infrastructure, then log back in.
Step 5 Proceed to Choosing Smart Software Licenses.
Related Topics
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Choose Smart Software Licenses, on page 36
Smart Licensing, on page 32
Enable Smart License on Prime Infrastructure, on page 34
Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart Software Manager, on page
33
Perform Additional Actions, on page 38
View the Licensing Dashboard, on page 37
Reference: Product Registration and License Authorization Statuses, on page 39
Step 1 If this is the first time you are choosing Smart licenses:
a) Choose Administration > Licenses and Software Updates > Licenses.
After a few moments, Prime Infrastructure displays a dialog box informing you that you cannot access the page
because you are not using traditional licensing. This is normal.
b) In the dialog box, click Smart License Settings.
c) Click the Licensing Settings tab.
Step 2 If you are already using Smart Licensing:
a) Choose Administration > Licenses and Software Updates > Smart Software Licensing.
b) Click the Licensing Settings tab.
Step 3 Click Smart Software Licensing radio button.
Step 4 Select the licenses in the Available Licenses dialog box, then click Save.
Step 5 Proceed to Configuring License Thresholds for the Prime Infrastructure License Dashboard.
Step 1 Choose Administration > Licenses and Software Updates > Smart Software Licensing, then click the License
Dashboard Settings tab.
Step 2 Select a license from the License Type drop-down list.
Step 3 Enter a value in the Threshold Value field.
Step 4 Click Save.
The threshold value is displayed as a straight line in the graphical representation of the License Summary and the Device
Distribution for License dashlets.
Related Topics
View the Licensing Dashboard, on page 37
Choose Smart Software Licenses, on page 36
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Enable Smart License on Prime Infrastructure, on page 34
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Disable Smart Licensing, on page 38
Reference: Product Registration and License Authorization Statuses, on page 39
The information displayed in the dashboard depends on the licensing mode that is enabled. If smart software
licensing is currently enabled, the following dashlets are displayed:
• License Summary dashlet—Displays a bar chart that graphs the number of licenses consumed for each
license type during a particular time period. To view additional information, place your cursor over the
chart.
• Device Distribution for License dashlet—To view the device distribution chart for a particular license,
click its link from the top of the chart displayed in the License Summary dashlet. To view additional
information, place your cursor over the chart.
Note The information displayed in the License Dashboard is refreshed daily after the SmartLicense job runs at
02:00 A.M. (its pre-configured run time). To view this job in the Job Dashboard, choose Administration >
Dashboards > Job Dashboard.
Related Topics
Configure License Thresholds for the Prime Infrastructure License Dashboard, on page 37
Enable Smart License on Prime Infrastructure, on page 34
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Perform Additional Actions, on page 38
Registered Prime Infrastructure is registered with the CSSM. Prime Infrastructure has
received an ID certificate that will be used for future communication with the
Cisco licensing authority.
Registration Expired Prime Infrastructure did not successfully renew its registration prior to the
expiration date and has been removed from CSSM.
Evaluation Mode Prime Infrastructure is running in evaluation mode until the evaluation period
expires (90 days).
Authorized Prime Infrastructure has a valid Smart Account and is registered. All licenses
requested by the product are authorized for use.
Out of Compliance Prime Infrastructure has exceeded the number of licenses that were
purchased.The Virtual account containing the product instance has a shortage
of one or more of license types used.
Evaluation Expired The Evaluation period has expired and Prime Infrastructure will be in
unlicensed state.
Authorization Expired Prime Infrastructure did not successfully renew its license authorization prior
to the authorization expiration date.
Related Topics
Smart Licensing, on page 32
Enable Smart License on Prime Infrastructure, on page 34
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Perform Additional Actions, on page 38
The update notifications that displays depend on the Notification Settings specified by your administrator.
See Enable or Disable Notifications About Software Updates, on page 41 . All software updates are packaged
in .ubf files. A large update can contain individual smaller updates, from which you can choose what you
want to install. When you install an update, does the following:
• Verifies that the file publisher is Cisco Systems and the file has not been tampered with.
• Automatically installs any other updates that are required.
If you have connectivity to http://www.cisco.com , you can download and install the updates directly from
Cisco.com. If you do not have internet connectivity, copy the update from a server that has the necessary
connectivity and install it from there.
Step 1 Configure the default Cisco.com credentials so that can get information about available updates.
a) Choose Administration > Settings > System Settings, then choose General > Account Settings.
b) Click the Cisco.com Credentials tab, enter the credentials, then click Save.
Step 2 Configure your software update notification settings.
a) Choose Administration > Settings > System Settings, then choose General > Software Update.
b) Under Notification Settings, select or deselect the update categories. To disable all notifications, make sure no
categories are selected. For an explanation of the categories, see What Are Software Updates?, on page 40
c) Click Save.
You do not have to manually validate UBF packages that are downloaded using the Software Update feature.
This is because automatically validates the .ubf files during the Software Update installation process. If a file
is not signed, generates an error message and will not install the .ubf file. If this occurs, contact your Cisco
representative.
You do need to manually validate ISO and OVA images. Use the following procedure to validate them before
installation.
Step 1 If you do not have openssl installed, download and install it (see http://www.openssl.org).
Step 2 Place the following files in a temporary directory:
• The product file to be verified (*.iso or *.ova).
• The signature file (*.signature) that is packaged with the product file.
• The certificate file (*.pem). The same certificate is used to verify OVA and ISO images.
Step 3 Move to the temporary directory and run the following command as the Linux CLI root user (see Log In and Out as the
Linux CLI root User, on page 163):
openssl dgst -sha512 -verify cert-file -signature sig-file content-file
Where:
• cert-file is the certificate file
• sig-file is the signature file
• content-file is the ISO file or OVA image to be verified
Step 5 (OVA package only) Verify that Cisco Systems is the publisher.
a) In the VMware vSphere client, choose File > Deploy OVF Template.
b) Browse to the OVA file (*.ova), select it, and click Next.
c) Verify that the Publisher field in the OVF Template Details window displays Cisco Systems, Inc. with a green
check mark next to it. Proceed to the next step.
Note Do not validate the image using the Vendor field. This field does not authenticate Cisco Systems as the publisher.
Note Do not proceed if the Publisher field displays No certificate present. This indicates the image is not signed,
is not from Cisco Systems, or has been tampered with.
Step 1 Back up your data. See Perform a Manual Backup, on page 57.
Step 2 Download the file to your local machine, then upload it from your local machine to the server.
a) Log into cisco.com and go to the Software Download site.
b) Locate the .ubf file you want to download, and download it to your local machine.
Step 3 Copy the file from your local machine to the server as described in Copy a File from a Client Machine to the Server, on
page 43.
Step 4 Log in to the web GUI as a user with Administrator privileges.
Step 5 Upload the file to the server.
a) Choose Administration > Licenses and Software Updates > Software Update.
b) Click Upload at the top of the page.
c) Click Browse, navigate to the file, and click OK. After the successful upload, the software will appear under the
Files tab.
Step 6 Select the software update, click Install, and then click Yes in the confirmation pop-up window.
Note If the .ubf file is not signed or has been modified since it was downloaded from Cisco.com, will abort the
installation. Contact your Cisco representative.
will auto-restart and the web GUI will not be accessible for some time. (If it does not, restart it by following the procedure
in Stop and Restart , on page 92.)
Step 7 When the web GUI is accessible, log in and check the version on the Software Update page.
a) Choose Administration > Licenses and Software Updates > Software Update.
b) Verify the information under the Updates tab.
What to do next
Instruct all users to clear their browser cache before opening the web GUI.
Where:
• clientUsername is your username on the client machine
• clientIP is the IP address of the client machine where the file resides
• fullpath-to-file is the full pathname of the file on the client machine
For example:
scp [email protected]:/temp/myfile.tar.gz /localdisk/defaultRepo
Note For details on what is considered application data and what is considered platform data, see Information That
Is Backed Up, on page 48.
Backup Scheduling
performs automatic scheduled application backups. This feature is enabled by default and creates one application
backup file every day in the default local backup repository.
You can change this schedule as needed. You can also take an automatic application backup at any time from
the web GUI. Appliance backups can only be taken from the command line.
Automatic application backups can create storage space problems if the backup repository is local to the
server. While this is usually acceptable in test implementations, it is not intended to substitute for routine
scheduled backups to remote servers in a production environment.
We recommend the following for production environments:
• Set up remote repositories to store the backup files.
• Use the automatic schedule application backup to create backups on the remote repositories on a regular
schedule.
Even if you are using scheduled backups, you can still use the command line to create application or appliance
backups at any time.
Note By default, two minutes are added to the job execution time for job creation.
Backup Repositories
By default, automatic application backup feature stores backup files in the local backup repository
/localdisk/defaultRepo. You can use the web GUI to create a new local backup repository and then choose
it when you set up automatic application backups. You can also specify a remote repository but you must
create the repository first as described in Set Up and Manage Repositories, on page 50.
When taking application or appliance backups using the command line, you must specify the local or remote
repository you want the backup to be stored in. In a production environment, this is normally a remote repository
that is accessed via NFS, SFTP, or FTP. We recommend you use NFS because it is typically much faster and
more reliable than other protocols.
There is no difference between performing an application backup from the command line or performing it
from the web GUI. Both actions create the same backup file.
Whenever you use NFS to take backups or restore data from a remote backup, make sure the mounted NFS
server remains active throughout the backup or restore operation. If the NFS server shuts down at any point
in the process, the backup or restore operation will hang without warning or an error message.
Backup Filenames
Application backups launched from the web GUI—either automatically or manually—are assigned a
filename with the following format:
host-yymmdd-hhmm_VERver_BKSZsize_CPUcpus_MEMtarget_RAMram_SWAPswap_APP_CKchecksum.tar.gpg
Application backups launched from the CLI use the same format, except that the file starts with the
user-specified filename rather than the server name.
filename-yymmdd-hhmm_VERver_BKSZsize_CPUcpus_MEMtarget_RAMram_SWAPswap_APP_CKchecksum.tar.gpg
Appliance backups launched from the CLI have files that also start with the user-specified filename, but
the type is indicated as SYS, not APP.
filename-yymmdd-hhmm_VERver_BKSZsize_CPUcpus_MEMtarget_RAMram_SWAPswap_SYS_CKchecksum.tar.gpg
The following table describes the variables used by the backup files.
Variable Description
host Host name of the server from which the backup was taken (for application backups
launched from web GUI).
filename Filename specified by user in command line (for application backups launched from CLI,
and for appliance backups)
yymmdd-hhmm Date and time the backup was taken
cpus Total number of CPUs in the server from which the backup was taken
target Total amount of system memory in the server from which the backup was taken
ram Total amount of RAM in the server from which the backup was taken
swap Total size of the swap disk on the server from which the backup was taken
If you manually transfer the backup file, or if you want to verify that the backup file transfer is completed,
view the file's md5CheckSum and file size.
Another best practice for validating a backup is to restore it to a standalone "test" installation of .
Note The /opt/CSCOlumos/conf/Migration.xml file contains all configuration files and reports that are backed up.
This file is included in the backup and is restored.
Platform CLI settings All CLI information and settings are preserved. This includes the list of
Data backup repositories, the FTP user name, users created using the CLI,
AAA information specified via the CLI, and other CLI settings (such as
the terminal timeout).
See the following topics for information on how to set up and manage these different types of repositories.
d. If it is an FTP repository, check the FTP check box and enter the location and credentials.
e. Click Submit. The new repository is added to the Backup Repository drop-down list in the Edit Job Properties dialog
box.
As with any resource that you plan to access remotely, specifying the correct server IP address and login
credentials during setup are a requirement for successful use of remote backup repositories with .
You can create backup repositories on a remote NFS server and configure the Prime Infrastructure server to
use them. The NFS server hosting your backups can be set up anywhere in your network, as long as the server:
For the NFS server details to appear in the Backup Repository drop down list in UI, you should configure the
NFS server using CLI. You can configure the NFS server only using CLI.
SUMMARY STEPS
1. Open a CLI session with the Prime Infrastructure server. (see How to Connect Via CLI, on page 119).
2. Enter configuration mode:
3. Configure a symbolic link to the remote NFS server:
4. Verify creation of the symbolic link:
5. When taking backups at the command line, specify the new repository as the repository name in the backup
command. For example:
DETAILED STEPS
Step 1 Open a CLI session with the Prime Infrastructure server. (see How to Connect Via CLI, on page 119).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
To specify a relative path to the shared folder, use only one slash in the URL. For example:
nfs://RemoteServerIP/sharedfolder
• Stagingfolder is the name of the staging backup folder on the NFS server, where the initial data will be transferred
temporarily to tar the file later.
• Sharedfolder is the name of the shared backup folder on the NFS server, where the backups will be stored
• UserName is the name of a user with write privileges to the repository on the NFS server.
• UserPassword is the corresponding password for that user.
Step 5 When taking backups at the command line, specify the new repository as the repository name in the backup command.
For example:
PIServer/admin# backup MyBackupFileName repository MyRepo application NCS
If you want to perform backups automatically, select the repository name you created as the repository name in the Prime
Infrastructure web interface.
Other than these requirements, no other configuration is needed on the SFTP backup server.
We recommend using remote NFS repositories.
For the SFTP server details to appear in the Backup Repository drop down list in UI, you should configure
the SFTP server using CLI. You can configure the SFTP server only using CLI.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 119).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
Step 5 When taking backups at the command line, specify the new repository as the repository name in the backup command.
For example:
PIServer/admin# backup MyBackupFileName repository MyRepo application NCS
If you want to perform backups automatically, select the repository name you created as the repository name in the Prime
Infrastructure web interface.
Related Topics
Use Remote NFS Backup Repositories, on page 51
Perform an Immediate Application Backup Using the CLI, on page 58
Perform an Immediate Appliance Backup Using the CLI, on page 57
Specify the Backup Repository for Automatic Backups, on page 56
Other than these requirements, no other configuration is needed on the FTP backup server.
We recommend using remote NFS repositories.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 119).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
• RemoteServerIP is the IP address of the FTP server hosting the shared backup folder.
• sharedfolder is the name of the shared backup folder on the FTP server.
• userName is the name of a user with write privileges to the repository on the FTP server.
• userPassword is the corresponding password for that user. This password must be 15 characters or less.
Step 5 When taking backups at the command line, specify the new FTP repository as the repository name in the backup command.
For example:
PIServer/admin# backup MyBackupFileName repository MyRepo application NCS
If you want to perform backups automatically, select the repository name you created as the repository name in the Prime
Infrastructure web interface.
Related Topics
Use Remote NFS Backup Repositories, on page 51
Perform an Immediate Application Backup Using the CLI, on page 58
Perform an Immediate Appliance Backup Using the CLI, on page 57
Specify the Backup Repository for Automatic Backups, on page 56
Step 1 Log into the server as a CLI admin user (see Establish an SSH Session With the Server, on page 88).
Step 2 List the local application backup repositories and identify the one that you want to delete:
show running-config | begin repository
Note After an automatic application backup fails, a pop-up message is displayed before every subsequent login
attempt. This message will continue to appear until you acknowledge the corresponding alarm.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 119).
Step 2 Display the list of appliance backups:
PIServer/(admin)#show repository repositoryName
where repositoryName is the repository on which you want to store the appliance backup.
where filename is the name that you want to give the appliance backup file (for example, myBackup).The character length
of the file name is 26. Other information is appended to the filename automatically, as explained in Backup Filenames,
on page 47
Step 1 Log into the server as a CLI admin user (see Establish an SSH Session With the Server, on page 88).
Step 2 Display the list of backups, where repositoryName is the backup repository:
show repository repositoryName
where, filename is the name that you want to give the application backup file (for example, myBackup). The character
length of the file name is 26. Other information is appended to the filename automatically, as explained in Backup
Filenames, on page 47.
Step 4 To verify that the backup transfer is complete, view the md5CheckSum and file size.
Restore Data
All restore operations are performed using the CLI. Data can be restored to the host where the backup is
executed (local host), or to a remote host. Backups can only be restored in their entirety; you cannot restore
only parts of a backup.
For more information, see the following topics.
• Restore an Application Backup, on page 59
Note To restore an appliance backup, use the procedure in Restore an Appliance Backup, on page 59.
Step 1 Log into the server as a CLI admin user (see Establish an SSH Session With the Server, on page 88).
Step 2 If a previous restoration attempt failed, the database may have been corrupted. Run this command to recreate the database:
ncs run reset db
Step 3 List the saved application backups and identify the one that you want to restore. repositoryName is the repository that
contains the backup files.
show repository repositoryName
Step 4 From the vmWare vSphere client (OVA) or the Cisco IMC server (Bare Metal), restore the data:
restore backupFileName repository repositoryName application NCS
Step 5 If you are using Cisco Smart Licensing, re-register with the Cisco Smart Software Manager (CSSM) on Cisco.com. See
.
Note To restore an application backup, use the procedure in Restore an Application Backup, on page 59.
Step 1 Log into the server as a CLI admin user (see Establish an SSH Session With the Server, on page 88).
Step 2 If a previous restoration attempt failed, the database may have been corrupted. With the backup stored in an external
repository, reinstall the setup using the same release and then retry the restore.
Step 3 List the saved appliance backups and identify the one that you want to restore. repositoryName is the repository that
contains the backup files.
show repository repositoryName
Step 4 From the vmWare vSphere client (OVA) or the Cisco IMC server (Bare Metal), restore the data:
Step 5 Determine whether you should change the IP address, subnet mask, and default gateway.
a) Check if your installation meets the following criteria:
• The restored host is on the same subnet as the old host, and the old host is still active.
• The restored host is on a different subnet from the old host.
If it does, perform the next step.
b) Change the IP address, subnet mask, default gateway and (optionally) the host name on the restored server.
c) Write the changes to the server’s running configuration and restart services. For example:
configure terminal
(config)# int GigabitEthernet 0
(config-GigabitEthernet)# ip address IPAddress subnetMask
(config-GigabitEthernet)# exit
(config)# ip default-gateway gatewayIP
(config)# hostname hostname
(config)# exit
(admin)# write mem
(admin)# ncs stop
(admin)# ncs start
(admin)# exit
Step 6 If you are using Cisco Smart Licensing, re-register with the Cisco Smart Software Manager (CSSM) on Cisco.com. See
.
Step 1 Open a CLI session with the server (see Establish an SSH Session With the Server, on page 88).
Step 2 Enter the following command to reset the corrupted database:
ncs run reset db
• Use the method explained in Migrate to Another Virtual Appliance Using Backup and Restore, on page
61 (or Migrate to Another Physical Appliance Using Backup and Restore, on page 62) to move your
installation to a server with adequate disk space.
If you are unable to create a backup after a restore of your existing system, follow the steps explained in
Compact the Prime Infrastructure Database to free disk space and create a successful backup.
If you are still unable to create a backup after using the ncs cleanup command, set up and use a remote
repository (using FTP, SFTP, or NFS) for your backups, as explained in Use a Remote Backup Repository.
Related Topics
Modify VM Resource Allocation Using VMware vSphere Client, on page 109
Migrate to Another Physical Appliance Using Backup and Restore, on page 62
Migrate to Another Virtual Appliance Using Backup and Restore, on page 61
Compact the Prime Infrastructure Database, on page 110
Use a Remote Backup Repository, on page 51
How to Manage Disk Space Issues, on page 136
In both cases, it is relatively easy to migrate your old data to the new virtual appliance by restoring to the new
host an appliance or application backup taken from the old host.
Step 1 If you have not already done so, set up a remote backup repository for the old host, as explained in Use a Remote Backup
Repository, on page 51.
Step 2 Perform an application backup of the old host and save it to the remote repository (see Perform an Immediate Application
Backup Using the CLI, on page 58).
Step 3 Install the new host .
Step 4 Configure the new host to use the same remote backup repository as the old host (see Use a Remote Backup Repository,
on page 51).
Step 5 Restore the application backup on the remote repository to the new host (see Restore an Application Backup, on page
59).
Related Topics
Use a Remote Backup Repository, on page 51
Perform an Immediate Application Backup Using the CLI, on page 58
Perform an Immediate Appliance Backup Using the CLI, on page 57
Restore an Appliance Backup, on page 59
Restore an Application Backup, on page 59
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Configure the General > Account Credentials > Support Request Wired
settings for and
See Set Up Defaults for Cisco Support Requests.
creating a wireless
technical support devices
request.
Configure General > Account Credentials > Smart Licensing Transport Prime
transport gateway Infrastructure
See Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart Software Manager.
mode to send appliance
information over
the internet via
Smart Call Home
Transport
Gateway, while
smart licensing is
enabled.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Enable Change Mail and Notification > Change Audit Notification Wired
Audit JMS and
See Enable Change Audit Notifications and Configure Syslog Receivers, on page 244.
Notification by wireless
selecting the devices
Enable Change
Audit JMS
Notification
check box.
To send job Mail and Notification > Job Notification Mail Wired
notification mail and
See Configure Job Notification Mail for User Jobs
for every user job wireless
devices
Enable email Mail and Notification > Mail Server Configuration Prime
distribution of Infrastructure
See Configure Email Server Settings , on page 377.
reports and alarm appliance
notifications.
Enable Unified Network and Device > Unified AP Ping Reachability Wireless
AP ping devices
capability setting only
on the Cisco
Prime
Infrastructure.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Modify the Network and Device > Plug & Play Wired
settings for Plug devices
and Play. only
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Configure rogue Network and Device > Switch Port Trace (SPT) > Auto SPT Wireless
AP settings to devices
See Configure SNMP Credentials for Rogue AP Tracing, on page 263.
enable Prime only
Infrastructure to
automatically
track the switch
port to which the
rogue access point
is connected in
the network.
Set the SNMP Network and Device > Switch Port Trace (SPT) > Manual SPT Wireless
credentials and devices
See Configure SNMP Credentials for Rogue AP Tracing, on page 263.
trace parameters only
to be used in
tracing rogue AP
switch ports.
Set basic and Network and Device > Switch Port Trace (SPT) > SPT Configuration Wired
advanced switch devices
See Configure Switch Port Tracing, on page 260.
port trace only
parameters.
View, add, or Network and Device> Switch Port Trace (SPT) > Known Ethernet MAC Address Prime
delete the Infrastructure
Ethernet MAC appliance
address available
in Prime
Infrastructure. if
you add multiple
Ethernet MAC
addresses to this
list, then Auto
Switch Port
Tracing will not
scan these ports
for Rogue AP.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Set the severity Alarms and Events > Alarm Severity and Auto Clear Wired
level of any and
See Change Severity Levels, on page 235.
generated alarm. wireless
devices
Configure SNMP Alarms and Events > System Event Configuration Prime
traps and events Infrastructure
See Internal SNMP Trap Generation, on page 363.
generated for the appliance
Prime
Infrastructure
hardware
appliance.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
• Enable
automatic
troubleshooting
of clients on
the
diagnostic
channel.
• Enable
lookup of
client
hostnames
from DNS
servers and
set how long
to cache
them.
• Set how long
to retain
disassociated
clients and
their session
data.
• Poll Wired
clients to
identify their
sessions only
when a trap
or syslog is
received.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
information
from
enhanced
trap received
from the
compatible
Cisco
WLCs.
You must
configure the
WLCs to send the
traps using the
following CLI
commands:
• config
trapflags
client
enhanced-802.11-associate
• config
trapflags
client
enhanced-8021.1-deauthenticate
• config
trapflags
client
enhanced-802.11-stats
• config
trapflags
client
enhanced-authentication
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
• Enable
discover
wired clients
on trunk
ports to
discover the
unmanaged
entity other
than switch
and router,
which is
connected to
trunk ports.
• Disable
saving of
client
association
and
disassociation
traps and
syslogs as
events.
• Enable
saving of
client
authentication
failure traps
as events,
and how
long
between
failure traps
to save them.
Add a vendor Client and User > User Defined OUI Wired
Organizationally and
See Add a New Vendor OUI Mapping.
Unique Identifier wireless
(OUI) mapping devices
XML file.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To secure communication between the web server and web client, use the public key cryptography services
that are built in as part of the HTTPS mechanism. For that you need to generate a public key for the web
server, store it on the server, and then share it with the web client. This can be done using the standard PKI
certificate mechanism which not only shares the web server public key with the web client, but also guarantees
that the public key belongs to the web server (URL) you are accessing. This prevents any third party from
posing as the web server and collecting sensitive information that the web client is sending to the web server.
These topics provide additional steps you can take to secure the web server:
• Cisco recommends that the web server authenticate web clients using certificate-based authentication.
• To secure connectivity between a CLI client and the CLI interface, refer to the security hardening
procedures in .
• To secure connectivity between the and systems such as AAA and external storage, refer to the
recommendations in .
entity (such as a server or device) identified in the certificate. You can obtain CA certificates from a
third-party CA and apply them to the Prime Infrastructure server as explained in related topic “Import
CA-Signed Host Certificates”.
Note A private key and self-signed certificate with default parameters is generated at the timeof installation.
Related Topics
Generate and Apply Self-Signed Certificates, on page 80
Import CA-Signed Host Certificates, on page 80
Import Private Key, on page 83
Export Private Key, on page 83
Step 1 Start a CLI session with Prime Infrastructure (see How to Connect Via CLI, on page 119). Do not enter “configure terminal”
mode.
Step 2 Enter the following command to generate a new RSA key and self-signed certificate with domain information:
PIServer/admin# ncs key genkey –newdn
You will be prompted for the Distinguished Name (DN) fields for the certificate. It is important to specify the fully
qualified domain name (FQDN) of the server as the domain name that will be used to access Prime Infrastructure.
Step 3 To make the certificate valid, restart Prime Infrastructure (see Restart Prime Infrastructure Using CLI, on page 121).
To avoid login complaints, instruct users to add the self-signed certificate to their browsers’ trust stores when they next
access the Prime Infrastructure login page.
Note High Availability Virtual IP is designed to simplify the server management. signed server certificate
configuration does not work with the Prime Infrastructure HA Virtual IP deployment.
Step 1 Start a CLI session with Prime Infrastructure using "admin" credentials and check the existing trusted certificates (see
“How to Connect Via CLI”). Do not enter “configure terminal” mode.
PIServer/admin# ncs key listcacerts
where listcacerts is the command to list the existing trusted certificates.
Step 2 Go to the PI server location "/opt/CSCOncs/migrate/restore" and check the imported certificates using "root" CLI
credentials.
Step 3 If certificates are found, delete the certificates through "admin" CLI credentials (see “Delete CA-Signed Certificates”).
If no certificates are found, go to . Step 4 .
PIServer/admin# pi/admin# ncs key deletecacert <certificate name>
Restart Prime Infrastructure server after deleting the certificates.
Step 4 Enter the following command to generate a CSR file in the default backup repository:
PIServer/admin# ncs key genkey -newdn -csr <csrfilename> repository <repositoryname>
where -newdn— Generates a new RSA key and self-signed certificate with domain information.
-csr—Generates a new CSR certificate.
Csrfilename—CSR filename. It is an arbitrary name of your choice (for example: MyCertificate.csr ).
repositoryname— file location. The file name can contain up to 80 alphanumeric characters.
Example:
PIServer/admin# ncs key genkey -newdn -csr CSRFile.csr repository <repositoryname>
The NCS server is running. Changes will take effect on the next server restart
Enter the fully qualified domain name of the server: <FQDN>
Enter the name of your organizational unit: <organization>
Enter the name of your organization: <organization>
Enter the name of your city or locality: <city>
Enter the name of your state or province: <state>
Enter the two letter code for your country: <country code>
Specify subject alternate names.
If none specified, CN will be used.
Use comma seperated list - DNS:<name>,IP:<address>
DNS:<FQDN>,IP:<IPADDRESS>
Specify the public key algorithm [rsa/ec] : rsa
Specify the RSA key size [2048/4096/8192] : 4096
Specify the signature algorithm [sha256/sha512] : sha256
Key and CSR/Certificate will be generated with following details
Subject : /C=US/ST=CA/L=SJ/O=Cisco Systems/OU=Prime Infra/CN=DNS:<FQDN>
Step 5 Send the CSR file to a Certificate Authority (CA) of your choice.
The CA will respond by sending you an signed server certificate and one or more CA certificate files. The CA response
will indicate which of the files is:
• The signed server certificate. This is typically given a filename that reflects the host name of the server to which
you will apply it.
• The CA certificates , which are typically given filenames that reflect the name of the CA.
Combine all the certificates in to one single file by concatenating them. Host certificate should be the first one in
the file followed by the CA certificates in the same order as in the chain.
For example, in linux the following command can be used to combine files:
cat host.pem subca.pem rootca.pem > servercert.pem
Note Certificates should be in PEM format
Step 6 Enter the following command to import the signed server certificate file into the Prime Infrastructure server:
PIServer/admin# ncs key importcacert tomcat <certificate_name> repository <repositoryname>
Step 7 Enter the following command to import the Signed certificate file into the Prime Infrastructure server:
PIServer/admin# ncs key importsignedcert <certificate_name> repository <repositoryname>
Step 8 To activate the CA-signed certificates, restart Prime Infrastructure (see “Restarting Prime Infrastructure”).
If the CA who signed the certificate is not already a trusted CA in your organization: Instruct users to add the CA-signed
certificate to their browsers’ trust stores when they next access the Prime Infrastructure login page.
Note If you want to import CA certiifcate to have secure connection between PI and External devices/server use
below command:
PIServer/admin# ncs key importcacert truststore {system | devicemgmt}alias <alias_name>
<CA_certifcate_name> repository <repository_name>
For more information, see How to Connect Via CLI, on page 119 and Restart Prime Infrastructure Using CLI, on page
121.
Certificate Validation: Details about the validation used when importing or exporting certificates can be
selected here.
Field Name and Object ID Data Type Prime Infrastructure Event/Alert Description
field
Field Name and Object ID Data Type Prime Infrastructure Event/Alert Description
field
cWNotificationSubCategory OCTET STRING Type field in alert and This object represents the
eventType in event. subcategory of the alert.
Field Name and Object ID Data Type Prime Infrastructure Event/Alert Description
field
cWNotificationSourceDisplayName OCTET STRING sourceDisplayName field in This object represents the display
alert/event. name of the source of the
notification.
cWNotificationSpecialAttributes OCTET STRING All the attributes in This object represents the
alerts/events apart from the base specialized attributes in alerts
alert/event class. like APAssociated,
APDisassociated, RogueAPAlert,
CoverageHoleAlert, and so on.
The string is formatted in
property=value pairs in CSV
format.
Field Name and Object ID Data Type Prime Infrastructure Event/Alert Description
field
Step 1 Start your SSH session and log in as the admin user.
• From the command line, enter the following, where server-ip is the :
ssh admin server-ip
Step 2 Enter the admin password. The prompt will change to the following:
(admin)
To view a list of the operations the admin user can perform, enter ? at the prompt.
To enter admin config mode, enter the following command (note the change in the prompt):
(admin) configure terminal
(config)
Note cannot be configured as an NTP server; it acts as an NTP client only. Up to three NTP servers are allowed.
Step 1 Log in to the server as the admin user and enter config mode. See Establish an SSH Session With the Server, on page
88.
Step 2 Set up the NTP server using one of the following commands.
For an unauthenticated NTP server setup:
ntp server ntp-server-IP
Where:
• ntp-server-IP is the IP address or hostname of the server providing the clock synchronization to the server
• ntp-key-id is the md5 key ID md5 key of the authenticated NTP server
• ntp-type can be plain or hash
• password is the corresponding plain-text md5 password for the NTPv4 server
Step 1 Choose Administration > Settings > System Settings, then choose General > Account Settings.
Step 2 Click the Proxy tab.
Step 3 Select the Enable Proxy check box and enter the required information about the server that has connectivity to Cisco.com
and will act as the proxy.
Step 4 Select the Authentication Proxy check box and enter the proxy server’s user name and password.
Step 5 Click Test Connectivity to check the connection to the proxy server.
Step 6 Click Save.
Step 1 Choose Administration > Settings > System Settings > General > Server.
Step 2 To modify the FTP, TFTP, or HTTP service status and ports that were established during installation, enter the port
number (or port number and root, where required) that you want to modify, then click Enable or Disable.
The Global Idle Timeout is enabled by default and is set to 10 minutes. The Global Idle Timeout setting overrides the
User Idle Timeout setting in the My Preferences page. Only users with administrative privileges can disable the Global
Idle Timeout value or change its time limit.
Step 1 Choose Administration > Settings > System Settings, then choose Mail and Notification > Mail Server Configuration.
Step 2 Under Primary SMTP Server, complete the Hostname/IP, User Name, Password, and Confirm Password fields as
appropriate for the email server you want to use. Enter the IP address of the physical server. and the Enter the hostname
of the primary SMTP server.
Note You cannot enter a virtual IP address in the Hostname/IP field, and the IP address cannot be behind a load
balancer.
Step 3 (Optional) Complete the same fields under Secondary SMTP Server. SMTP server username and password.
Step 4 Under Sender and Receivers, enter a legitimate email address for .
Step 5 When you are finished, click Save.
• From the Server Type drop-down list, choose FTP, TFTP, SFTP, or All.
• Enter a user-defined name for the server.
• Enter the IP address of the server.
c) Click Save.
Step 2 If you want to use FTP or TFTP, enable it on the server.
a) Choose Administration > Settings > System Settings, then choose General > Server.
b) Go to the FTP or TFTP area.
c) Click Enable.
d) Click Save.
Step 3 Restart to apply your changes. See Stop and Restart , on page 92.
To download the updates and open/review a support case, you are required to enter a password.
If these settings are not configured, will prompt users for their credentials when they perform these tasks. To
configure a global Cisco.com user name and password:
Step 1 Choose Administration > Settings > System Settings, then choose General > Account Settings.
Step 2 Under the Cisco.com Credentials tab, enter a user name and password, and click Save.
Step 1 Choose Administration > Settings > System Settings, then choose General > Login Disclaimer.
Step 2 Enter (or edit) the login disclaimer text.
Note Carriage returns are ignored.
Your changes will take effect immediately.
To restart the server, open a CLI session with the server and enter:
ncs start
Note The default network address is 0.0.0.0, which indicates the entire network. An SNMP credential is defined
per network, so only network addresses are allowed. 0.0.0.0 is the SNMP credential default and is used when
no specific SNMP credential is defined. You should update the prepopulated SNMP credential with your own
SNMP information.
Step 1 Choose Administration > Settings > System Settings, then choose Network and Device > SNMP.
Step 2 (Optional) Select the Trace Display Values check box to display mediation trace-level logging data values that are
fetched using SNMP.
Step 3 Choose an algorithm from the Backoff Algorithm drop-down list.
• Exponential—Each SNMP try will wait twice as long as the previous try, starting with the specified timeout for
the first try.
• Constant—Each SNMP try will wait the same length of time (timeout). This is useful on unreliable networks where
the desired number of retries is large. Because it does not double the timeout per try, it does not take as long to
timeout with a high number of retries.
Step 4 If you do not want to use the timeout and retries specified by the device, configure the following parameters.
Note If switch port tracing is taking a long time to complete, reduce the Reachability Retries value.
• Reachability Retries—Enter the number of global retries.
• Reachability Timeout—Enter a global timeout.
Step 5 In the Maximum VarBinds per Get PDU and Maximum VarBinds per Set PDU fields, enter a number to indicate the
largest number of SNMP variable bindings allowed in a request or response PDU. These fields enable you to make
necessary changes when you have any failures associated to SNMP. For customers who have issues with PDU fragmentation
in their network, the number can be reduced to 50, which typically eliminates the fragmentation.
Step 6 Optionally adjust the Maximum Rows per Table.
Step 7 Click Save.
Step 1 Choose Administration > Settings > System Settings > Network and Device > SNMP.
Step 2 (Optional) Select the Trace Display Values check box to display mediation trace-level logging data values fetched from
the controller using SNMP. If unselected, these values do not appear.
Step 3 From the Backoff Algorithm list, choose Exponential or Constant Timeout. If you choose Exponential, each SNMP
try waits twice as long as the previous try, starting with the specified timeout for the first try. If you choose Constant
Timeout, each SNMP try waits the same, specified amount of time.
Constant Timeout is useful on unreliable networks (such as satellite networks) where the desired number of retries is
large. Because it does not double the timeout per try, it does not take as long to timeout with a high number of retries.
Step 4 Determine if you want to use reachability parameters. If selected, Prime Infrastructure defaults to the global Reachability
Retries and Timeout that you configure. If unselected, Prime Infrastructure always uses the timeout and retries specified
per controller or per IOS access point.
Adjust this setting downward if switch port tracing is taking a long time to complete.
Step 5 In Reachability Retries, enter the number of global retries used for determining device reachability. This field is only
available if the Use Reachability Parameters check box is selected.
Adjust this setting downward if switch port tracing is taking a long time to complete.
Note You cannot edit the value of Reachability Timeout. The default value is 2 seconds.
Step 6 In the Maximum VarBinds per PDU field, enter a number to indicate the largest number of SNMP variable bindings
allowed in a request or response PDU.
This Maximum VarBinds per PDU field enables you to make necessary changes with when you have any failures associated
to SNMP.
For customers who have issues with PDU fragmentation in their network, this number can be reduced to 50, which
typically eliminates the fragmentation.
The maximum rows per table field is configurable. The configured value is retained even if you upgrade Prime Infrastructure
to a newer version.
Related Topics
View SNMP Credential Details, on page 94
Add SNMP Credentials, on page 95
Import SNMP Credentials, on page 96
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Manual
SPT.
Step 2 Click the Network Address link to display the SNMP Credential Details page. The page displays the following information:
• General Parameters
• Add Format Type—Display only. For details, see “Add SNMP Credentials” in Related Topics.
• Network Address
• Network Mask
• SNMP Parameters—Choose the applicable versions for SNMP parameters. The SNMP credentials are validated
according to which SNMP versions are selected.
• Enter SNMP parameters for write access, if available. With display-only access parameters, the switch is added but
you cannot modify its configuration in Prime Infrastructure. Device connectivity tests use the SNMP retries and
timeout parameters.
• Retries—The number of times that attempts are made to discover the switch.
• Timeout—The session timeout value in seconds, which specifies the maximum amount of time allowed for a client
before it is forced to reauthenticate.
• SNMP v1 Parameters or v2 Parameters—If selected, enter the applicable community in the available text box.
• SNMP v3 Parameters—If selected, configure the following parameters:
• Username
• Auth. Type
• Auth. Password
• Privacy Type
• Privacy Password
If SNMP v1 or v2 with default community is configured, the network is open to easy attacks because default communities
are well known. SNMP v1 or v2 with a non default community is more secure than a default community, but SNMP v3
with Auth and Privacy type and no default user is the most secure SNMP connection.
Related Topics
Configure Global SNMP Settings, on page 93
Add SNMP Credentials, on page 95
Import SNMP Credentials, on page 96
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Manual
SPT.
Step 2 Choose Select a command > Add SNMP Entries > Go.
Step 3 In the Add Format Type drop-down list, choose SNMP Credential Info.
Step 4 Enter the IP address of the switch you want to add. If you want to add multiple switches, use a comma between each IP
address.
Step 5 In the Retries field, enter the number of times that attempts are made to discover the switch.
Step 6 Provide the session timeout value in seconds. This determines the maximum amount of time allowed for a client before
it is forced to reauthenticate.
Step 7 Choose the applicable versions for the SNMP parameters. The SNMP credentials are validated according to which SNMP
versions are selected.
• If SNMP v1 Parameters or v2 Parameters is selected, enter the applicable community in the available text box.
• If SNMP v3 Parameters is selected, configure the following parameters:
• Username
• Auth. Type
• Auth. Password
• Privacy Type
• Privacy Password
If SNMP v1 or v2 with default community is configured, the network is open to easy attacks because default communities
are well known. SNMP v1 or v2 with a non-default community is more secure than a default community, but SNMP v3
with Auth and Privacy type and no default user is the most secure SNMP connection.
Related Topics
Configure Global SNMP Settings, on page 93
ip_address,snmp_version,snmp_community,snmpv3_user_name,snmpv3_auth_type,snmpv3_auth_password,
snmpv3_privacy_type,snmpv3_privacy_password,network_mask 1.1.1.0,v2,private,user1,HMAC-MD5,
12345,DES,12345,255.255.255.0 2.2.2.0,v2,private,user1,HMAC-MD5,password3,DES,password4,
255.255.255.0 10.77.246.0,v2,private,user1,HMAC-MD5,12345,DES,12345,255.255.255.0
The first row of the file is mandatory, as it describes the column arrangement. The IP Address column is also
mandatory. The CSV file can contain the following fields:
• ip_address:IP address
• snmp_version:SNMP version
• network_mask:Network mask
• snmp_community:SNMP V1/V2 community
• snmpv3_user_name:SNMP V3 username
• snmpv3_auth_type:SNMP V3 authorization type. Can be None or HMAC-MD5 or HMAC-SHA
• snmpv3_auth_password:SNMP V3 authorization password
• snmpv3_privacy_type:SNMP V3 privacy type. Can be None or DES or CFB-AES-128
• snmpv3_privacy_password:SNMP V3 privacy password
• snmp_retries:SNMP retries
• snmp_timeout:SNMP timeout
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Manual
SPT.
Step 2 Choose Select a command > Add SNMP Entries > Go.
Step 3 In the Add Format Type drop-down list, choose File.
Step 4 Click Browse to navigate to the CSV file you want to import and select it.
Step 5 Click OK to import the file.
If Prime Infrastructure can use the SNMP credential listed to access the switch, the switch is added for later use and
appears in the Network Devices page accessible via Configuration > Network > Network Devices. If you manually
add switches through the Network Devices page, switch port tracing uses the credentials from that page, not the ones
listed in the SNMP Credentials page. If the manually added switch credentials have changed, you need to update them
using the Network Devices pages.
Related Topics
Configure Global SNMP Settings, on page 93
View SNMP Credential Details, on page 94
Add SNMP Credentials, on page 95
Do not attempt to enable Compliance Services on Express, Express-Plus. If you do, the feature itself will not
work. In addition, if you enable it and then try to migrate your data to a newly installed Professional or Gen
2 UCS appliance, the settings in the migrated data from the source Express or Express-Plus will prevent
Compliance Services from working on the target appliance. You can avoid all this by simply leaving the
Compliance Services feature disabled on the Express or Express-Plus, and then migrating your data to the
Professional or Gen2 UCS appliance.
Step 1 Choose Administration > Settings > System Settings > General > Server.
Step 2 Next to Compliance Services, click Enable.
Step 3 Click Save.
Step 4 Re-synchronize Prime Infrastructure’s device inventory: Choose Inventory > Network Devices, select All Devices, then
click the Sync icon.
Step 5 Ask any users who are currently logged in to Prime Infrastructure to log out. They will be able to see the new Configuration
> Compliance menu option when they log in again.
For details, see Virtual Appliance Options and Physical Appliance Options.
Step 1 Click Administration > Servers > Software Image Management Servers.
Step 2 Click the add icon and complete the following fields:
• Server Name
• IP Address
• Sites Served
• Description
Step 1 Choose Administration > Settings > System Settings > Inventory > User Defined Field.
Step 2 Click Add Row to add a UDF.
Step 3 Enter the field label and description in the corresponding fields.
Step 4 Click Save to add a UDF.
Manage OUIs
Prime Infrastructure relies on the IEEE Organizational Unique Identifier (OUI) database to identify the client
vendor name mapping. Prime Infrastructure stores vendor OUI mappings in an XML file named
vendorMacs.xml. This file is updated for each release of Prime Infrastructure. With the OUI update, you can
change the vendor display name for an existing OUI, add new OUIs to Prime Infrastructure and refresh the
vendorMacs.xml file with new vendor OUI mappings and upload it to Prime Infrastructure.
Related Topics
Add a New Vendor OUI Mapping, on page 99
Upload an Updated Vendor OUI Mapping File, on page 99
Step 1 Choose Administration > Settings > System Settings > Client and User > User Defined OUI. The User Defined OUI
page appears.
Step 2 Choose Add OUI Entries from the Select a Command drop-down list, then click Go.
Step 3 In the OUI field, enter a valid OUI. The format is aa:bb:cc.
Step 4 Click Check to verify if the OUI exists in the vendor OUI mapping.
Step 5 In the Name field, enter the display name of the vendor for the OUI.
Step 6 Select the Change Vendor Name check box to update the display name of the vendor, if the OUI exists in the vendor
OUI mapping, then click OK.
Step 1 Choose Administration > Settings > System Settings > Client and User > Upload OUI. The Upload OUI From File
page appears.
Step 2 Click Update online from IEEE to get OUI updates from the IEEE Registration Authority database (see the link to the
RA database in Related Topics). If Prime Infrastructure is unable to reach the IEEE database, a message appears instruction
you to save and upload the file.
Step 3 Click OK after the update completes successfully.
After you upload the vendorMacs.xml file in the Administration > Settings > System Settings > Upload OUI page: If
the vendor name is not reflected for existing unknown vendor clients in the Unique Clients and Users Summary report,
run the updateUnknownClient.sh script. This script is located in the /opt/CSCOlumos/bin folder.
For more information, see IEEE Registration Authority database.
A complete list of server internal SNMP traps is provided in . sends traps to notification destination on
port 162. This port cannot be customized at present.
You can customize and manage these traps as described in the following topics:
• Customize Server Internal SNMP Traps and Forward the Traps, on page 101
• Troubleshoot Server Internal SNMP Traps, on page 101
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > System Event Configuration.
Step 2 For each SNMP event you want to configure:
a) Click on the row for that event.
b) Set the Event Severity to Critical, Major, or Minor, as needed.
c) For the CPU, disk, memory utilization, and other hardware traps, Enter the Threshold percentage (from 1–99). These
events will send the associated SNMP traps when the utilization exceeds the threshold limit. (You cannot set thresholds
for events for which the threshold setting is shown as NA.) These events send traps whenever the associated failure
is detected.
d) For backup threshold and certificate expiry (critical), enter the Threshold in days (from x–y, where x is the minimum
number of days and y is the maximum number of days).
e) To control whether a trap is to generated or not, set the Event Status.
Step 3 In the Other Settings, enter the desired value for Create and Clear Alarm Iteration.
Step 4 To save all of your trap changes, click Save (below the table).
Step 5 If you want to configure receivers for the server internal SNMP traps, refer to the procedures in the following topics,
depending on whether you want to send the information as an email or trap notification.
Step 1 Ping the notification from the server to ensure that there is connectivity between and your management application.
Step 2 Check if any firewall ACL settings are blocking port 162, and open communications on that port if needed.
Step 3 Log in to with a user ID that has Administrator privileges. Select Administration > Logging and download the log files.
Then compare the activity recorded in these log files with the activity you are seeing in your management application:
• ncs_nbi.log: This is the log of all the northbound SNMP trap messages has sent. Check for messages you have not
received.
• ncs-# -# .log: This is the log of most other recent activity. Check for hardware trap messages you have not received.
• hm-# -# .log: This is the log of all Health Monitor activity. Check for recent messages about High Availability
state-changes and application-process failures that you have not received.
The messages you see in these logs should match the activity you see in your management application. If you find major
differences, open a support case with Cisco Technical Assistance Center (TAC) and attach the suspect log files with your
case. See Open a Cisco Support Case, on page 240.
Step 1 Choose Administration > Settings > System Settings, then choose General > Account Settings.
Step 2 Click the Support Request tab.
Step 3 Select the type of interaction you prefer:
• Enable interactions directly from the server—Specify this option to create the support case directly from the server.
E-Mails to the support provider are sent from the e-mail address associated with the server or the e-mail address
you specify.
• Interactions via client system only—Specify this option to download the information required for your support case
to a client machine. You must then e-mail the downloaded support case details and information to the support
provider.
This feature is enabled by default. Data is collected on a daily, weekly, and monthly basis and is posted to a
REST URL in the Cisco cloud using HTTPS. Choose Administration > Settings > System Settings, then
choose General > Help Us Improve, and:
• To view the types of data Cisco collects, click What data is Cisco collecting?
• To disable this feature, select Not at this time, thank you, then click Save.
Overview Dashboard
The following table describes the information displayed on the Administration > Dashboards > System
Monitoring Dashboard > Overview dashboard.
Status of the data cleanup jobs over the selected period. Data Cleanup
Status of backup jobs, available server backups, and alarms on server backup over the selected period. Backup Information
Total memory and swap memory utilization displaying the set threshold limit. Also provides information Memory Utilization
on threads utilizing the memory when the threshold is breached.
CPU utilization and the set threshold limit. Also provides information on the processes and the jobs CPU Utilization
running in Prime Infrastructure that consumes more CPU when the threshold is breached.
Disk utilization and the set threshold limit. Also provides information on the files and the tablespaces Disk Utilization
using the disk when the threshold is breached.
Virtual Domain Summary - Click on the summary icon to view the association between virtuals domains Virtual Domain
and the users. Also the members without virtual domain association. It allows you export the list of Summary
respective associations.
The successful restore information over the selected period, the backup name and the restoration time. Restore Information
Choose Administration > System Settings > System Event Configuration to set the threshold limit for
CPU/Disk/Memory utilization and to configure the alarm generation and clearance monitor settings.
Related Topics
Performance Dashboard, on page 106
Admin Dashboard, on page 106
Performance Dashboard
The following table describes the information displayed on the Administration > Dashboards > System
Monitoring Dashboard > Performance Performance dashboard.
Disk read and write over the set collection time frame. System Disk Throughput
Number of read/write requests that were issued to the server per second. System Disk IOPS
Number of requests waiting in the server queue. System Disk Outstanding I/O
The speed at which data is currently being transferred based on the traffic flowing through available Network Interface Traffic
network interfaces such as eth0, eth1, and I/O interfaces.
Collective information on the CPU usage, disk usage, and memory usage. Composite View
Admin Dashboard
The following table describes the information displayed on the Administration > Dashboards > System
Monitoring Dashboard > Admin dashboard.
Alarms and events issued against the Prime Infrastructure server itself, including a Health System Alarms
list of events, times events occurred, and their severities.
General health statistics for the Prime Infrastructure server, such as the number of System Information
jobs scheduled and running, the number of supported MIB variables, how much
polling the server is doing, and the number of users logged in.
The relative proportion of the Prime Infrastructure server database taken up by data DB Usage Distribution
on discovered device inventory (“Lifecycle Clients”), their current status and
performance data (“Lifecycle Statistics”), and the server’s own system data
(“Infrastructure” and “DB-Index”)
How quickly the Prime Infrastructure server is responding to user service requests API Health API Response Time Summary
for information, such device reachability, alarms and events, and so on. Shows the
maximum, minimum, and average response times for each API underlying a client
service.
The trend over time in how quickly the Prime Infrastructure server is responding to Service API Response Time Trend
user service requests. Details
The activity level for each of the logged-in Prime Infrastructure users, measured by API Calls Per Client Chart
the number of service requests each is generating.
The trend over time in the total number of service requests logged-in clients are API Request Count Trend
generating,
• Recover as much existing disk space as you can, following the instructions in “Compacting the Prime
Infrastructure Database”.
• Add more disk space—VMware OVA technology enables you to easily add disk space to an existing
server. You will need to shut down the Prime Infrastructure server and then follow the instructions
provided by VMware to expand the physical disk space (see “VMware vSphere Documentation” in
Related Topics). Once you restart the virtual appliance, Prime Infrastructure automatically makes use of
the additional disk space.
• Limit collection—Not all data that Prime Infrastructure is capable of collecting will be of interest to you.
For example, if you are not using the system to report on wireless radio performance statistics, you need
not collect or retain that data, and can disable the Radio Performance collection task. Alternatively, you
may decide that you need only the aggregated Radio Performance data, and can disable retention of raw
performance data. For details on how to do this, see “Specifying Data Retention by Category”.
• Shorten retention—Prime Infrastructure defaults set generous retention periods for all of the data it
persists and for the reports it generates. You may find that some of these periods exceed your needs, and
that you can reduce them without negative effects. For details on this approach, see “Controlling Report
Storage and Retention”, “Specifying Data Retention by Category”, and “Specifying Data Retention By
Database Table.”
• Off load backups and reports—You can save space on the Prime Infrastructure server by saving reports
and backups to a remote server. For details, see “Using Remote Backup Repositories”.
• Migrate to a new server—Set up a new server that meets at least the minimum RAM, disk space, and
processor requirements of the next higher level of physical or virtual appliance. Back up your existing
system, then restore it to a virtual machine on the higher-rated server. For details, see “Migrating to
Another OVA Using Backup and Restore”.
For more details, see "System Requirements", "Cisco Prime Infrastructure Quick Start Guide" and, "VMware
vSphere Documentation".
Related Topics
Overview Dashboard, on page 105
Compact the Prime Infrastructure Database, on page 110
How Data Retention Settings Affect Web GUI Data, on page 139
Specify Data Retention By Database Table, on page 143
Control Report Storage and Retention, on page 145
Use a Remote Backup Repository, on page 51
Migrate to Another Virtual Appliance Using Backup and Restore, on page 61
Tip For better performance: If you are changing RAM and CPU resource allocations for the virtual machine on
which you run Prime Infrastructure, and you have more than one virtual machine running on the same hardware,
you may also want to change your RAM and CPU resource reservations using the vSphere Client’s Resource
Allocation tab. For details, see “VMware vSphere documentation” in Related Topics.
Step 1 Open a CLI session with the Prime Infrastructure server (see “Connecting Via CLI”).
Step 2 Stop Prime Infrastructure using the ncs stop command (see “Stopping Prime Infrastructure”).
Step 3 Halt the VMware virtual appliance:
PIServer/admin# halt
Step 4 Launch the vSphere Client, right-click the virtual appliance, then click Edit Settings.
Step 5 To change the RAM allocation, select Memory and change the Memory Size as needed. Then click OK.
Step 6 To change the CPU allocation, select CPUs and select the Number of Virtual Processors from the drop-down list. Then
click OK.
Step 7 To add a new disk (you cannot expand the space of the existing disk):
a) Click Add.
b) Select Hard Disk, then click Next.
c) Check Create a new virtual disk, then click Next.
d) Enter the desired Disk Size and specify a Location for the new virtual disk, then click Next.
e) With the Advanced Options displayed, click Next, then click Finish.
Step 8 Power on the virtual appliance (see “Restarting Prime Infrastructure”)
For more details, see "Backing Up and Restoring Prime Infrastructure" and VMware vSphere Documentation.
Note Cisco Prime Infrastructure is installed only using the 1 Gbps ports. To disable the 10 Gbps ports and use the 1
Gbps ports to install Prime Infrastructure, perform the following steps.
a. Login to CIMC Console.
b. Navigate to Compute > BIOS > Configure BIOS > Advanced > LOM and PCle Slots Configuration.
c. Choose the Disabled option from the PCIe Slot:MLOM OptionROM and PCIe Slot:MLOM Link Speed
drop-down lists.
d. Click the Save button.
e. Navigate to Host Power, Power Cycle the machine and then Power ON.
Related Topics
How to Connect Via CLI, on page 119
Stop Prime Infrastructure, on page 121
Restart Prime Infrastructure Using CLI, on page 121
How to Improve the Performance of Prime Infrastructure, on page 109
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI” in related topics).
Step 2 Enter the following command to compact the application database:
PIServer/admin# ncs cleanup
Related Topics
How to Connect Via CLI, on page 119
How to Improve the Performance of Prime Infrastructure, on page 109
Step 1 Choose Administration > Settings > System Settings > Client and User > Client. The Client page appears.
Step 2 In the Process Diagnostic Trap area, select the Automatically troubleshoot client on diagnostic channel check box, then
click Save. For more details, see Cisco Compatible Extensions Client Devices page.
Related Topics
Configure Client Performance Settings, on page 111
How to Improve the Performance of Prime Infrastructure, on page 109
You can enable or disable the DNS lookup for client hostnames, and change how long Prime Infrastructure
retains the results of previous DNS lookups in its cache.
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Select the Lookup client host names from DNS server check box.
Step 3 Enter the number of days that you want the hostname to remain in the cache, then click Save.
Related Topics
Configure Client Performance Settings, on page 111
How to Improve the Performance of Prime Infrastructure, on page 109
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Under Data Retention, change the following parameters as needed:
• Dissociated Clients —Enter the number of days that you want Prime Infrastructure to retain the data. The valid
range is 1 to 30 days.
• Client session history—Enter the number of days that you want Prime Infrastructure to retain the data. The valid
range is 7 to 365 days.
• Number of Rows To Keep—Enter the maximum number of client session records to maintain. The default is
8,000,000.
Related Topics
Configure Client Performance Settings, on page 111
How to Improve the Performance of Prime Infrastructure, on page 109
you previously disabled the traps on the WLC. Prime Infrastructure triggers the WLC Sync operation, which
enables the client traps on WLC.
Step 1 Choose Administration > Settings > System Settings > Client.
Step 2 Select the Poll clients when client traps/syslogs received check box. Prime Infrastructure will poll clients as soon as a
trap or syslog is received, to identify client sessions.
Step 3 Click Save.
Related Topics
Configure Client Performance Settings, on page 111
How to Improve the Performance of Prime Infrastructure, on page 109
Step 1 Choose Administration > Settings > System Settings > Client.
Step 2 Unselect the Save client association and disassociation traps as events check box.
Step 3 Click Save to confirm this configuration change. This option is disabled by default.
Related Topics
Configure Client Performance Settings, on page 111
How to Improve the Performance of Prime Infrastructure, on page 109
Step 1 Choose Administration > Settings > System Settings > Client.
Step 2 Select the Save 802.1x and 802.11 client authentication fail traps as events check box.
Step 3 Click Save to confirm this configuration change.
Related Topics
Configure Client Performance Settings, on page 111
How to Improve the Performance of Prime Infrastructure, on page 109
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Select the Discover Clients from enhanced client traps check box.
Step 3 Make sure that the Prime Infrastructure server is registered as a Trap receiver on Cisco WLC for receiving Client traps.
The following trap flags need to be enabled on the devices for enhanced client trap to work:
• config trapflags client enhanced-802.11-associate enable
• config trapflags client enhanced-802.11-deauthenticate enable
• config trapflags client enhanced-authentication enable
• config trapflags client enhanced-802.11-stats enable
Step 4 To log the incoming enhanced client traps on the Prime Infrastructure side, you can enable client trap logging via ssh to
root shell. This generates clientTraps.log file under the /opt/CSCOlumos/logs file.
• /opt/CSCOlumos/bin/setLogLevel.sh com.cisco.client.traps TRACE
Note Enhanced clients traps from Prime Infrastructure is supported from WLC version 8.0 onwards.
Related Topics
Monitor Assurance Memory Allocation and Demand, on page 115
Increase the Assurance Memory Pool Via CLI, on page 115
How to Balance the Assurance Memory Allocation, on page 116
Reset Assurance Memory Allocation, on page 116
Reset the Assurance Memory Pool, on page 116
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the text link Assurance Memory Statistics (in the upper right corner of the page). Prime Infrastructure displays:
• The current memory allocation in megabytes for each of the main Assurance feature categories, including Traffic,
Performance Routing, Applications, Voice-Video data, Device Health, Lync and other data.
• The usage of each area’s memory allocation over the last 24 hours. The percentage represents the peak memory
usage over that period (that is, if 100 percent of the memory allocation is used at any point in the past 24 hours, the
usage percentage shown will be 100 percent).
Related Topics
Optimize Memory for Assurance Processing, on page 114
Increase the Assurance Memory Pool Via CLI, on page 115
How to Balance the Assurance Memory Allocation, on page 116
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command:
PIServer/admin# ncs tune-resources assurance
Step 3 Restart the Prime Infrastructure server (see “Restart Prime Infrastructure”).
Related Topics
How to Connect Via CLI, on page 119
Restart Prime Infrastructure Using CLI, on page 121
Optimize Memory for Assurance Processing, on page 114
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the text link Assurance Memory Statistics (in the upper right corner of the Data Sources page).
Step 3 Click Rebalance.
Prime Infrastructure will change Assurance memory allocations to individual features as needed, reducing allocations
for less-used features and increasing allocations for features where usage over the past 24 hours was at or near 100 percent.
Related Topics
Optimize Memory for Assurance Processing, on page 114
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the text link Assurance Memory Statistics (in the upper right corner of the Data Sources page).
Step 3 Click Reset.
Related Topics
Optimize Memory for Assurance Processing, on page 114
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command:
PIServer/admin# ncs tune-resources default
Step 3 Restart the Prime Infrastructure server (see “Restart Prime Infrastructure”).
Related Topics
Increase the Assurance Memory Pool Via CLI, on page 115
How to Connect Via CLI, on page 119
Select Services > Application Visibility & Control > Data Sources. Prime Infrastructure displays a summary page that
lists each device data source’s:
• Device Name–The host name of the data source
• Data Source–The IP address of the data source.
• Type–The type of data the source is sending to Prime Infrastructure (e.g., “Netflow”).
• Exporting Device–The IP address of the device exporting the data to Prime Infrastructure.
• Last 5 min Flow Read Rate–The amount of data Prime Infrastructure has received from this source during the last
five minutes.
• Last Active Time–The latest date and time that Prime Infrastructure received data from this source.
For each Cisco NAM data collector sources, the page lists:
Related Topics
Special Administrative Tasks, on page 118
Delete Data Sources, on page 118
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the checkbox next to the inactive data source you want to delete.
Step 3 Click Delete.
Step 4 Click OK to confirm the deletion.
Related Topics
Special Administrative Tasks, on page 118
View Current Data Sources, on page 117
Note Disabling the SSH legacy ciphers may impact associating with the Prime Infrastructure that utilizes the legacy
SSH client.
Step 1 Start up your SSH client, start an SSH session via your local machine’s command line, or connect to the dedicated console
on the Prime Infrastructure physical or virtual appliance.
Step 2 Log in as appropriate: If you are using a GUI client: Enter the ID of an active administrator with CLI access and the IP
address or host name of the Prime Infrastructure server. Then initiate the connection. If you are using a command-line
client or session: Log in with a command like the following:[localhost]# ssh username@IPHost -Whereusername is the
user ID of a Prime Infrastructure administrator with CLI access to the server.IPHost is the IP address or host name of the
Prime Infrastructure server or appliance. If you are using the console: A prompt is shown for the administrator user name.
Enter the user name.
Prime Infrastructure will then prompt you for the password for the administrator ID you entered.
Step 3 Enter the administrative ID password. Prime Infrastructure will present a command prompt like the following:
PIServer/admin#.
Step 4 If the command you need to enter requires that you enter “configure terminal” mode, enter the following command at
the prompt:
PIServer/admin# configure terminal
The prompt will change from PIServer/admin# to PIServer/admin/conf#.
Related Topics
Special Administrative Tasks, on page 118
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command to start the Prime Infrastructure server or appliance:
PIServer/admin# ncs start
Related Topics
How to Connect Via CLI, on page 119
Stop Prime Infrastructure, on page 121
Restart Prime Infrastructure Using CLI, on page 121
Special Administrative Tasks, on page 118
Step 1 Open a CLI session with the Prime Infrastructure server (see “Connecting Via CLI”).
Step 2 Enter the following command to display the current status of Prime Infrastructure processes and services:
PIServer/admin# ncs status
For more details, see "Checking High Availability Status".
Related Topics
How to Connect Via CLI, on page 119
Overview Dashboard, on page 105
Special Administrative Tasks, on page 118
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect via CLI”).
Step 2 Enter the following command to display the current status of Prime Infrastructure processes and services:
PIServer/admin# show version
Related Topics
How to Connect Via CLI, on page 119
Special Administrative Tasks, on page 118
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to connect via CLI”).
Step 2 Enter the following command to stop the Prime Infrastructure server or appliance:
PIServer/admin# ncs stop
Related Topics
How to Connect Via CLI, on page 119
Special Administrative Tasks, on page 118
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect via CLI”).
Step 2 Enter the following command to stop the Prime Infrastructure server or appliance:
PIServer/admin# ncs stop
Related Topics
How to Connect Via CLI, on page 119
Special Administrative Tasks, on page 118
Restart Prime Infrastructure Using GUI, on page 122
Related Topics
Restart Prime Infrastructure Using CLI, on page 121
Related Topics
Stop Prime Infrastructure, on page 121
Special Administrative Tasks, on page 118
Note that this procedure will delete all your existing data on the server host except for the default settings
supplied with Prime Infrastructure. You will be unable to restore your data unless you have a remote backup
or access to disk-level data recovery methods.
Related Topics
Stop Prime Infrastructure, on page 121
How to Get the Installation ISO Image, on page 130
Special Administrative Tasks, on page 118
Note Setting the hostname using hostnamectl changes the uppercase letters to lowercase. Although Redhat 7 and
CentOS 7 provide hostnamectl to set the hostname permanently, the real hostname will only be lowercase
even if the users specify any uppercase letters.
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”). Be sure to enter “configure
terminal” mode.
Step 2 Enter the following command:
PIServer/admin(config)# hostname newHostName
Where newHostName is the new host name you want to assign to the Prime Infrastructure server.
Step 3 Restart the Prime Infrastructure server using the ncs stop and ncs start commands, as explained in "Restart Prime
Infrastructure" .
Related Topics
How to Connect Via CLI, on page 119
Restart Prime Infrastructure Using CLI, on page 121
Special Administrative Tasks, on page 118
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command:
PIServer/admin#ncs password ftpuser ftp-user password password
Where:
• ftp-user is the username for FTP operation.
• password is the login password for ftp-user.
Note The username for FTP must be ftp-user.
For example:
pi-system-999/admin# ncs password ftpuser root password MyPassword
Updating FTP password.
Saving FTP account password in credential store
Syncing FTP account password to database store - location-ftp-user
Syncing FTP account password to system store
Completed FTP password update
pi-system-999/admin#
Related Topics
How to Connect Via CLI, on page 119
Special Administrative Tasks, on page 118
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”) in Related Topics.
Step 2 Enter the following command:
PIServer/admin# ncs password root password password
Where password is the root user login password. You can enter a password not exceeding 80 characters.
For example:
Related Topics
How to Connect Via CLI, on page 119
Special Administrative Tasks, on page 118
• Access to the VMware vSphere client, and to the vSphere inventory, Datastores and Objects functions.
If you do not have such access, consult your VMware administrator. You should avoid accessing ESX
directly from the vSphere client.
Step 1 Launch your VMware vSphere Client and connect to the ESXi host or vCenter server.
Step 2 Upload the installation ISO image to the data store on the OVA virtual machine, as follows:
a) In the vSphere Server, click Inventory > Summary > Datastores.
b) On the Objects tab, select the datastore to which you will upload the file.
c) Click the Navigate to the datastore file browser icon.
d) If needed, click the Create a new folder icon and create a new folder.
e) Select the folder that you created or select an existing folder, and click the Upload a File icon.
If the Client Integration Access Control dialog box appears, click Allow to allow the plug-in to access your operating
system and proceed with the file upload.
f) On the local computer, find the ISO file and upload it.
g) Refresh the datastore file browser to see the uploaded file in the list.
Step 3 With the ISO image uploaded to a datastore, make it the default boot image, as follows:
a) Using the VMware vSphere client, right-click the deployed OVA and choose Power > Power Off.
b) Select Edit Settings > Hardware, then select CD/DVD drive 1.
c) Under Device Type, select Datastore ISO File, then use the Browse button to select the ISO image file you uploaded
to the datastore.
d) Under Device Status, select Connect at power on.
e) Click the Options tab and select Boot Options. Under Force BIOS Setup, select Next time VM boots, force entry
into BIOS setup Screen. This will force a boot from the virtual machine BIOS when you restart the virtual machine.
f) Click OK.
g) In the VMware vSphere client, right-click the deployed OVA and choose Power > Power On.
h) In the BIOS setup menu, find the option that controls the boot order of devices and move DVD/CDROM to the top.
Step 4 Follow the steps below to reset a server administrator password:
a) Save your BIOS settings and exit the BIOS setup menu. The virtual machine will boot from the ISO image and display
a list of boot options.
b) Enter 3 if you are using the keyboard and monitor to access the OVA, or 4 if you are accessing via command line or
console. The vSphere client displays a list of administrator user names.
c) Enter the number shown next to the administrator username for which you want to reset the password.
d) Enter the new password and verify it with a second entry.
e) Make sure to disconnect ISO image before confirming the changes using the vSphere client.
f) Click the CD icon and select Disconnect ISO image.
g) Enter Y to save your changes and reboot.
Step 5 Log in with the new administrator password.
Related Topics
How to Get the Installation ISO Image, on page 130
Special Administrative Tasks, on page 118
Step 11 Select the desired DVD mount option and in this case, you must select Cisco vKVM-Mapped vDVD1.22.
Step 12 The vSphere client displays a list of boot options. Enter 3 to select the Recover administrator password
(Keyboard/Monitor) boot option.
Note If you are using Serial Console to recover password, then you must enter 4 to select the Recover administrator
password (Serial Console) boot option.
Step 13 The vSphere client displays a list of administrator user names. Enter the number shown next to the administrator user
name for which you want to recover (reset) the password and press Enter.
Step 14 Enter the new password and verify it with a second entry.
Step 15 Enter Y to save your changes and reboot the system.
Step 16 Login to the admin CLI with the new administrator password.
Note You can follow the same steps to recover password using VGA console and Serial console.
To recover the password using Serial Console/Serial Over Lan-SOL, follow these steps:
# scope chasis
# power off
This operation will change the server's power state.
Do you want to continue?[y|N]y
#
#
# power on
This operation will change the server's power state.
Do you want to continue?[y|N]y
# exit
# scope sol
# show detail
Serial Over LAN:
Enabled: yes
Baud Rate(bps): 9600
Com Port: com0
# set enabled yes
# set baud-rate 9600
# commit
# connect host // to connect sol cosole
Step 5 The machine reboots and prompts to enter F6 for boot option. Press the function-key F6.
You may need to press F6 multiple times to see Enter boot selection menu... in the screen. You must wait for a few
minutes to get the boot device option.
Step 6 Select the desired DVD mount option and in this case, you must select Cisco CIMC-Mapped vDVD1.22.
Step 7 The vSphere client displays a list of boot options. Enter 4 to select the Recover administrator password (Serial
Console) boot option.
Note To recover administrator password for Gen 3 appliances, it is recommended to use Serial Over Lan
(Serial console)
Step 8 The vSphere client displays a list of administrator user names. Enter the number shown next to the administrator user
name for which you want to recover (reset) the password and press Enter.
Step 9 Enter the new password and verify it with a second entry.
Step 10 Enter Y to save your changes and reboot the system.
Step 11 Login to the admin CLI with the new administrator password.
Step 1 Launch your Hyper-V Machine and make sure ISO image available in your Hyper-V Machine.
Step 2 Connect to the Hyper-V Manager.
a) Right-click the virtual machine for which you want to reset the password and select Connect.
The Virtual Machine Connection window opens.
b) Choose Media > DVD Drive > Insert Disk.
c) Browse and select the ISO image.
d) Turn Off and Start the virtual machine as follows:
• Choose Action > Turn Off.
• Click Turn Off in the Turn Off Machine pop-up.
• Choose Action > Start.
Step 3 The virtual machine will boot from the ISO image and will display a list of boot options.
a) Enter 3 (The option for recovering Administrator password)
b) Enter the number shown for the administrator username for which you want to reset the password.
c) Enter the new password and verify it with a second entry.
d) Enter Y to save your changes and reboot.
e) Wait until the machine gets rebooted.
Step 1 On a browser with internet access, link to the Cisco Software Download Navigator (see Related Topics).
Step 2 Use the Find box to search for “Cisco Prime Infrastructure”.
Step 3 From the results list, select the software version you are using.
Step 4 Select Prime Infrastructure Software to display the list of ISOs and other downloadable image files for that software
version.
Step 5 Download the ISO image from the page.
Step 6 When the download is complete, check that the MD5 checksum of the downloaded file matches the checksum shown for
the file on its Cisco.com download page. If the checksums do not match, the file is corrupt, and you will need to download
it from Cisco.com again.
Step 7 If you need the ISO image on disk: Burn the ISO image to a Dual Layer DVD using DVD authoring software. For reliable
results, we recommend that you conduct the burn at single (1X) speed and with the “Verify” option turned on.
For more details, see https://software.cisco.com/download/navigator.html and Cisco Prime Infrastructure Appliance
Hardware Installation Guide
Related Topics
Special Administrative Tasks, on page 118
For details on how to find these updates, and how to get notifications when they are released, see “View
Installed and Available Software Updates” in Related Topics.
The update notifications that Prime Infrastructure displays are based on the Notification Settings you specify
using Administration > Settings > System Settings > Software Update. For details, see “Configuring
Software Update Notifications”.
For details on installing these updates, see “Install Software Updates”.
For details on streamlining your software update notifications and installations using your Cisco.com account,
see “How to Use Your Cisco.com Account Credentials with Prime Infrastructure”.
Related Topics
View Installed and Available Software Updates, on page 131
Configure Software Update Notifications, on page 132
Install Software Updates, on page 133
How to Use Your Cisco.com Account Credentials with Prime Infrastructure, on page 135
Step 1 Choose Administration > Settings > System settings > Account Settings.
Step 2 Enter a valid Cisco.com user name and password.
Step 3 Click Save.
Step 4 Choose Administration > Settings > System Settings > General > Software Update.
Step 5 Under Notification Settings, select the categories for which you want updates displayed on the Administration > Software
Update page.
Step 6 Click Save.
To see notifications: Click on the notifications icon at the top right, next to the alarms icon.
Related Topics
Configure Software Update Notifications, on page 132
View Installed and Available Software Updates, on page 131
How to Use Your Cisco.com Account Credentials with Prime Infrastructure, on page 135
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Choose Administration > Settings > System Settings > General > Software Update.
Step 2 Under Notification Settings, select the categories for which you want updates displayed on the Administration > Software
Update page.
Step 3 Click Save.
Related Topics
View Installed and Available Software Updates, on page 131
How to Get Software Update Notifications, on page 131
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Choose Administration Settings > Licenses and Software Updates > Software Update.
Step 2 Click the Updates tab to see the Name, Type, Version, Status and Date of each installed software update.
To filter this list, click the Filter icon at the right side of the Updates tab and select the categories of installed updates you
want to see.
Step 3 Click the Files tab to see the list of installed UBF files and downloaded UBF files which have yet to be installed.
To delete a software update file that has not yet been installed, select the file and click Delete.
Related Topics
View Installed and Available Software Updates, on page 131
View Installed Updates From the Login Page, on page 133
View Installed Updates From the About Page, on page 133
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Launch or log out of Prime Infrastructure. The login page displays.
Step 2 Click View installed updates. Prime Infrastructure displays a popup list of the names and versions of all installed software
updates.
Step 3 Click the Close button to close the popup list.
Related Topics
View Installed Updates From the About Page, on page 133
View Installed and Available Software Updates, on page 131
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Click the settings icon at the upper right corner of any Prime Infrastructure page.
Step 2 Click About Prime infrastructure. The About page appears, listing the version of the product and other details.
Step 3 Click View installed updates. Prime Infrastructure displays a popup list of the names and versions of all installed software
updates.
Step 4 Click the Close button to close the popup list.
Related Topics
View Installed Updates From the Login Page, on page 133
View Installed and Available Software Updates, on page 131
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Choose Administration > Licenses and Software Updates > Software Update.
Step 2 Click the download link at the top of the page to get the latest updates from Cisco.com.
Step 3 Enter your Cisco.com login credentials. Prime Infrastructure lists the available updates.
If you receive an error indicating there was a problem connecting to cisco.com, verify your proxy settings by choosing
Administration > Settings > System Settings > General > Account Settings > Proxy. If your proxy settings are not
working, deselect Enable Proxy, then click Save.
Step 4 Click Show Details to see the details about the updates.
Step 5 Click Download next to the update you want to install.
Step 6 After the update has been downloaded, click Install.
Step 7 Click Yes in the pop-up message. The server will restart automatically.
Step 8 When the restart is complete, choose Administration > Licenses and Software Updates > Software Update. The
Updates table should show the update as “Installed”.
Related Topics
Install Software Updates, on page 133
Restart Prime Infrastructure Using CLI, on page 121
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Choose Administration > Licenses and Software Updates > Software Update.
Step 2 Click the upload link at the top of the page.
Step 3 On the Upload Update window, click Cisco Download, which displays Cisco.com’s “Download Software” page.
Step 4 Select Products > Cloud and Systems Management > Routing and Switch Management > Network Management
Solutions > Prime Infrastructure.
Step 5 Select the correct version of Prime Infrastructure.
Step 6 Select an update software type (such as “Prime Infrastructure Device Packs”).
Step 7 From the page that appears, click Download next to the file containing the updates you want. The file will have a UBF
filename extension.
If you have not already stored your Cisco.com credentials (see “Saving Cisco.com Account Credentials in Prime
Infrastructure” in Related Topics), you will be prompted to log in to Cisco.com, and to accept your organization’s active
license agreement with Cisco, before you can download the update file.
Be sure to download software updates that match your Prime Infrastructure version.
Step 8 With the update file downloaded to your client machine, return to the Prime Infrastructure tab and choose Administration
> Licenses and Software Updates > Software Update.
Step 9 Click Upload and browse to locate and select the update file you downloaded.
Step 10 Click Install.
Step 11 Click Yes in the pop-up message. The server will restart automatically.
Step 12 When the restart is complete, choose Administration > Licenses and Software Updates > Software Update. The
Updates table should show the update as “Installed”.
Related Topics
Install Software Updates, on page 133
Save Cisco.com Account Credentials in Prime Infrastructure, on page 135
Restart Prime Infrastructure Using CLI, on page 121
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Choose Administration > Settings > System settings > Account Settings
Step 2 Enter a valid Cisco.com user name and password.
Step 3 Click Save.
Related Topics
Install Software Updates from Cisco.com, on page 134
Restart Prime Infrastructure Using CLI, on page 121
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Choose Administration > Settings > System settings > Account Settings.
Related Topics
Install Software Updates, on page 133
Restart Prime Infrastructure Using CLI, on page 121
How to Update Prime Infrastructure With Latest Software Updates, on page 130
Step 1 Choose Administration > Settings > System Settings > Support Request. The Support Request Settings page appears.
Step 2 Configure the following parameters:
• General Support Settings:
• Enable interactions directly from the server—Select this check box to allow interactions for support requests
directly from the server.
• Sender E mail Address—Enter the email address of the support request sender.
• Interactions via client system only—Select this check box to allow interactions for support requests only through
client system.
Related Topics
Open a Cisco Support Case, on page 240
Join the Cisco Support Community, on page 241
Threshold crossings for these alarms are calculated based on the usage of the Prime Infrastructure optvol and
localdiskvol partitions only. The optvol partition contains the Oracle database used to store all of Prime
Infrastructure’s inventory and network data, while localdiskvol stores local application backups, WLC and
MSE backups, and reports. The settings that trigger the alarms are defined in the file
PackagingResources.properties, which you can find in the Prime Infrastructure server in the folder
/opt/CSCOlumos/conf/rfm/classes/com/cisco/packaging.
We recommend that administrators take action to increase disk space immediately upon receiving the Major
alert. You can do this using any combination of the following methods:
• Free up existing database space as explained in “Compacting the Prime Infrastructure Database”.
• Reduce the storage load on the localdiskvol partition by setting up and using remote backup repositories,
as explained in “Using Remote Backup Repositories”.
• Reduce the storage load on the optvol partition by reducing the amount and storage period for which you
retain inventory and network data:
• Reduce the length of time you store client association data and related events, as explained in
“Specifying How Long to Retain Client Association History Data” and “Saving Client Traps as
Events”.
• Reduce the length of time you store reports, as explained in “Controlling Report Storage and
Retention”.
• Reduce the retention period for network inventory, performance, and other classes of data, as
explained in “Specifying Data Retention by Category” and “Enabling DNS Hostname Lookup”.
• Increase the amount of existing virtual disk space allocated to Prime Infrastructure, as explained in
“Modifying VM Resource Allocation Using VMware vSphere Client”. If you are using VMware ESXi
5.5 or later, use the vSphere Web Client to adjust disk space allocation (for details, see the “VMware
vSphere documentation” in Related Topics). You can also install additional physical disk storage and
then use VMware Edit Settings or the vSphere Web Client to allocate the additional storage to Prime
Infrastructure.
• Move the Prime Infrastructure server installation to a server with adequate disk space, as explained in
“Migrating to Another OVA Using Backup and Restore” and “Migrating to Another Appliance Using
Backup and Restore”. For more details, see "VMware vSphere Documentation".
Related Topics
Compact the Prime Infrastructure Database, on page 110
Use a Remote Backup Repository, on page 51
Specify How Long to Retain Client Association History Data, on page 112
Save Client Traps as Events, on page 113
How Data Retention Settings Affect Web GUI Data, on page 139
Specify Data Retention By Database Table, on page 143
Enable DNS Hostname Lookup, on page 111
Modify VM Resource Allocation Using VMware vSphere Client, on page 109
Migrate to Another Virtual Appliance Using Backup and Restore, on page 61
Migrate to Another Physical Appliance Using Backup and Restore, on page 62
If you specify these settings, all data displayed in performance reports and on performance dashboards will
be for the previous 7 days only. When you generate a performance report, even if you select a reporting period
longer than the last 7 days, the report will contain data from the last 7 days only (because that is all of the data
you selected to retain).
Similarly, if you view a performance dashboard and select a time frame longer than one week, the dashboard
will contain date from the last 7 days only.
When you create the monitoring policy for interfaces, you can define the polling interval for every 15 minutes
or every 5 minutes or every 1 minute. According to the selected polling interval, the device data is polled and
stored in Oracle Database. The data is aggregated every 1 hour into the AHxxx table; once a day into the
ADxxx table irrespective of the polling interval is set to1/5/15 minutes.
In the Interface Health Policy tab, if the frequency is set at 5 mins, you can view 12 samples for each hour.
Every hour the data moves to the aggregated table and an average or mean interface statistics is calculated ,
and there will be one entry in the hourly aggregated table. The aggregation is the same for all the policies no
matter what the polling interval is.
You can view data retention details and the age of the data storage, the event time in milliseconds and for
each database the entity ID and the event time.View the performance data and aggregate data in the Performance
Dashlet, > Interfaces > Traffic Utilization tab.
Note Cisco recommends you do not change the retention periods for trend, device health, system health, and
performance data because the default settings are optimized to get the most helpful information from interactive
graphs.
The following table describes the information shown on the Data Retention page.
Trend Data Device-related historical information. Trend Hourly data retain period: 15 Hourly data:
Retain data is gathered as a whole and summarized (days) 1 to 31 (days)
Periods as minimums, maximums, or averages.
Daily data retain period: 90 Daily data: 7
(days) to 365 (days)
Weekly data retain period: 54 Weekly data:
(weeks) 2 to 108
(weeks)
Device SNMP-polled device data such as device Hourly data retain period: 15 Hourly data:
Health Data reachability, and utilization for CPU, (days) 1 to 31 (days)
Retain memory, and interfaces.
Daily data retain period: 90 Daily data: 7
Periods
(days) to 365 (days)
Weekly data retain period: 54 Weekly data:
(weeks) 2 to 108
(weeks)
Performance Assurance data such as traffic statistics. Short term data retain period: 7 Short term
Data Retain (days) range: 1 to 31
• Short-term data is aggregated every 5
Periods (days)
minutes. Medium term data retain period:
31 (days) Medium term
• Medium-term data is aggregated every range: 7 to
hour. Long term data retain period:
365 (days)
378 (days)
• Long-term is aggregated daily. Long term
range: 2 to
Note You can click Advanced Settings 756 (days)
to configure the Age (In days)
and Max Records of the available
attributes.
User Job Data All records for the user jobs in the completed User job data retain period: 7 2 to 365
Retain Period state. (days) (days)
System Includes most data shown on the Admin Hourly data retain period: 1 Hourly data
Health Data dashboards (days) range: 1 to 31
Retain (days)
Daily data retain period: 7
Periods
(days) Daily data
range: 7 to
Weekly data retain period: 54
365 (days)
(weeks)
Weekly data
range: 2 to
108 (weeks)
Step 1 Choose Administration > Settings > System Settings > General > Data Retention.
Step 2 Expand the Other Data Retention Criteria section.
Step 3 Expand the database table subsection for which you want to specify Age and Max Records values.
Step 4 Click on the database table listing and enter the new values as needed.
Step 5 Click Save.
periods (such as network setup) when these kinds of traps and syslogs may be numerous. You may want
to enable this option if your network is stable.
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Under Data Retention, modify the values as required.
Step 3 Click Save.
Step 1 Choose Services > Application Visibility & Control > Data Deduplication.
Step 2 Select the Enable Data Deduplication checkbox and click Apply. The Data Deduplication page displays the list of your
defined location groups.
Step 3 To automatically detect authoritative sources at all locations, click Auto-Detect. If it can identify them, Prime Infrastructure
will fill in the address of an authoritative source in the list box under the column listing sources for each of the classes
of application data.
Step 4 To specify authoritative sources for a class of application data at a specific location:
a) Click the location group name.
b) Click the drop-down list box under the class of application data for which you want to specify an authoritative source
(for example: click in the list box under “Application Response Time”).
c) From the drop-down list, select the data sources you want to specify as authoritative for that location and application
data type. Then click OK.
d) Click Save to save your selections.
Repeat this step as needed for each location and application data type for which you want to specify authoritative
data source.
Step 5 When you are finished, click Apply to save your changes.
Step 1 Choose Administration > Settings > System Settings > General > Report . The Report page appears.
Step 2 In Repository Path, specify the report repository path on the Prime Infrastructure server.
Step 3 In File Retain Period, specify the maximum number of days reports should be retained.
Step 4 Click Save.
Step 1 Choose Administration > Settings > System Settings > Inventory . The Inventory page appears.
Step 2 Select the Enable event based inventory collection check box to allow Prime Infrastructure to collect inventory when
it receives a syslog event for a device.
Step 3 Select the Enable Syslog and Traps on device check box to allow Prime Infrastructure to enable syslog and trap
notifications on newly added devices.
Note This feature is not supported on the Cisco Nexus devices.
Step 1 Choose Administration > Settings > System Settings > Inventory > Configuration.
Step 2 Select the Backup Device Configuration check box.
Related Topics
Roll Back Device Configurations on Template Deployment Failure, on page 146
Step 1 Choose Administration > Settings > System Settings > Configuration.
Step 2 Select the Rollback Configuration check box.
Step 3 Click Save.
Step 1 Choose Administration > Settings > System Settings > Configuration Archive.
Step 2 On the Basic tab, change the basic archive parameters as needed.
Note The option of masking the security content while exporting is included in the Inventory > Device Management
> Configuration Archive page. See Download Configuration Files for more information.
Step 3 To specify devices and configuration commands to exclude from archived configurations:
a) Click the Advanced tab.
b) In the Product Family list, choose the device(s) for which you want to specify configuration commands to exclude.
Use the List/Tree View dropdown, or click the > icons to drill down to individual product types and models for which
you want to specify exclude commands.
c) In the Command Exclude List, enter (separated by commas) the configuration commands you want to exclude for
the currently selected device family, type, or model.
If the device(s) you select has configuration changes and Prime Infrastructure detects that the change is one of the
specified commands in the Exclude List, Prime Infrastructure will not create an archived version of the configuration
with this change.
d) Click Save.
e) To remove a specified set of command exclusions for a device family, type or model, select the device(s) in the
Product Family list and click Reset.
Note These default purging settings are provided to ensure optimal performance. Use care when adjusting these
settings, especially if is managing a very large network (where increasing these settings may have an adverse
impact).
To change the settings, choose Administration > Settings > System Settings, then choose Alarms and
Events > Alarms and Events and modify the settings in the Alarm and Event Cleanup Options area.
Log Purging
You can adjust the purging settings for logs by choosing Administration > Settings > Logging . Logs are
saved until the reach the maximum size. At that point, a number is appended to the log file and a new log is
started. When the number of logs exceeds the maximum, the oldest log is deleted.
The following table lists the default purging values for General and SNMP logs.
Log Type Size of Logs Number of Logs To change the setting, see:
Report Purging
By default, reports are stored in a repository named /localdisk/ftp/reports and are deleted after 31 days from
that directory. Reports filters that you set from the filters page are saved in the database and are not purged.
Step 1 Choose Administration > Settings > System Settings, then choose General > Reports.
Step 2 If required, adjust the location for the reports repository on the server. The repository must reside under the FTP root
partition.
Step 3 If you want to change the default purging age, enter a new value in the File Retain Period field
Step 4 Click Save.
Backup Purging
By default, 2 backups are saved for backups in local repositories. If you are using remote repositories, there
is no automatic backup purging mechanism; you must manually delete old backups. See Change the Number
of Automatic Application Backups That Are Saved, on page 57.
Step 1 Choose Administration > Dashboards > Job Dashboard > System Jobs.
Step 2 Select the category of data collection job you want to re-schedule (e.g., APIC-EM Integration, Assurance and Health
Summary, Infrastructure, Inventory and Discovery, or Status and Wireless Monitoring).
Step 3 Click the check box next to the system job you want to re-schedule.
Step 4 Click Edit Schedule and specify the schedule you want the job to run on.
You can select the date and time the job is executed. You can choose to have the job recur on a minute, hourly, daily,
weekly, monthly or annual basis. No end time has been specified by default.
Step 1 Choose Administration > Dashboards > Job Dashboard > System Jobs.
Step 2 Select the category of data collection job you want to pause or resume (e.g., APIC-EM Integration, Assurance and
Health Summary, Infrastructure, Inventory and Discovery, or Status and Wireless Monitoring).
Step 3 Click the check box next to the system job you want.
Step 4 Click Pause Series to stop the job from executing.
If the job is already paused, click Resume Series to resume execution on the current schedule.
Step 1 Choose Administration > Dashboards > Job Dashboard > System Jobs.
Step 2 Select the category of data collection job you want to run (e.g., APIC-EM Integration, Assurance and Health Summary,
Infrastructure, Inventory and Discovery, or Status and Wireless Monitoring).
Step 3 Click the check box to select the system job you want to run immediately.
Step 4 Click Run.
Note You must increase the frequency of the Infrastructure and Inventory jobs with caution as it impacts the
performance of Prime Infrastructure over a while as these jobs are high I/O intensive operations.
APIC-EM Site Sync 6 hours Schedules synchronization of Select Edit Schedule >
sites and devices between Recurrence and select the
APIC-EM and Prime appropriate settings to schedule
Infrastructure. the job.
APIC Server Status Periodic 5 minutes Schedules checks on APIC-EM Select Edit Schedule >
server reachability. Recurrence and select the
appropriate settings to schedule
the job.
Ping Network Devices 5 minutes Schedules ICMP Ping Select Edit Schedule >
reachability and updates the Recurrence and select the
device reachability status and appropriate settings to schedule
latency time. the job.
PnP Bulk Import 5 minutes Schedules bulk import of Select Edit Schedule >
device profiles from APIC-EM Recurrence and select the
to Prime Infrastructure. appropriate settings to schedule
the job.
PnP Status Polling 5 minutes Tracks the status of the PnP Select Edit Schedule >
devices created on APIC-EM Recurrence and select the
and adds them to Prime appropriate settings to schedule
Inventory when successful. the job.
Assurance DataSource Update Disabled Synchronizes the list of data Non Editable
sources between two different
processes in PI.
Assurance License Update Disabled Fetches the devices and AP Non Editable
which netflow associated with
it every 12 hours.
Assurance Lync Aggregation Disabled Computes the Lync call Non Editable
statistics.
Infrastructure jobs
Bulk Recompute RF Prediction 15 days Schedules status polling of Select Edit Schedule >
Bulk Recompute RF Prediction. Recurrence and select the
appropriate settings to schedule
the job.
Connected Mobility Reachability 5 minutes Schedules stauts polling of Select Edit Schedule >
Status Connected Mobility Recurrence and select the
Reachability appropriate settings to schedule
the job.
Controller Configuration Backup 1 day Displays the controller Select Edit Schedule >
configuration backup activities. Recurrence and select the
appropriate settings to schedule
the job.
Data Cleanup 2 hours Schedules daily data file Select Edit Schedule >
cleanup. Recurrence and select the
appropriate settings to schedule
the job.
s
Device Config Backup-External 15 minutes Transfers device configuration Select Edit Schedule >
periodically to external Recurrence and select the
repository.You can configure appropriate settings to schedule
or create the repository using the job.
CLI commands and the
Click the edit icon, and check the
supported repositories are FTP,
Export only Latest
SSH FTP (SFTP) and Network
Configuration check box, to
File System (NFS).
transfer only the latest
configuration.
You can edit the job properties
based on the user permission set
in Role Based Access Control
(RBAC).
Guest Accounts Sync 1 day Schedules guest account polling Select Edit Schedule >
and synchronization. Recurrence and select the
appropriate settings to schedule
the job.
Index serach Entities 3 hours Schedules the Index Search Select Edit Schedule >
Entities job. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Service Backup 7 days Schedules automatic mobility Select Edit Schedule >
services backups. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Service Status 5 minutes Schedules mobility services Select Edit Schedule >
status polling. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Service Synchronization 1 hour Schedules mobility services Select Edit Schedule >
synchronization. Recurrence and select the
appropriate settings to schedule
the job.
On Demand Reports Cleanup 6 hours Schedules reports cleanup. Select Edit Schedule >
Recurrence and select the
appropriate settings to schedule
the job.
Server Backup 1 day Schedules automatic Prime Select Edit Schedule >
Infrastructure server backups. Recurrence and select the
The backups created are appropriate settings to schedule
application backups. the job.
Note We recommend that
you schedule the
Server Backup job
once per day and not
every hour.
Smart License Compliance Status Disabled Runs for Smart License for the Non Editable.
default schedule.
wIPS Alarm Sync 2 hours Schedules wIPS alarm Select Edit Schedule >
synchronization. Recurrence and select the
appropriate settings to schedule
the job.
Autonomous AP Inventory 1 day Collects inventory information Select Edit Schedule >
for autonomous APs. Recurrence and select the
appropriate settings to schedule
the job.
Switch Inventory 1 day Collects inventory information Select Edit Schedule >
for Switches. Recurrence and select the
appropriate settings to schedule
the job.
Wireless Controller Inventory 1 day Collects inventory information Select Edit Schedule >
for Wireless Controllers. Recurrence and select the
appropriate settings to schedule
the job.
Status Jobs
Appliance Status 5 minutes Schedules appliance polling. Select Edit Schedule >
This task populates the Recurrence and select the
appliance polling details from appropriate settings to schedule
the Administration > Appliance the job.
> Appliance Status page. It also
populates information like the
performance and fault checking
capabilities of the appliance.
Autonomous Client Status 5 minutes Lets you schedule status polling Select Edit Schedule >
of autonomous AP clients. Recurrence and select the
appropriate settings to schedule
the job.
Autonomous AP Operational 5 minutes Schedules status polling of Select Edit Schedule >
Status autonomous wireless access Recurrence and select the
points. appropriate settings to schedule
the job.
Controller Operational Status 5 minutes Schedules controller Select Edit Schedule >
operational status polling. Recurrence and select the
appropriate settings to schedule
the job.
Device Data Collector 30 minutes Schedules data collection based Select Edit Schedule >
on specified command-line Recurrence and select the
interface (CLI) commands at a appropriate settings to schedule
configured time interval. the job.
Identity Services Engine Status 15 minutes Schedules Identity Services Select Edit Schedule >
Engine polling. Recurrence and select the
appropriate settings to schedule
the job.
Learn Unified AP Ping Capability This Job remains suspended Schedules Unified AP Ping Non-Editable.
and runs on-demand. Capability information
collection.
License Status 4 hours Schedules the license-status Select Edit Schedule >
information collection. Recurrence and select the
appropriate settings to schedule
the job.
Lightweight AP Ethernet Interface 1 minute Schedules Lightweight AP Select Edit Schedule >
Status Ethernet Interface Status Recurrence and select the
information collection. appropriate settings to schedule
the job.
Lightweight AP Operational Status 5 minutes Schedules Lightweight AP Select Edit Schedule >
Operational Status information Recurrence and select the
collection. appropriate settings to schedule
the job.
Lightweight Client Status 5 minutes Schedules information Select Edit Schedule >
collection for Lightweight AP Recurrence and select the
Clients from Network. appropriate settings to schedule
the job.
Mobility Service Performance 15 minutes Schedules status polling of Select Edit Schedule >
mobility services performance. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Status Task 15 minutes Schedules status polling of Select Edit Schedule >
mobility services engines. Recurrence and select the
appropriate settings to schedule
the job.
OSS Server Status 5 minutes Schedules status polling of OSS Select Edit Schedule >
Servers. Recurrence and select the
appropriate settings to schedule
the job.
Redundancy Status 1 hour Schedules redundancy status Select Edit Schedule >
polling of primary and Recurrence and select the
secondary controllers. appropriate settings to schedule
the job.
Switch NMSP and Location Status 4 hours Schedules Switch Network Select Edit Schedule >
Mobility Services Protocol Recurrence and select the
(NMSP) and Civic Location appropriate settings to schedule
status polling. the job.
Switch Operational Status 5 minutes Schedules switch operational Select Edit Schedule >
status polling. Recurrence and select the
appropriate settings to schedule
the job.
Third Party Access Point 3 hours Schedules operational status Select Edit Schedule >
Operational Status polling of third party APs. Recurrence and select the
appropriate settings to schedule
the job.
Third Party Controller Operational 3 hours Schedules operational status Select Edit Schedule >
Status polling of third party Recurrence and select the
Controllers. appropriate settings to schedule
the job.
Unmanaged APs 15 minutes Collects poll information for Select Edit Schedule >
unmanaged access points. Recurrence and select the
appropriate settings to schedule
the job.
Wired Client Status 2 hours Schedules Wireless Client Select Edit Schedule >
status polling Recurrence and select the
appropriate settings to schedule
the job.
Wireless Configuration Audit 1 day Schedules Wireless Select Edit Schedule >
Configuration Agent audit Recurrence and select the
collection. appropriate settings to schedule
the job.
AP Image Pre-Download Status 15 minutes Allows you to see the Image Select Edit Schedule >
Predownload status of the Recurrence and select the
associated APs in the appropriate settings to schedule
controllers. To see the status of the job.
the access points, the
“Pre-download software to
APs” checkbox should be
selected while downloading
software to the controller.
Autonomous AP CPU and 15 minutes Schedules collection of Select Edit Schedule >
Memory Utilization information on memory and Recurrence and select the
CPU utilization of Autonomous appropriate settings to schedule
APs. the job.
Autonomous AP Tx Power and 15 minutes Schedules collection of Select Edit Schedule >
Channel Utilization information about radio Recurrence and select the
performance of Autonomous appropriate settings to schedule
APs. the job.
CCX Client Statistics 1 hour Schedules collection of the Select Edit Schedule >
Dot11 and security statistics for Recurrence and select the
CCX Version 5 and Version 6 appropriate settings to schedule
clients. the job.
CleanAir Air Quality 15 minutes Schedules collection of Select Edit Schedule >
information about CleanAir air Recurrence and select the
quality. appropriate settings to schedule
the job.
Client Statistics 15 minutes Schedules retrieval of statistical Select Edit Schedule >
information for autonomous Recurrence and select the
and lightweight clients. appropriate settings to schedule
the job.
Media Stream Clients 15 minutes Schedules collection of Select Edit Schedule >
information about media stream Recurrence and select the
clients. appropriate settings to schedule
the job.
Mesh Link Status 5 minutes Schedules collection of status Select Edit Schedule >
of mesh links. Recurrence and select the
appropriate settings to schedule
the job.
Mesh link Performance 10 minutes Schedules collection of Select Edit Schedule >
information about the Recurrence and select the
performance of mesh links. appropriate settings to schedule
the job.
Radio Voice Performance 15 minutes Schedules collection of voice Select Edit Schedule >
statistics from wireless radios. Recurrence and select the
appropriate settings to schedule
the job.
Switch CPU and Memory Poll 30 minutes Schedules polling of switch Select Edit Schedule >
CPU and memory information. Recurrence and select the
appropriate settings to schedule
the job.
Traffic Stream Metrics 8 minutes Retrieves traffic stream metrics Select Edit Schedule >
for the clients. Recurrence and select the
appropriate settings to schedule
the job.
Wireless Controller Performance 30 minutes Schedules collection of Select Edit Schedule >
performance statistics for Recurrence and select the
wireless controllers. appropriate settings to schedule
the job.
Wireless QoS Statistics 15 minutes Schedules collection of Select Edit Schedule >
information QoS Statistics for Recurrence and select the
Wireless Controllers. appropriate settings to schedule
the job.
• Contact—System.Contact
• Description—System.Description
• Location— System.Location
• Management_Address—Device.ManagementIpAddress
• Name—System.Name
• Product_Family—Device.Category
• Product_Series—Device.Series
• Product_Type—Device.Model
• Software_Type—System.OStype
• Software_Version—Image.Version
To migrate LMS data to Prime Infrastructure, follow these steps:
Step 4 Import the LMS backup into Prime Infrastructure using the following command:
admin# lms migrate repository carsapps
Step 5 Exit your CLI session, log back in to the Prime Infrastructure user interface, and verify that your LMS data was imported
properly. The following table shows where to look in Prime Infrastructure for the imported LMS data.
Static Group Inventory > Network Devices > User Defined Group
Dynamic Group Inventory > Network Devices > User Defined Group
User Defined Templates (Netconfig) Configuration > Templates > Features & Technologies
LMS Local Users Administration > Users, Roles & AAA > Users
MIBs Monitor > Monitoring Policies. In the menu, click Add, then select
Policy Types > Custom MIB Polling.
web GUI Web interface that facilitates day-to-day web GUI everyday users—Created by web GUI root user .
and administration operations using the These users have varying degrees of privileges and are classified
web GUI. These users can have varying into role-based access control (RBAC) classes and subclasses
degrees of privileges and are classified called user groups (Admin, Super Users, Config Managers, and
into role-based access control (RBAC) so forth). For information on the user groups, see Types of User
classes and subclasses. Groups, on page 165.
This interface provides a subset of web GUI root user—Created at installation and intended for
operations that are provided by the CLI first-time login to the web GUI, and for creating other user
admin and CLI config users. accounts. This account should be disabled after creating at least
one web GUI user that has Admin privileges—that is, a web
GUI user that belongs to the Admin or Super Users user group.
See Disable and Enable the Web GUI root User, on page 165.
Note The web GUI root user is not the same as the Linux
CLI root user, nor is it the same as the CLI admin
user.
.
Admin CLI Cisco proprietary shell which provides CLI Admin user—Created at installation time and used for
secure and restricted access to the system administration operations such as stopping and restarting the
(as compared with the Linux shell). This application and creating remote backup repositories. (A subset
Admin shell and CLI provide commands of these administration operations are available from the web
for advanced administration tasks. These GUI).
commands are explained throughout this
To display a list of operations this user can perform, enter ? at
guide. To use this CLI, you must have
the prompt.
CLI admin user access. You can access
this shell from a remote computer using Some tasks must be performed in config mode. To transition to
SSH. config mode, use the procedure in Transition Between the admin
CLI and config CLI, on page 163.
Config CLI Cisco proprietary shell which is restricted
and more secure than the Linux shell. This The admin CLI user can create other CLI users for a variety of
Config shell and CLI provide commands reasons, using the following command:
for system configuration tasks. These (config) username username password role {admin|user}
commands are explained throughout this password
guide. To use this CLI, you must have
admin-level user access (see the
information in the User Types column of
this table). You can access this shell from
the Admin CLI shell.
Linux CLI Linux shell which provides all Linux Linux CLI admin user—Created at installation time and used
commands. The Linux shell should only for Linux-level administration purposes.
be used by Cisco technical support
This admin user can get root-level privileges by following the
representatives. Regular system
procedure in Log In and Out as the Linux CLI root User, on page
administrators should not use the Linux
163. Tasks that require root-level permissions should only be
shell. You cannot reach this shell from a
performed by Cisco Support teams to debug product-related
remote computer using SSH; you can only
operational issues. For security purposes, the Linux CLI admin
reach it through the admin shell and CLI.
and root users should be disabled; see Disable and Enable the
Linux CLI Users in , on page 164.
To move from the config CLI back to the admin CLI, enter exit or end at the config prompt:
(config)# exit
(admin)#
By default, the Linux CLI shell prompt is the same for the Linux CLI admin and root user. You can use the whoami
command to check the current user.
Step 2 To exit:
a) Log out as the Linux CLI root user.
exit
What to do next
For security purposes, disable the Linux CLI root user. See Disable and Enable the Linux CLI Users in , on
page 164.
Enable and Disable root Access for the Linux CLI and the Web
GUI
As described in How to Transition Between the CLI User Interfaces in , on page 163, after installation, you
should disable the web GUI root user after creating at least one other web GUI user that has Admin or Super
Users privileges. See Disable and Enable the Web GUI root User, on page 165.
The Linux CLI root user is disabled after installation time. If you need to re-enable it, follow the procedure
in Disable and Enable the Linux CLI Users in , on page 164.
Step 1 Log in to as the CLI admin user. See Establish an SSH Session With the Server, on page 88.
Step 2 Disable the Linux CLI admin shell (which disables the Linux CLI admin and root users):
shell disable
Enter shell access password: passwd
shell access is disabled
Step 3 To re-enable the Linux CLI admin shell (you must run this command as the CLI admin user):
shell
Shell access password is not set
Configure password for shell access
Password: passwd
Password again: passwd
Step 1 Log into the web GUI as root, and create another web GUI user that has root privileges—that is, a web GUI user that
belongs to the Admin or Super Users user group. See Add Users and Manage User Accounts, on page 190. Once this is
done, you can disable the web GUI root account.
Step 2 Disable the web GUI root user account. (The web GUI admin account, which remains active, can perform all required
CLI functions.)
ncs webroot disable
User Groups—Web UI
provides the default web GUI user groups listed in the following table. You can assign users to multiple
groups, except for users that belong to the Monitor Lite user group (because Monitor Lite is meant for users
who should have very limited permissions).
See View and Change the Tasks a Group Can Perform, on page 188 for information on the tasks that pertain
to each user group and the default settings.
Root All operations. The group permissions are not editable. The root web UI user is available
after installation and is described in User Interfaces and User Types, on page 161. A best
practice is to create other users with Admin or Super Users privileges, and then disable
the root web UI user as described in Disable and Enable the Web GUI root User, on
page 165.
Super Users All operations (similar to root). The group permissions are editable.
Admin Administer the system and server. Can also perform monitoring and configuration
operations. The group permissions are editable.
Config Managers Configure and monitor the network (no administration tasks). The permissions assigned
to this group are editable.
System Monitoring Monitor the network (no configuration tasks). The group permissions are editable.
Help Desk Admin Only has access to the help desk and user preferences related pages. Members of this
user group cannot be members of any other user group. This is a special group which
lacks access to the user interface.
Lobby User administration for Guest users only. Members of this user group cannot be members
Ambassador of any other user group.
User–Defined 1–4 these are blank groups and can be edited and customized as needed.
Monitor Lite View network topology and use tags. The group permissions are not editable. Members
of this user group cannot be members of any other user group.
User Assistant Local Net user administration only. Members of this user group cannot be members of
any other user group.
User Groups—NBI
provides the default NBI user groups listed in the following table. The permissions in these groups are not
editable.
See View and Change the Tasks a Group Can Perform, on page 188 for information on the tasks that pertain
to each user group and the default settings.
NBI Credential
(Deprecated)
NBI Read
NBI Write
Note If you want to check the devices a user can access, see Assign Virtual Domains to Users, on page 207.
Step 1 Choose Administration > Users > Users, Roles & AAA and locate the user name.
Step 2 Locate the user name and check the Member of column to find out which user groups the user belongs to.
Step 3 Click a user group hyperlink. The Group Detail window lists the tasks that group members can and cannot perform.
• A checked check box means group members have permission to perform that task. If a checked box is greyed-out,
it means you cannot disable the task. For example, does not allow you to remove the "View tags" task for the Monitor
Lite user group because it is an integral task for that user group.
• A blank check box means group members cannot perform that task. If a blank check box is greyed out, it means you
cannot enable the task for the user group.
The web GUI root and Monitor Lite groups, and the NBI groups, are not editable.
• Change permissions for all user group members. See View and Change the Tasks a Group Can Perform, on page
188.
• Add the user to a different user group. The predefined user groups are described in User Groups—Web UI, on page
166 and User Groups—NBI, on page 166. Those topics also describe any group restrictions; for example, if a user
belongs to the predefined Monitor Lite user group, the user cannot belong to any other groups.
• Remove the user from this group. See View and Change the Groups a User Belongs To, on page 168.
• Use a customized user group and add the user to that group. To find out which customized groups already exist, see
View and Change the Tasks a Group Can Perform, on page 188. To create a new customized group, see Create a
Customized User Group, on page 186.
Step 1 Choose > Administration > Users, Roles & AAA Users, then choose Users.
Step 2 In the User Name, column, locate and click the user name hyperlink to open the User Details window. All user groups
are listed under the General tab.
• A checked check box means the user belongs to that group. If a checked box is greyed-out, it means you cannot
remove the user from that group. For example, will not allow you to remove the user named root from the root user
group.
• A blank check box means the user does not belong to that group. If a blank check box is greyed-out, it means you
cannot add the user to that group.
(To check the tasks that a group can perform, choose User Groups from the left sidebar menu and click a group name.)
Step 3 To change the groups the user belongs to, select and unselect the appropriate groups in the User Details window, then
click Save.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose User Groups.
The User Groups page lists all existing user groups and a short list of their members. For a description of these groups,
see Types of User Groups, on page 165.
Step 2 To view all members of a group, click a group hyperlink to open the Group Details window, then click the Members
tab.
Step 3 If you want to make changes to these groups, see:
• View and Change the Tasks a Group Can Perform, on page 188
• View and Change the Groups a User Belongs To, on page 168
APIC-EM Controller Apic Controller Read Access Allows user to read APIC-EM
controller details.
Apic Global PnP Read Access Allows user to read the Apic
Global PnP/Ztd settings.
Apic Global PnP Write Access Allows user to create or update the
Apic Global PnP/Ztd settings.
Active Sessions Force Logout Access Allows user to force logout other
user active sessions.
Data Migration
Alerts and Events Ack and Unack Alerts Allows user to acknowledge or
unacknowledge existing alarms.
Configuration Archive Configuration Archive Read-Only Task Allows user to view the archived
configurations and schedule
configuration archive collection
jobs.
Groups Management Add Group Members Allows user to add an entity, such
as a device or port, to groups.
Device Config Backup Job Edit Access Allows user to change the external
backup settings such as repository
and file encrytion password.
Mobility Services Mobility Service Management Allows user to edit properties and
parameters, view session and Trap
destinations,manage user and group
accoounts,and monitor status
information for mobility services
engine.
Network Configuration Add Device Access Allows user to add devices to Prime
Infrastructure.
Compliance Audit Profile Edit Access Allows user to create, modify and
delete compliance profiles view
and schedule export compliance
audit job or report view and
download violations summary.
WIPS Service
Network Monitoring Ack and Unack Security Index Issues Allows users to Acknowledge or
Unacknowledge Security Index
Violations.
Operations Center Tasks Administrative privileges under Manage Allows for administrative tasks
and Monitor Servers page such as Add/Delete/Edit/Activate
and deactivate of servers under
M&M page.
Allow report/dashlet use for users with Enable this option for users with
only NBI Read access NBI Read access so they can
generate reports and populate all
dashlets.
Manage and Monitor Servers Page Access Allows access to the Manage &
Monitor Servers Page.
Plug n Play Configuration PnP Deploy History Read Access Allows user to read provisioned
devices status.
PnP Deploy History Read-Write Access Allows user to read and delete
operations on provisioned devices.
PnP Preferences Read Access Allows user to view Plug and Play
preferences.
PnP Preferences Read-Write Access Allows user to edit Plug and Play
preferences.
PnP Profile Deploy Read Access Allows user to view Plug and Play
provisioning profiles.
PnP Profile Deploy Read-Write Access Allow user to create, modify, and
delete Plug and Play provisioning
profiles.
PnP Profile Read Access Allow user to view Plug and Play
profiles.
Product Usage Product Feedback Allows the user to access the Help
Us Improve page.
Network Summary Reports Read Only Allows user to view all Summary
reports.
Raw NetFlow Reports Read Only Allows user to view Raw NetFlow
reports.
Saved Reports List Read Only Allows user to view saved reports.
Software Image Add Software Image Management Servers Allows user to add software
Management imagemanagement servers.
Software Image Info Update Allows the user to edit and save
image properties such as minimum
RAM, minimum FLASH and
minimum boot ROM version.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose User Groups.
Step 2 Locate a User Defined group that has no members, then click its group name hyperlink.
Step 3 Customize the group permissions by checking and unchecking tasks in the Group Detail window. If a task is greyed-out,
it means you cannot adjust its setting. You cannot change the group name.
Step 4 Click Save to save your group settings.
Step 5 Add members to your group by editing the relevant user accounts and adding the user to your new group. See Add and
Delete Users, on page 192 for information on adjusting user accounts.
Note You cannot add AAA user or remote user with wireless persona.
Note The following user groups do not support the wireless persona-based menu:
1. Root
2. Lobby Ambassador
3. Lobby Ambassador + NBI Credential
4. Lobby Ambassador + NBI Read
5. Lobby Ambassador + NBI Write
6. Lobby Ambassador + (NBI Credential + NBI Read)
7. Lobby Ambassador + (NBI Read + NBI Write)
8. Lobby Ambassador + (NBI Credential + NBI Write)
9. Lobby Ambassador + (NBI Credential + NBI Read +NBI Write)
10. Help Desk Admin
11. Help Desk Admin + NBI Credential
12. Help Desk Admin + NBI Read
13. Help Desk Admin + NBI Writer
14. Help Desk Admin + (NBI Credential + NBI Read)
15. Help Desk Admin + (NBI Read + NBI Write)
16. Help Desk Admin + (NBI Credential + NBI Write)
17. Help Desk Admin + (NBI Credential + NBI Read +NBI Write)
18. mDNS Policy Admin
Note If you want to change device access, see Assign Virtual Domains to Users, on page 207.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose User Groups.
The User Groups page lists all existing user groups.
Step 2 Click a user group hyperlink. The Group Detail window lists the group permissions.
• A checked task means group members have permission to perform that task. If a checked box is greyed-out, it means
you cannot disable the task.
• A blank check box means group members cannot perform that task. If a blank check box is greyed out, it means you
cannot enable the task for the user group.
The web GUI root and Monitor Lite groups, and the NBI groups, are not editable.
Step 3 If you want to change the group permissions—which will affect all group members—check and uncheck tasks, then click
Save.
Export the User Group and Role Attributes for RADIUS and TACACS+
If you are using RADIUS or TACACS+, you must copy all user group and role information into your
Cisco Access Control Server (ACS) or Cisco Identity Services Engine (ISE) server. You can do this using
the Task List dialog box provided in the web GUI. If you do not export the data into your Cisco ACS or
Cisco ISE server, will not allow users to perform their assigned tasks.
The following information must be exported:
• TACACS+—Requires virtual domain and role information (tasks are automatically added).
• RADIUS—Requires virtual domain and role information (tasks are automatically added).
Information in the Task List dialog is preformatted for use with the Cisco ACS server.
Note When you add tasks to the external server, be sure to add the Home Menu Access task. It is mandatory for
all users.
Step 1 In :
a) Choose Administration > Users > User Groups.
b) From the User Groups table, copy the role for each user group by clicking the Task List hyperlink (at the end of a
user group row).
• If you are using RADIUS, right-click the role0 line in the RADIUS Custom Attributes field and choose Copy.
• If you are using TACACS+, right-click the role0 line in the TACACS+ Custom Attributes field and choose
Copy.
Step 2 Paste the information into your Cisco ACS or Cisco ISE server. These steps show how to add the information to an
existing user group in Cisco ACS. If you have not yet added this information to Cisco ACS or Cisco ISE, see:
• Use Cisco ACS With RADIUS or TACACS+ for External Authentication
• Use Cisco ISE With RADIUS or TACACS+ for External Authentication , on page 213
Related Topics
Control the Tasks Web Interface Users Can Perform (User Groups), on page 165
View and Change the Tasks a Group Can Perform, on page 188
You should not use the web GUI root account for normal operations. For security purposes, create a new web
GUI user with Administrator privileges (and access to all devices), and then disable the web GUI root account.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose Users.
Step 2 Enter the username in the Username text box.
Step 3 Enter a password. The new password must satisfy the conditions specified in the password policy. Click the ? icon to
view the password policy.
(Optional) Click the Generate New Password button to set a secured system-generated password. On clicking this button,
a new password will be displayed in the adjacent text box. The same is also displayed in the New Password and Confirm
Password text boxes. Click the eye icon in the text box to view or hide the password. You can also copy the password
to clipboard by clicking the Copy button.
Click the Reset button to clear the values in the text box.
Step 4 (Optional) Enter the First Name, Last Name, and Description for the user.
Step 5 Enter the email address in the Email Address text box.
Step 6 In the General tab under Groups Assigned to This User, click Admin.
Step 7 Click the Virtual Domains tab to specify which devices the user can access. You should have at least one Admin web
GUI user that has access to all devices (ROOT-DOMAIN). For more information on virtual domains, see Create Virtual
Domains to Control User Access to Devices, on page 202.
Note If you select a parent virtual domain the child (subordinate) virtual domains under it will also get selected.
What to do next
If you have not done so already, for security purposes, disable the web GUI root account as described in
Disable and Enable the Web GUI root User, on page 165.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose Users.
Step 2 Click Add User.
Step 3 Configure the user account.
a) Enter a username and password.
b) Enter the first name, last name, and a description for the user.
c) Control the actions the user can perform by selecting one or more user groups. For descriptions of user groups, see
View User Groups and Their Members, on page 168.
d) Control the devices a user can access by clicking the Virtual Domains tab and assigning domains to the user. (see
Create Virtual Domains to Control User Access to Devices, on page 202).
Step 4 Click Save.
Step 5 To delete user accounts, select a users,
Step 1 Choose Administration > Users > Users, Roles & AAA, then click Users.
Step 2 Select the user whose access you want to disable or enable.
Step 3 Click Lock User(s) (or Unlock User(s)).
Step 1 Choose Administration > Users > Users, Roles & AAA, then click Users.
Step 2 Click the username hyperlink.
Step 3 Enter the new password in the password fields, then click Save.
Both of these options impose restrictions on the latitude lobby ambassadors have to manage these temporary
guest accounts. For details on using lobby ambassador accounts, see "Using Lobby Ambassadors to Manage
Guest User Accounts" in Related Topics.
Related Topics
Use Lobby Ambassadors to Manage Guest User Accounts, on page 193
Control the Tasks Web Interface Users Can Perform (User Groups), on page 165
Create Virtual Domains to Control User Access to Devices, on page 202
Prime Infrastructure permits both wired and wireless guest user access. Wired guest access enables guest users
to connect to the guest access network from a wired Ethernet connection designated and configured for guest
access. Wired guest access ports may be available via a guest office or through specific ports in a conference
room. Like wireless guest user accounts, wired guest access ports are added to the network using the lobby
ambassador feature.
The lobby ambassador can create the following types of guest user accounts:
• A guest user account with a limited lifetime. After the specified time period, the guest user account
automatically expires.
• A guest user account with an unlimited lifetime. This account never expires.
• A guest user account that is activated at a predefined time in the future. The lobby ambassador defines
the beginning and end of the valid time period.
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Save Guest Accounts on a Device, on page 197
Edit Guest User Credentials, on page 197
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Save Guest Accounts on a Device, on page 197
Edit Guest User Credentials, on page 197
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Save Guest Accounts on a Device, on page 197
Edit Guest User Credentials, on page 197
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Save Guest Accounts on a Device, on page 197
Edit Guest User Credentials, on page 197
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Save Guest Accounts on a Device, on page 197
Edit Guest User Credentials, on page 197
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Save Guest Accounts on a Device, on page 197
Edit Guest User Credentials, on page 197
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Edit Guest User Credentials, on page 197
Related Topics
Manage Guest User Accounts: Workflows, on page 194
Save Guest Accounts on a Device, on page 197
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose Active Sessions. lists all users that are currently
logged in to the server, including their client machine IP address. If the user performed any actions on managed devices
(for example, the user added new devices to ), the device IP addresses are listed in the Device IP Address column.
Step 2 To view a historical list of all actions performed by this user, click the Audit Trail icon that corresponds to the user name.
Step 1 Choose Administration > Users > Users, Roles & AAA.
Step 2 To view the tasks performed by a specific user:
a. Choose Users.
b. Locate the user name, then click the Audit Trail icon corresponding to that user.
Step 3 To view a historical list of the tasks performed by all members of a user group:
a. Choose User Groups.
b. Locate the user group name, then click the Audit Trail icon corresponding to that group.
Step 1 Choose Administration > Settings > System Settings, then choose General > Job Approval.
Step 2 Check the Enable Job Approval check box.
Step 3 Find the jobs you want to configure for approval, and move them from the left field to the right field.
Step 4 Click Save.
Step 1 Select Administration > Settings > System Settings, then choose Mail and Notification > Job Notification Mail.
Step 2 Check the Enable Job Notification Mail check box to enable notifications.
Step 3 Enter the email addresses in the To text box. By default, the email address configured in the Mail Server Configuration
settings or the pre-configured email addresses appear in the To text box. You can configure an email server by performing
the steps explained in Configure Email Server Settings , on page 377
Step 4 Enter the subject of the job notification mail in the Subject text box. The subject is automatically appended by the job
name.
Step 5 Select the Job Status. You can select either Success, Partial Success, or Failure status options or both the options and
provide the recipient address.
Note Select the desired job type and click the checkbox under Job Success/Job Partial and/or Job Failure. The job
notification mails are triggered for the selected job status option(s).
Step 6 Select the Compliance Audit Job and Compliance Fix Job check boxes. The job notification mails are triggered for
the selected jobs.
Step 7 Click Save. The job notification mail is triggered only for the job status that you select and is sent only after the job
completion. You will not receive a job notification mail if the file size exceeds the size specified in the configured mail
server.
Note You must select the Change password on the first login check box to prompt the new users to change the
default password on their initial login to . De-selecting this check box will launch the Home Dashboard page
on logging in.
By default, client sessions are disabled and users are automatically logged out after 15 minutes of inactivity.
This is a global setting that applies to all users. For security purposes, you should not disable this mechanism,
but you can adjust the timeout value using the following procedure. To disable/change the timeout for an idle
user, see Disable Idle User Timeout, on page 201
Step 1 Choose Administration > Settings > System Settings, then choose General > Server.
Step 2 In the Global Idle Timeout area, make sure the Logout all idle users check box is selected (this means the mechanism
is enabled).
Step 3 Configure the timeout by choosing a value from the Logout all idle users after drop-down list.
Step 4 Click Save. You will need to log out and log back in for this change to take effect.
Note The Global Idle Timeout setting overrides the User Idle Timeout setting. To configure Global Idle Timeout
settings, see CiscoPrime Infrastructure Administrator Guide.
Irrespective of the customer disabling the "Logout all idle users" in system settings and / Or disabling the
"Logout idle user" in the Root user my preference setting, the session will ultimately be timed out once the
web-server's session time out is reached. This is essentially to maintain the security posture. For more guidelines
on increasing/decreasing the session time out, see https://owasp.org/www-community/Session_Timeout
Note Session will be timed out only if it is inactive whereas active user sessions are not timed
Step 1 Choose Administration > Settings > System Settings, then choose General > Server.
Step 2 In the Global Idle Timeout area, uncheck the Logout all idle users check box and click Save.
Step 3 Click at the top right of web GUI window and choose My Preferences.
Step 4 In the User Idle Timeout area, uncheck the Logout idle user check box and click Save.
If you need to change the idle timeout value, then select Logout idle user check box and from the Logout idle user after
drop-down list, choose one of the idle timeout limits. (But this cannot exceed the value set in the Global Idle Timeout
settings.)
Step 5 Click Save. You will need to log out and log back in for this change to take effect.
Step 1 Choose Administration > Settings > System Settings > General > Server.
Step 2 To set the maximum sessions per user, enter the value in the Max Sessions text box. You can enter any value from 1 to
50 and the default value is 5.
Step 3 When you are finished, click Save.
Step 4 Restart the server to apply the changes.
Note The session limit is applicable only for Local, RADIUS, and TACACS+ servers. The session limit is not
applicable for HA and SSO modes.
Because network elements are managed hierarchically, user views of devices—as well as some associated
features and components—are affected by the user's virtual domain. The following topics describe the effects
of virtual domains on these features.
• Reports and Virtual Domains, on page 203
• Search and Virtual Domains, on page 203
• Alarms and Virtual Domains, on page 203
• Maps and Virtual Domains, on page 203
• Configuration Templates and Virtual Domains, on page 203
• Config Groups and Virtual Domains, on page 204
• Email Notifications and Virtual Domains, on page 204
Note For alarm email notifications, only the ROOT-DOMAIN virtual domain can enable Location Notifications,
Location Servers, and email notifications.
Note If you create a child domain and then apply a configuration template to both network elements in the virtual
domain, might incorrectly reflect the number of partitions to which the template was applied.
(etc.)
What to do next
Add devices to the virtual domain as described in Add Network Devices to Virtual Domains, on page 206.
Step 4 (Optional) Enter the new domain's time zone, email address and description.
Step 5 Click Submit and confirm the creation of the new child domain. To revert back to the hierarchical view, click the view
toggle button at the top of the navigation pane.
What to do next
Add devices to the virtual domain as described in Add Network Devices to Virtual Domains, on page 206.
What to do next
Add devices to the virtual domains as explained in Add Network Devices to Virtual Domains, on page 206.
Step 2 From the Virtual Domains sidebar menu, click the virtual domain to which you want to add network devices.
Step 3 Click Submit to view the summary of the virtual domain contents.
Step 4 Click Save to confirm your changes.
What to do next
Give users access to the virtual domain as described in Assign Virtual Domains to Users, on page 207.
Step 5 The Add Group window lists only those groups that are applicable to you, which can be added to the virtual domains.
Select the required group check box under All Locations, and click Select to add the devices to the Selected Groups table.
Note If the selected group is a parent group, all of its child groups gets automatically added to the virtual domain.
Note When using external AAA, be sure to add the custom attributes for virtual domains to the appropriate user or
group configuration on the external AAA server. See Use Virtual Domains with RADIUS and TACACS+,
on page 209.
Step 1 Choose Administration > Users > Users, Roles & AAA > Users.
Step 2 Select the user to whom you want to grant device access.
Step 3 Click the Virtual Domains tab.
Step 4 Use the Add and Remove buttons to make your assignment changes, then click Save.
Export the Prime Infrastructure Virtual Domain Attributes for RADIUS and TACACS+
If you are using RADIUS or TACACS+, you must copy all Prime Infrastructure virtual domain information
into your Cisco ACS or Cisco ISE server. You can do this using the Prime Infrastructure Virtual Domains
Custom Attributes dialog box provided in the web GUI. If you do not export the data into your Cisco ACS
or Cisco ISE server, Prime Infrastructure will not allow users to log in.
The following information must be exported, depending on the protocol you are using:
• TACACS+—Requires virtual domain, role, and task information.
• RADIUS—Requires virtual domain and role information (tasks are automatically added).
When you create a child domain for an existing virtual domain, the sequence numbers for the
RADIUS/TACACS+ custom attributes are also updated in the parent virtual domain. These sequence numbers
are for representation only and do not impact AAA integration.
Information in the Virtual Domains Custom Attributes dialog is preformatted for use with Cisco ACS server.
Note When you add tasks to the external server, be sure to add the Home Menu Access task. It is mandatory for
all users.
Step 2 Paste the information into your Cisco ACS or Cisco ISE server. If you have not yet added this information to Cisco ACS
or Cisco ISE, see:
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose RADIUS Servers.
Step 2 Select the type of server you want to add.
• For RADIUS, choose RADIUS Servers > click Add RADIUS Server.
• For TACACS+, choose TACACS+ Servers > click Add TACACS+ Server.
Note You can use Move Up and Move Down arrow to reorder the available IP address.
Step 3 Enter the required information—IP address, DNS Name, and so forth. For Prime Infrastructure to communicate with the
external authentication server, the shared secret you enter on this page must match the shared secret configured on the
RADIUS or TACACS+ server. You can use alphabets, numbers, and special characters except ‘ (single quote) and “
(double quote) while entering the shared secret key for a third-party TACACS+ or RADIUS server.
Step 4 Select the authentication type.
• PAP—Password-based authentication is the protocol where two entities share a password in advance and use the
password as the basis of authentication.
• CHAP—Challenge-Handshake Authentication Protocol requires that both the client and server know the plain text
of the secret, although it is never sent over the network. CHAP provides greater security than Password Authentication
Protocol (PAP).
Step 5 If you have enabled the High Availability feature and configured a virtual IP address for the Local Interface IP, choose
either the virtual IP address or the physical IP address of the primary server. See Cisco Prime Infrastructure Quick Start
Guide.
Note The IP address configured in the external authentication server must match the Local Interface IP.
Step 6 Click Test to check the connectivity of the AAA server. The connectivity test will pass only if the port, authentication
type and shared key you have entered matches with the TACACS or RADIUS server.
Note Only server reachability is tested for RADIUS server.
Note To delete any of the servers added, select the server(s) to be deleted from the list and click:
• Delete RADIUS Server, to delete Radius server.
• Delete TACACS Sever, to delete TACACS server.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose AAA Mode.
Step 2 Select TACACS+ or RADIUS.
Step 3 Check the Enable Fallback to Local check box to enable the use of the local database when the external AAA server is
down.
Step 4 If you want to revert to local authentication if the external RADIUS or TACACS+ server goes down, perform the following
steps:
a) Select Enable Fallback to Local. I
Step 5 Click Save.
Tasks to be completed to use Cisco ISE for external authentication For information, see:
Make sure you are using a supported version of Cisco ISE Supported Versions of Cisco ISE
in , on page 213
Create a user group in Cisco ISE Create a User Group in Cisco ISE,
on page 214
Create a user in Cisco ISE and add the user to the user group that is Create a User and Add the User to
created in Cisco ISE a User Group in Cisco ISE, on page
214
(If using RADIUS) Create an authorization profile for network access Create an Authorization Profile for
in Cisco ISE, and add the RADIUS custom attributes with user roles RADIUS in Cisco ISE, on page 214
and virtual domains created in
Note For RADIUS, you do not need to add the attributes for user
tasks. They are automatically added based on the user roles.
Create an authorization policy in Cisco ISE and associate the policy Configure an Authorization Policy
with the user groups and authorization profile created in Cisco ISE in Cisco ISE, on page 216
Create an authentication policy to define the protocols that Cisco ISE Create an Authentication Policy in
must use to communicate with , and the identity sources that it uses for Cisco ISE, on page 217
authenticating users to
Configure the RADIUS or TACACS+ mode on the server Configure RADIUS or TACACS+
Mode on the Server, on page 212
Create a User and Add the User to a User Group in Cisco ISE
Note For RADIUS, you can add the user role attributes without adding the task attributes. The tasks are automatically
added with the user roles.
For more information about Cisco ISE authorization profiles, see the information on managing authorization
policies and profiles in the Cisco Identity Services Engine Administrator Guide.
To create an authorization profile for RADIUS in Cisco ISE:
Note If you do add user tasks, be sure to add the Home Menu Access task. It is mandatory.
Note • For TACACS+, you need not add the attributes for user tasks. They are automatically added based on
the user roles.
• In Release 8.5.135.0, the creation of Authorization server is deprecated. To create an Authorization
server, you must create an Authentication server and duplicate it as an Authorization server. Due to this
change in functionality, an alarm is generated in Cisco Prime Infrastructure 3.2 as follows:
1.Successfully created Authentication server. 2.Failed to create
authorization server:SNMP operation to Device failed: Set Operation
not allowed for TACACS authorization server.1.Successfully created
Accounting server.
The workaround on Cisco Prime Infrastructure is to uncheck the Authorization server on the template.
For more information, see CSCvm01415.
For more information about Cisco ISE authorization profiles, see the information on managing authorization
policies and profiles in the Cisco Identity Services Engine Administrator Guide.
To create an authorization profile for TACACS+ in Cisco ISE:
For more information about authorization policies, see the “Manage Authorization Policies and Profiles”
chapter in the Cisco Identity Services Engine Administrator Guide.
To create an authorization policy in Cisco ISE:
• Rule-based authentication policy - In this policy, you can define conditions that allow Cisco ISE to
dynamically choose the allowed protocols and identity sources.
For more information about authentication policies, see the "Manage Authentication Policies" chapter in the
Cisco Identity Services Engine Administrator Guide.
To create an authentication policy in Cisco ISE:
Step 1 Log in to Cisco ISE as the Super Admin or System Admin user.
Step 2 Choose Policy > Authentication.
Step 3 Choose the Policy Type as Simple or Rule-Based to create the required authentication policy.
Step 4 Enter the required details based on the policy type selected.
Step 5 Click Save.
Tasks to be completed to use Cisco ACS for external authentication For information, see:
Make sure you are using a supported version of Cisco ACS Supported Versions of Cisco ACS
in
Add Prime Infrastructure as an AAA client in Cisco ACS Add as a Client in Cisco ACS
Create a user group in Cisco ACS Create a User Group in Cisco ACS
Create a user in Cisco ACS and add the user to the Cisco ACS user Create a User and Add the User to
group a User Group in Cisco ACS
(If using RADIUS) Create an authorization profile for network access Create an Authorization Profile for
in Cisco ACS, and add the RADIUS custom attributes for user roles and RADIUS in Cisco ACS
virtual domains created in Prime Infrastructure.
Note For RADIUS, you do not need to add the attributes for user
tasks. They are automatically added based on the user roles.
(If using TACACS+) Create an authorization profile for device Create an Authorization Profile for
administration in Cisco ACS, and add the TACACS+ custom attributes TACACS+ in Cisco ACS
with user roles and virtual domains created in Prime Infrastructure.
Note For TACACS+, you need not add the attributes for user tasks.
They are automatically added based on the user roles.
Create an access service in Cisco ACS and define a policy structure for Create an Access Service for in
the access service. Cisco ACS
Create an authorization policy rule in Cisco ACS, and map the Create an Authorization Policy
authorization or shell profile based on the access type (network access Rule in Cisco ACS
or device administration).
Configure a service selection policy in Cisco ACS and assign an access Configure a Service Selection
service to an incoming request. Policy in Cisco ACS
Configure the RADIUS or TACACS+ mode on the Prime Infrastructure Configure RADIUS or TACACS+
server. Mode on the Server
Create a User and Add the User to a User Group in Cisco ACS
Step 2 From the left sidebar, Choose Users and Identity Stores > Internal Identity Stores > Users.
Step 3 In the Internal Users page, click Create.
Step 4 Enter the required details.
Step 5 In the Identity Group field, click Select to choose a user group to assign the user to.
Step 6 Click Submit.
Note For RADIUS, you can add the user role attributes without adding the task attributes. The tasks are automatically
added with the user roles.
For more information about Cisco ACS authorization profiles and policies, see chapters on managing policy
elements and access policies in the User Guide for Cisco Secure Access Control System.
To create an authorization profile for RADIUS in Cisco ACS:
Note For TACACS+, you need not add the attributes for user tasks. They are automatically added based on the user
roles.
For more information about Cisco ACS authorization profiles and policies, see chapters on managing policy
elements and access policies in the User Guide for Cisco Secure Access Control System.
To create an authorization profile for TACACS+ in Cisco ACS:
Note You must create access services before you define service selection rules, although you do not need to define
the policies in the services.
Step 6 If you are creating an authorization policy rule for network access (RADIUS), choose the required authorization profile(s)
to map to the authorization policy rule.
Alternatively, if you are creating an authorization policy rule for device administration (TACACS+), choose the required
shell profile(s) to map to the authorization policy rule.
Note If you are using multiple authorization profiles or shell profiles, make sure you order them in priority.
• Rule-based service selection policy—Contains one or more conditions and a result, which is the access
service that will be applied to an incoming request.
To configure a service selection policy:
Step 4 Enter the name of the rule and then choose the rule status.
Step 5 Choose either RADIUS or TACACS+ as the protocol for the service selection policy.
Step 6 Configure the required compound condition, and then choose an access service to apply to an incoming request.
Step 7 Click OK, and then click Save Changes.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose SSO Servers.
Step 2 Click Add SSO Servers.
Step 3 Enter the SSO information.
The maximum number of server retries for an SSO server authentication request is 3.
Note If you are using this procedure to configure SSO but are using local authentication, choose Local in Step 2.
Step 1 Choose Administration > Users > Users, Roles & AAA > SSO Server Settings.
Step 2 Select the SSO Server AAA Mode you want to use. The options are: Local, RADIUS, or TACACS+.
Step 3 Click Save.
UserRolesandAccessPermissionsforConfiguringAlarmNotificationSettings
This table describes the user roles and access permissions for configuring notification destination and creating
customized notification policies.
Note Ensure that you enable the following Task Permissions for any user roles to view, create, and edit notification
destination and notification policy:
• Notification Policies Read-Write Access under Alerts and Events
• Virtual Domains List (under Reports)
For more information, see View and Change the Tasks a User Can Perform, on page 167.
Root user with root domain View, create, delete and edit notification destination
and notification policy.
Root user with non-root domain View notification destination and notification policy.
Admin user with root domain View, create, delete and edit notification destination
and notification policy.
Super user with root domain View, create, delete and edit notification destination
and alarm notification policy.
System monitoring user with root domain View notification destination and notification policy.
Config manager with root domain View notification destination and notification policy.
Admin user with non-root domain View notification destination and notification policy
created under their respective virtual domain.
Super user with non-root domain View notification destination and notification policy
created under their respective virtual domain.
System monitoring user with non-root domain View notification destination and notification policy
created under their respective virtual domain.
Config manager with non-root domain View notification destination and notification policy
created under their respective virtual domain.
Step 1 Choose Administration > Settings > System Settings > Mail and Notification > Notification Destination.
Step 2 Click the Add icon to create a new notification destination.
Step 3 To configure Email Destination, do the following:
a) From the Select Contact Type drop-down list, choose Email.
b) Enter the Contact Name in the text box.
c) Enter a valid email ID in the Email To text box.
The email is sent to the email ID entered in the Email To field.
d) Enter the Contact Full Name.
e) Choose the virtual domain from the Virtual Domain drop-down list.
f) Enter the Telephone Number, Mobile Number, and Postal Address.
g) Click Save.
Step 4 To configure a Northbound trap receiver using IP Address, do the following:
a) From the Select Contact Type, choose Northbound Trap Receiver.
b) Select the IP Address radio button and enter the IP Address and Server Name.
c) Choose the required Receiver Type and Notification Type.
d) Enter the Port Number, and choose the SNMP Version.
e) If you choose the SNMP Version as v2c, enter the Community settings as required.
f) If you choose the SNMP Version as v3, enter the Username, Mode, Auth.Type, Auth.Password, Confirm
Auth.Password, Privacy Type, Privacy Password and Confirm Privacy Password.
g) Click Save.
Step 5 To configure a Northbound trap receiver using DNS, do the following:
a) From the Select Contact Type, choose Northbound Trap Receiver.
b) Select the DNS radio button and enter the DNS Name.
c) Choose the required Receiver Type and Notification Type.
d) Enter the Port Number, and choose the SNMP Version.
e) If you choose the SNMP Version as v2c, enter the Community settings as required.
f) If you choose the SNMP Version as v3, enter the Username, Mode, Auth.Type, Auth.Password, Confirm
Auth.Password, Privacy Type, Privacy Password and Confirm Privacy Password.
g) Click Save.
Note • If you choose the Receiver Type as Guest Access, will not forward the alarms to the Northbound trap
receiver using the notification policy. The Guest Access receiver receives only guest-client related events.
The notification policy uses only Northbound trap receivers. Make sure that you use the same Engine
ID and same auth and priv passwords when configuring the external SNMPv3 trap receiver.
• While updating the Notification Destination Trap Receiver, the operational status shows the previous
Trap Receiver status until the status is updated by the next polling.
• You can also navigate to Notification Policies page by choosing Monitor > Monitoring Tools >
Notification Policies .
• If recipient email id is configured in multiple Notification policies, alarm will be forwarded only once
to the email id, when condition matches.
• You will not be allowed to delete Notification Destinations which are associated with Notification Policies.
Step 1 Choose Administration > Settings > System Settings > Alarms and Events> Notification Policies . To add a new
alarm notification policy, do the following:
a) Click the Add icon and choose the required virtual domain in the Select a Virtual Domain pop-up window.
Cisco Prime Infrastructure matches the alarms that are received from devices from a virtual domain against the
notification policies for the same virtual domain. The system category alarms generated by Prime Infrastructure can
be matched against all the alarm notification policies.
Note For a non-root domain, the alarms from a device will be forwarded only if the device or device group(s)
containing the device was added or selected under Network Devices tab in virtual domain page.
b) Click OK.
The Notification Policies wizard appears.
c) Choose the severity, category, and event condition for which the notifications must be triggered. By default all the
severity types, categories, and conditions are selected.
d) Click Next and choose the device groups for which you want the alarm notifications to be triggered.
The alarm notifications are triggered only for the device groups that you select.
For instance, if you select the User Defined device group type, then the alarm notification is triggered for all the
configured user defined device groups. Similarly, if you select both the User Defined and Locations device group
types, then the alarm notifications are triggered for all the configured user defined and location device groups.
Select the desired device group type to abstain from receiving insignificant alarm notifications from other device
groups.
If you choose only system category alarms in the previous step, a message "Device Groups are not applicable when
only 'System' based alarms are selected" is displayed under the Device Group tab. However, if you choose a non-system
category alarm, you must select at least one device group.
e) Click Next and choose the required destination in the Notification Destination page.
If you choose root-domain in Step 1-a, all the Email and Northbound trap receiver destinations created in Prime
Infrastructure will be listed in the Notification Destination page. If you choose, non-root domain, the Email destinations
created under that particular domain will be listed in the Notification Destination page. See Configure Alarms
Notification Destination, on page 229
f) Alternately, choose the Email or Northbound Trap Receiver option from the Add icon drop-down list and complete
the required fields.
g) Choose the notification destination and click Change Duration.
h) Choose the From and To timings in the Set Duration pop-up window and click OK.
The alarms generated in the specified duration alone are sent to the notification destination.
i) Click Next and enter the Name and Description for the alarm notification policy in the Summary page.
j) Click Save.
Note "Interface" is a reserved word and hence don't use it as the name for Alarm Notification Policy.
Note Notifications will not be sent to email recipient for North Bound trap receiver, if you change the severity of
an alarm type from Monitor > Monitoring Tools > Alarm Policies.
Related Topics
Configure Alarms Notification Destination, on page 229
Convert Old Email and Trap Notification Data to New Alarm Notification Policy
The email and trap notification data created in previous releases is converted in to new alarm notification
policies while upgrading or migrating from previous release to the latest version.
The migrated alarm notification policies can be viewed in the Alarms and Events Notification Policies pages.
The following Alarm categories are supported in :
• Change Audit
• Generic
• System
• Application Performance
• Compute Servers
• Nexus VPC switch
• Switches and Routers
• AP
• Adhoc Rogue
• Clients
• Context Aware Notifications
• Controller
• Coverage Hole
• Mesh Links
• Mobility Service
• Performance
• RRM
• Rogue AP
• SE Detected Interferers
• Security
• Third Party AP
• Third Party Controller
The following Alarm categories are not supported in Release 3.6:
• Autonomous AP
• Cisco UCS Series
• Routers
• Switches and Hubs
• Wireless Controller
To edit the migrated alarm notification polices, see Customize Alarm Notification Policies.
To enable, disable, or adjust these settings, choose Administration > Settings > System Settings, then
Alarms and Events > Alarms and Events. Make your changes in the Alarm Email Options area.
Step 1 Choose Administration > Settings > System Settings > Alarms and Events > Alarms and Events.
• Include alarm Category in the email subject line—Select the check box to include alarm category in the email subject
line. This option is enabled by default.
• Include prior alarm severity in the email subject line—Select the check box to include prior alarm severity in the
email subject line.
• Include custom text in the email subject line—Select the check box to add custom text in the email subject line. You
can also replace the email subject line with custom text by selecting the Replace the email subject line with custom
text check box.
• Include custom text in body of email—Select the check box to add custom text in the body of email.
• Include alarm condition in body of email—Select the check box to include alarm condition in the body of email.
• Include alarm application category data in body of email—Select the check box to include alarm category in the
body of email.
• Add link to Alarm detail page in body of email—Select the check box to add a link to the Alarm detail page in the
body of email.
• Enable Secure Message Mode—Select the check box to enable a secure message mode. If you select the Mask IP
Address and Mask Controller Name check boxes, the alarm emails are sent in secure mode where all the IP addresses
and controller names are masked.
• Email Send Interval—Specify the time interval in which the email has to be sent.
Note Prime Infrastructure sends alarm notification email for the first instance of an alarm and the subsequent
notification is sent only if the alarm severity is changed.
• Skip to send first alarm separately as email notification-The first alarm will be sent in as a seperate email notification.
Note Disabling this option, an email notification will be sent immediately after the first alarm of the specified
Email Send Interval duration. The remaining alarms will be grouped in the second email. Enabling this
option will send only one email notification on the specified Email Send Interval duration. The first email
alert will be grouped into the existing list.
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > Alarms and Events.
Step 2 Under the Alarm Display Options area, enable or disable these settings, as desired:
Hide acknowledged Do not display Acknowledged alarms in the Alarms list or include them Yes
alarms in search results
Hide assigned alarms Do not display assigned alarms in the Alarms list or in search results Yes
Hide cleared alarms in Do not display cleared alarms in the Alarms list or in search results No
alarm browser
Step 3 To apply your changes, click Save at the bottom of the Alarms and Events window.
Note For alarms that are related to system administration, such as high availability, refer to Customize Server
Internal SNMP Traps and Forward the Traps, on page 101.
Step 1 Choose Administration > System Settings, then choose Alarms and Events > Alarm Severity and Auto Clear.
Step 2 Expand the categories available under the column, or search for the you want by entering all or part of the event text in
the search field just below the column heading.
Note When alarm auto-clear is enabled, sometimes there may be a delay in clearing the created alarms.
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > Alarm Severity and Auto
Clear.
Step 2 Expand the categories available under the Event Types column, or search for the event type you want by entering all or
part of the event text in the Event Types search field just below the column heading.
Step 3 To change the auto-clear duration for an event or group of events:
• For a single event, check the event's check box, click in the Auto Clear Duration field, enter the new duration, then
click Save.
• For multiple events, select the events, then click Alarm Auto Clear, enter the new duration in the dialog box, then
click OK.
Step 4 Change the Auto Clear Interval by performing one of the following tasks:
• Click on the Auto Clear Duration field, enter the new interval, and click Save.
• Select the check box of the event type, click Alarm Auto Clear, enter the new interval, and click OK.
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > Alarms and Events.
Step 2 In the Failure Source Pattern area, select the alarm category you want to customize.
Step 3 Adjust the failure source format as follows:
• To customize the properties that are displayed, click Edit, select the properties, then click OK. If a property is
greyed-out, you cannot remove it.
• To customize the separators that are displayed between the properties, click Edit Separator.
Step 4 To apply your changes, click Save at the bottom of the Alarms and Events settings window.
Link LINK-3-UPDOWN
VLAN PORT_SECURITY-6-VLAN_REMOVED
PORT_SECURITY-6-VLAN_FULL
ICCP SM L2-L2VPN_ICCP_SM-4-REMOTE_CORE_ISOLATION
L2-L2VPN_ICCP_SM-4-REMOTE_CORE_ISOLATION_CLEAR
L2-L2VPN_ICCP_SM-3-CONFIG_LOCAL_ERROR
L2-L2VPN_ICCP_SM-3-CONFIG_REMOTE_ERROR
L2-L2VPN_ICCP_SM-4-LOCAL_CORE_ISOLATION
L2-L2VPN_ICCP_SM-4-LOCAL_CORE_ISOLATION_CLEAR
L2-L2VPN_ICCP_SM-4-PEER_REACHABILITY_FAILURE
L2-L2VPN_ICCP_SM-4-PEER_REACHABILITY_CLEAR
L2-L2VPN_ICCP_SM-4-REMOTE_ACCESS_MAIN_PORT_FAILURE
L2-L2VPN_ICCP_SM-4-REMOTE_ACCESS_MAIN_PORT_FAILURE_CLEAR
INFRA-ICCP-5-ISOLATION
INFRA-ICCP-5-ISOLATION_CLR
INFRA-ICCP-5-NEIGHBOR_STATE_UP
INFRA-ICCP-5-NEIGHBOR_STATE_DOWN
INFRA-ICCP-6-BACKBONE_INTERFACE_STATE_UP
INFRA-ICCP-6-BACKBONE_INTERFACE_STATE_DOWN
L2-BM-6-ACTIVE_CLEAR
L2-BM-6-ACTIVE_PROBLEM
L2-L2VPN_ICCP_SM-3-CONFIG_INVALID_NODEID
L2-L2VPN_ICCP_SM-3-CONFIG_INVALID_NODEID_CLEAR
Satellite PKT_INFRA-ICPE_GCO-5-SATELLITE_STATUS_PROBLEM
PKT_INFRA-ICPE_GCO-5-SATELLITE_STATUS_CLEAR
Cluster PLATFORM-REDDRV-7-ROLE_CHANGE
PLATFORM-CE_SWITCH-6-UPDN
PLATFORM-CLUSTER_CLM-6-UPDN
LINK_UP
LINK_DOWN
However, in case of the following critical events, performs a full discovery of the device immediately when
the event occurs:
SYS-5-RELOAD
SYS-5-RESTART
OIR-6-INSCARD
OIR-SP-6-INSCARD
SWT_CEFC_STATUS_CHANGE
cefcFRURemoved
cefcFRUInserted
All of these events are assigned the MINOR severity, regardless of the trap contents, and fall under the alarm
category Generic.
Step 1 Select Monitor > Monitoring Tools > Alarms and Events.
Step 2 Click the Events tab.
Step 3 Click Custom Trap Events and then click Upload New Mibs.
Step 4 In the Upload Mib window, click Upload New MIB to upload a MIB file.
Step 5 If you upload a new MIB file, wait until the file upload is complete, and then click Refresh MIBs to have the newly
added MIB included in the MIB drop-down list.
Step 6 Click OK.
creates a new event type and alarm condition for the specified trap.
What to do next
You can also get help from the Cisco support community. If you do need to open a support case, attach the
suspect log files with your case. See Get Help from the Cisco Support Community and Technical Assistance
Center (TAC), on page 240.
• From Monitor > Monitoring Tools > Alarms and Events. Click a single alarm, then choose Troubleshoot >
Support Case. If you do not see the Troubleshoot button, widen your browser window.
• From the Device 360 view. Hover your mouse over a device IP address, then click the information icon. Choose
Support Request from the Actions drop-down menu.
Step 2 In the Cisco Support Community Forum page, enter your search parameters to find what you need.
AuditConfigurationArchiveandSoftwareManagementChanges
()
The window displays changes made to devices using the Configuration Archive and Software Management
features. To view these changes, choose . lists the most recent devices changes including the type of change
(Configuration Archive, Software Image Management).
You can also view the most recent changes for a device in the Recent Changes tab of its Device 360 view.
Feature Examples
Feature Examples
You can schedule a Change Audit report to run on a regular basis and, if desired, can e-mail the results to
you. You can also forward this information in a Change Audit notification (see Enable Change Audit
Notifications and Configure Syslog Receivers, on page 244).
Step 1 Choose Reports > Report Launch Pad, then choose Compliance > Change Audit.
Step 2 Click New to configure a new report.
Step 3 In the Settings area, enter the report criteria (time frame, when to start the report, and so forth).
Step 4 If you want to schedule the report to run at a later time, enter your settings in the Schedule area. You can also specify an
e-mail address that the report should be sent to.
Step 5 If you want to run the report immediately, click Run at the bottom of the window.
The Report Run Result lists all users and the changes they made during the specified time period.
If you configure syslog receivers but do not receive syslogs, you may need to change the anti-virus or firewall
settings on the destination syslog receiver to permit reception of syslog messages.
Step 1 Select Administration > Settings > System Settings, then choose Mail and Notification > Change Audit Notification.
Step 2 Select the Enable Change Audit Notification check box to enable notifications.
Step 3 If you want to send the messages to specific syslog receivers:
a) Click the Add button (+) to specify a syslog receiver.
b) In the Syslog Receivers area, enter the IP address, protocol , and port number of the syslog receiver.
You can repeat these steps as needed to specify additional syslog receivers.
Note sends all change audit notifications in XML format to the topic ChangeAudit.All. You must be subscribed
to ChangeAudit.All to receive the notifications.
The System Audit window lists all GUI pages that users have accessed. To view a System Audit, choose
Administration > Settings > System Audit.
The following table shows some of the information you can find from the System Audit page using the quick
filter. To enable the quick filter, choose Quick Filter from the Show drop-down list.
By a specific user Enter the username in the Username quick filter field
By all users in a user group Enter the group name in the User Group quick filter field
On devices in a specific virtual Enter the virtual domain name in the Active Virtual Domain quick
domain filter field
By the web GUI root user Select Root User Logs from the Show drop-down list
On a specific device Enter the IP address in the IP Address quick filter field
On a specific day Enter the day in the Audit Time quick filter filed (in the format
yyyy–mmm–dd)
System Logs
provides three classes of logs which are controlled by choosing Administration > Settings > Logging.
General Captures information about actions in the system. View and Manage General System
Logs, on page 246
SNMP Captures interactions with managed devices. Enable SNMP Traces and Adjust
SNMP Log Settings (Levels, Size), on
page 256
Syslog Forwards audit logs (as syslogs) to another Forward System Audit Logs As
recipient. Syslogs, on page 255
Change the logging In the General Log Settings, select the files and the desired level, and click Save.
level for specific For example, from the Message Level drop-down list, choose one of the following
modules as current logging level:
• Error—Captures error logs on the system.
• Information—Captures informational logs on the system.
• Trace—Reproduces problems of managed devices on the system so the details
can be captured in the logs.
• Debug—Captures debugging logs on the system.
Note This procedure sets and log message levels to Trace. Be sure to return the log message levels to their original
setting so system performance is not impacted.
Step 1 Choose Administration > Settings > Logging, then choose Log File Settings.
Step 2 Note the setting in the Message Level drop-down list because you will need to reset it later.
Step 3 In the Enable Log Modules area, select the desired Log Modules.
Log Modules Description
Access Work Flow This log module enables the ifm_access_workflow.log file.
admin This log module enables the admin.log file which then
captures the file size, message level, and so on.
Apic This log module enables the ifm_apic.log file which captures
the log that occurs when a PNP profile gets synced against
APIC.
AppNav This log module enables the appNav.log file to capture the
logs when saving the ACL configuration in a template,
deleting ACL from a template, creating and updating WAAS
interface, and when creating, updating, and deleting the
service node group and controller group.
Assurance Netflow This log module enables the assurance_netflow.log file that
captures information pertaining to the processing of
incoming Netflow data being sent from various Netflow
devices to . It logs information related to netflow processing
performed on flow exports received on UDP port 9991.
Assurance PfR This log module enables the assurance_pfr.log file that
captures information related to the PfRMonitoring process.
AVC Utilities This log module enables the aems_avc_utils.log file. The
AVC configuration feature-specific utility flow logs are
generated as a part of this component.
CIDS Device Logs This log module captures information related to device pack
operation of few devices that are not migrated to XDE.
Collection This log module captures the information of the dashlet that
is launched to check the readiness of a device.
Common Helper This log module captures the XMP common related
information.
Configuration This log module enables the ifm_config.log file when the
templates such as CLI, Composite, and MBC are deployed
to the devices. The service business logic execution debug
logs are captured.
Container Management This log module enables the logs for ifm_container.log file.
This file is logged when the container management performs
the life cycle operations (Install, Activate, Uninstall, and
Deactivate) of the virtual appliances.
Credential Management This log module enables the logs from NMS_SysOut.log
file.
Device Credential Verification This log module enables the XDE.log file.
epnm_lcm This log module enables the epnm-lcm.log file used by the
Life Cycle Manager (LCM) component.
epnm_mcn This log module enables the epnm-mcn.log file used by the
Model Changes Notifier (MCN) component.
Firewall and AVC Configuration This log module enables the aems_config.log file that
captures the AVC, ZBFW, QoS, and NAT configuration
details.
Firewall and AVC REST API This module enables the aems_config_access_layer.log file
that captures the REST API call details for AVC, ZBFW,
QoS, NAT, and PPM features.
Firewall and AVC Utilities This log module enables the aems_utils.log file that captures
the common utility calls in AVC/ZBFW/QoS, NAT and
PPM features.
Firewall Utilities This log module enables the aems_zbfw_utils.log file that
captures the ZBFW utility calls.
Key Certificate Management This log module enables the key_admin_web.log files.
Monitor This log module captures the information related to the APIs
that appears while launching the monitor dashlets such as
Top N Memory and Top N CPU.
MSAP This log module enables the ncs.log file. It captures the data
related to MSE High Avaliabilty actions such as Proxy
configuration and BBX configuration.
MSE This log module enables the ncs.log file. It captures the data
related to Mobility Service Engine actvities such as adding,
editing, and deleting MSE and Controller and SiteMap
synchronization with MSE.
NBIFW This log module allows you to change the logging level of
the NBI API framework. You can view the information in
the xmpNbiFw.log file.
ncs_nbi This log module allows you to change the logging level of
the Statistics NBI Services. You can view the information
in the ncs_nbi.log file.
Network Technology Overlay This log module enables the technology-overlay.log and
synce-technology-overlay.log files.
Network Technology Overlay Provider This log module enables the technology-overlay.log file.
NFVOS This log module is used for tracking esa dna integration
process.
NMS Assurance Persistence Logger This log module enables the nms-assurance-persistence.log
file.
Nms Common Trace This log module enables the nms-common.log file.
Plug and Play You can enable this module to capture the information
related to PNP profile creation and provisioning, bootstrap
initial configuration, APIC EM sync timeframe. The logs
are captured in the ifm_pnp.log and ifm_apic.log files.
QoS This log module enables the qos_config.log file when QoS
policies such as class maps or policy maps are created,
deployed to the devices and associate or disassociate with
the interfaces.
Reports You can enable this module to view the report related
queries, memory consumption, and time frame of report
generation.
Service Impact Analysis This log module enables the sia.log file used by the Service
Impacting Analysis feature in fault.
SWIM You can enable this module to log the Software Image
Management module logs in the ifm_swim.log file. The
logs will be captured as per the selected log level in GUI.
It logs the information related to the Software Image
Management operations like Software Image
Recommendation, Software Image Upgrade Analysis,
Software Image Import, Software Image Distribution,
Software Image Activation, and Software Image Commit.
System Monitoring This log module enables the ifm_sysmon.log file. This logs
information pertaining to the rule start time and end time
as well as the operations performed in between.
Threshold You can enable this module to view the details of the events
processed by the Threshold Monitor.
Wlan AVC Configuration This log module enables the aems_config_wlan.log file to
view the WLAN configuration work flow related
information.
XMLMED You can enable this module to capture the SOAP requests
and responses. You can also view these logs in the ncs.log
files.
The ifm_da.log file logs the information related to the Netflow devices and their respective pcaps, post device inclusion
on . The assurance_wirelessuser.log file logs the information that is captured when the WirelessUser job runs to read the
user data and populate in the memory caches that are added by WIRELESS_ASSURANCE. The assurance_pfr.log file
stores the PfR monitoring related information. The assurance_netflow.log file logs the processing of incoming Netflow
data being sent from various Netflow devices to . The assurance_appclassifier.log file stores the logs for NBAR
classification on incoming AVC/Wireless Netflow data.
Step 7 In the E-Mail Log File area, enter a comma-separated list of e-mail IDs.
Step 8 Revert to the original setting in the Message Level drop-down list.
Step 1 Choose Administration > Settings > Logging, then choose Syslog tab to view Syslog Logging Options.
Step 2 Select the Enable Syslog check box to enable collecting and processing system logs.
Step 3 In the Syslog Host field, enter the IP address of the destination server to which the message is to be transmitted.
Step 4 From the Syslog Facility drop-down list, choose any of the eight local use facilities for sending syslog messages. The
local use facilities are not reserved and are available for general use.
Step 5 Click Save.
Note If you enable system logs forwarding to remote server through an admin CLI, logs will not be registered to
ade.log file.
Enable SNMP Traces and Adjust SNMP Log Settings (Levels, Size)
Enable SNMP tracing to access more detailed information about the packets sent and received through SNMP.
You may want to do this when troubleshooting, such as when a trap is dropped.
To make the following changes, choose Administration > Settings > Logging, then select the SNMP Log
tab.
Step 1 Choose Administration > Settings > System Settings > Network and Device > CLI Session.
Step 2 Select the Controller Session Protocol (you can choose SSH or Telnet; SSH is the default).
Step 3 Select the Autonomous AP Session Protocol (you can choose SSH or Telnet; SSH is the default).
Step 4 The Run Autonomous AP Migration Analysis on discovery radio button is set to No by default. Choose Yes if you
want to discover the autonomous APs as well as perform migration analysis
Step 5 Click Save.
• If the Unified AP is disassociated and is in FlexConnect mode, then the Prime Infrastructure checks if
the AP is reachable or not. If the AP is ping capable and ping reachable, then it raises a low severity
alarm. If the AP is not ping capable or reachable, then it raises a high severity alarm.
• If the Unified AP is disassociated and is not in FlexConnect mode, then the Prime Infrastructure raises
a high severity alarm.
By default, the Unified AP ping reachability feature is enabled in Prime Infrastructure versions 3.3 onwards.
However, it is disabled in verions 3.2 and earlier. To enable, follow these steps:
Step 1 Choose Administration > Settings > System Settings > Network and Device > Unified AP Ping Reachability.
Step 2 Select the Allow Prime to learn about AP Reachability radio button to allow Cisco Prime Infrastructure to learn if the
AP is reachable or not. A background task is triggered which pings each access point and stores the result in the Prime
Infrastructure database.
Step 3 You are prompted with an alert saying that the background job is triggered to learn about ping reachability. Click OK to
continue.
A background job is triggered and is run against all the associated APs in the Prime Infrastructure to learn about the AP
capabilities. A new job is created in the Job Dashboard with this information.
Step 4 If you select All access points are ping reachable from Prime radio button, then the Administrator marks all the Unified
APs as ping capable.
Step 5 Choose Administration > Dashboards > Job Dashboard > System Jobs > Status to view job status.
Step 6 To search job details, use Quick filter option and enter Learn Unified AP Ping Capability in the Name search field.
The result is displayed in the Status table. The table contains the following information:
• Job Type
• Status
• Last Run Status
• Last Start Time
• Duration
• Next Start Time
• Click the Learn AP Ping Reachability link to view more details. The Learn AP Ping Reachability page displays
the following information. Click Show All to view details about all job instances.
• Recurrence
• Interval
• Run ID
• Status
• Duration
• Start Time
• Completion Time
Step 1 Choose Administration > Settings > System Settings > Network and Device > Controller Upgrade .
Step 2 Select the Auto refresh After Upgrade check box to automatically restore the configuration whenever there is a change
in the controller image.
Step 3 Select the Sync on Save Config Trap check box to trigger a Sync on the controller when the Prime Infrastructure receives
a Save Config trap. When this check box is selected, you can choose either of the following options:
• Retain the configuration in the Prime Infrastructure database
• Use the configuration on the controller currently
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Auto
SPT. The Auto SPT page appears.
Step 2 Select the Enable Auto Switch Port Tracing check box to allow Prime Infrastructure to automatically trace the switch
ports to which rogue access points are connected. Then specify the parameters for auto port tracing, including:
• How long to wait between rogue AP-to-port traces (in minutes)
• Whether to trace Found On Wire rogue APs
• Which severities to include (Critical, Major, or Minor)
Step 3 Select the Enable Auto Containment check box to allow Prime Infrastructure to automatically contain rogue APs by
severity. Then specify the parameters for auto containment, including:
• Whether to exclude Found On Wire rogue APs detected by port tracing
• Which severities to include in the containment (Critical, Major)
• The containment level (up to 4 APs)
Note For effective use of Vendor OUI match to eliminate false positive matches, the switch ports must have their
location information configured. The switch ports that are not configured will remain for OUI match after
elimination by location.
Related Topics
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > SPT
Configuration.
Step 2 Configure the following basic settings:
• MAC address +1/-1 search—Select the check box to enable.
This search involves the MAC address +1/-1 convention where the wired-side MAC address of the rogue access point is
obtained by adding or subtracting the radio MAC address by one.
• Rogue client MAC address search—Select the check box to enable.
When a rogue access point client exists, the MAC address of the client is added to the searchable MAC address list.
• Vendor (OUI) search— Select the check box to enable. OUI refers to Organizational Unique Identifier search which
searches the first three bytes in a MAC address.
• Exclude switch trunk ports— Select the check box to exclude switch trunk ports from the switch port trace.
Note When more than one port is traced for a given MAC address, additional checks are performed to improve
accuracy. These checks include the: trunk port, non-AP CDP neighbors present on the port, and whether or not
the MAC address is the only one on this port.
• Exclude device list— Select the check box to exclude additional devices from the trace. Enter into the device list
text box each device that you want to exclude from the switch port trace. Separate device names with a comma.
• Max hop count— Enter the maximum number of hops for this trace. Keep in mind that the greater the hop count,
the longer the switch port trace takes to perform.
Note This hop count value is not applicable for Auto SPT.
• Exclude vendor list— Enter in the vendor list text box any vendors that you want to exclude from the switch port
trace. Separate vendor names with commas. The vendor list is not case sensitive.
The default value for these parameters should be good for normal operations. These parameters directly impact the
performance of switch port tracing and Prime Infrastructure. Unless required, we do not recommend that you alter these
parameters.
• Select CDP device capabilities— Select the check box to enable.
Prime Infrastructure uses CDP to discover neighbors during tracing. When the neighbors are verified, Prime Infrastructure
uses the CDP capabilities field to determine whether or not the neighbor device is a valid switch. If the neighbor device
is not a valid switch, it is not traced.
Step 4 Click Save to confirm changes made. Click Reset to return the page to the original settings. Click Factory Reset to return
settings to the factory defaults.
Step 1 Add switches with full licenses using the Configuration > Network > Network Devices page.
Step 2 Enable Auto switch port tracing in Administration > Settings > System Settings > Network and Device > Switch Port
Trace (SPT) > Auto SPT page.
Step 3 Schedule to run wired client status Major Polling background task in Administration > Dashboards > Job Dashboard
page.
Step 4 Click the Trace switch port icon in Rogue AP detail page. New pop up will show details of switch port traced. Click the
detail status to check trace status such as started/Found, and so on.
Note Manual SPT will work, even if you do not add any switch to Prime Infrastructure. But you should configure
the SNMP credentials correctly in Administration > Settings > System Settings > Network and Device >
Switch Port Trace (SPT) > Manual SPT page. “Private” is the default credential, and will be used during
manual Switch Port Tracing if you do not configure it.
• If a switch is added to Prime Infrastructure by selecting Configuration > Network > Network Devices,
the SNMP credentials entered for the switch will override any switch SNMP credentials entered here,
and will be used for switch port tracing. You can change the switch SNMP credentials in the
Configuration > Network > Network Devices page. Prime Infrastructure will not require any license
for adding switch with SPT and will not display wired clients connected to the switches. The Monitor
> Managed Elements > Network Devices > Device Groups > Device Type > Switches and Hubs
page will not display the switch details added with SPT.
• Prime Infrastructure requires full license for adding switch. The Monitor > Managed Elements >
Network Devices > Device Groups > Device Type > Switches and Hubs page will display the switch
details added with full license. Prime Infrastructure will also display wired clients connected to switches.
Location of switches is tracked with MSE.
Step 1 ChooseAdministration > Settings > System Settings, then choose Network and Device > Switch Port Trace (SPT) >
Manual SPT . The Manual SPT page appears.
Step 2 View or edit the details for a current SNMP credential entry by clicking the Network Address link for that entry.
For details on this task, see “Configure Global SNMP Settings” and “View SNMP Credential Details” in related topics.
Note that the default entry is for network 0.0.0.0, which indicates the entire network. SNMP credentials are defined per
network, so only network addresses are allowed. The SNMP credentials defined for network 0.0.0.0 is the SNMP credential
default. It is used when no specific SNMP credential is defined. You should update the pre-populated SNMP credential
with your own SNMP information.
Step 3 To add a new SNMP entry, choose Select a command > Add SNMP Entries > Go (see “Add SNMP Credentials”).
Related Topics
Configure Global SNMP Settings, on page 93
View SNMP Credential Details, on page 94
Add SNMP Credentials, on page 95
For more information on Switch Port Tracing, see the following related topics:
In the Switch Port tracing Details dialog box, do one of the following:
• Click Enable/Disable Switch Port(s)— Enables or disables any selected ports.
• Click Trace Switch Port(s)— Runs another switch port trace.
• Click Show Detail Status— Displays details regarding the switch port traces for this access point.
• Click Close.
Related Topics
Configure Switch Port Tracing, on page 260
Configure SNMP Credentials for Rogue AP Tracing, on page 263
Related Topics
How Do You Configure Auto SPT?, on page 265
How Does Auto SPT Differ From Manual SPT?, on page 265
Where Can I See SPT Results (Manual and Auto)?, on page 266
How Can I Ensure Auto SPT Runs Smoothly
Why Does Auto SPT Take Longer to Find Wired Rogues?, on page 266
How Can I Detect Wired Rogues on Trunk Ports?, on page 267
How Can I Use the Auto SPT “Eliminate By Location” Feature? , on page 268
What is the Difference Between “Major Polling” and “Minor Polling”?, on page 268
Step 1 Use Configuration > Network > Network Devices > Add Device to add switches with a License Level of Full.
Step 2 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Auto SPT
and select Enable Auto Switch Port Tracing. Click OK.
Step 3 Select Administration > Settings > Background Tasks > Wired Client Status. Make sure this task is enabled and that
it is scheduled to run at least twice a day.
Related Topics
Where Can I See SPT Results (Manual and Auto)?, on page 266
How Can I Ensure Auto SPT Runs Smoothly?
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Port Trace Only license level, the SNMP credentials you enter when adding the switch will override
the SNMP credentials entered using Administration > Settings > System Settings > Network and
Device > Switch Port Trace (SPT) > Manual SPT. The entered credentials will be used for switch port
tracing. This is the main difference between not adding switches and adding switches with a license level
of “Switch Port Tracing Only”. Prime Infrastructure will not consume any licenses for switches with an
SPT-only license level, will not show these switches under Monitor > Managed Elements > Network
Devices > Device Type > Switches and Hubs, and will not show wired clients connected to these
switches.
For more information, See WCS Switch Port Trace Demonstration.
Related Topics
What is the Difference Between “Major Polling” and “Minor Polling”?, on page 268
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Step 1 Display details for the Rogue AP alarm in which you are interested. For example:
a) Click the Alarm Summary icon at the top of any Prime Infrastructure page. A list of alarm categories appears.
b) Click the Rogue AP link in the list. Prime Infrastructure displays the list of rogue AP alarms.
c) Expand the rogue AP alarm you want. The details page for that alarm appears.
Step 2 In the Switch Port Tracing pane, click the Trace Switch Port icon. The Switch Port Trace window shows the details
of the traced switch port.
If no SPT has been performed, click Trace Switch Port(s) to start tracing. Click the Show Detail Status button to get
details on the status of the trace as it progresses.
Related Topics
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > SPT
Configuration.
Step 2 Uncheck the Exclude switch trunk ports check box, then click Save.
Step 3 Choose Administration > Settings > System Settings > Client and User > Client.
Step 4 Check the Discover wired clients on trunk ports check box, then click Save.
Switches will start detecting wired clients on trunk ports starting with the next execution of a major poll by the Wired
Client Status background task.
Related Topics
How Do You Configure Auto SPT?, on page 265
What is the Difference Between “Major Polling” and “Minor Polling”?, on page 268
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Step 1 Use Configuration > Network > Network Devices > Switches and Hubs.
Step 2 Click a Device Name. By default, Configuration tab opens.
Step 3 Click Switch Port Location in the top right corner.
Step 4 Select the check box(es) of one or more ports to configure location, and from choose Configure Location from the
drop-down list, then click Go.
Step 5 In the Map Location group, you can configure the following:
• From the Campus/Site drop-down list, choose the campus map for the switch or switch port.
• From the Building drop-down list, choose the building map location for the switch or switch port.
• From the Floor drop-down list, choose the floor map.
• If you have already saved a file with the Campus/Site, Building, and Floor details, click Import Civic. This imports
civic information for the MSE using Prime Infrastructure. Enter the name of the text file or browse for the filename,
and click Import.
Step 6 In the ELIN and Civic Location group box, you can configure the following:
• Enter the Emergency Location Identifier Number (ELIN) in the ELIN text box. ELIN is a number that can be used
by the local public safety answering point (PSAP) to look up the geographic location of the caller in a master database
known as the automatic location information (ALI) database. The ELIN also allows the PSAP to contact the emergency
caller directly in the event the phone call is disconnected.
• Complete the required fields on the Civic Address and Advanced tabs.
• If you have the ELIN and Civic location information saved in a file, you can import it by clicking Import Switch
Location.
Related Topics
How Can I Ensure Auto SPT Runs Smoothly?
How Do You Configure Auto SPT?, on page 265
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Step 1 Integrate Cisco Mobility Service Engine (MSE) with Prime Infrastructure.
Step 2 Ensure that MSE is in sync with the defined floor area where the detecting APs are placed. MSE should be able to track
the rogues.
Step 3 Add all switches to Prime Infrastructure.
Step 4 After all switches are added to PI and are in the managed state, all switch ports need to be configured for the algorithm
to work. If all switches are not configured with switch ports, then the false positive results occur. You can configure from
the Configuration > Network > Network Devices > Switches and Hubs > click on a Device Name > click Switch Port
Location in the top right corner.
Step 5 Place the detecting access points on the map and make sure that the Cisco MSE is synchronized and rogues APs are
detected on the floor.
Eliminate By Location algorithm takes the floor ID of detecting APs and eliminates all others. If some switch ports are
not configured, then the value of those ports will be set to Zero and will be considered. Hence the results may contain
false positives, which contains the exact floor ID and floor ID which has the value zero.
Step 6 Configure switch port locations to ensure that all ports are assigned to the correct floor area.
Related Topics
How Do You Configure Switch Port Location?, on page 267
How Do You Configure Auto SPT?, on page 265
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Major Polling: During a major poll, Prime Infrastructure triggers client discovery on all wired device ports
by syncing all of the essential client information with the database. In Prime Infrastructure 2.2, the frequency
of this poll was reduced from twice a day. It is now fully configurable.
Minor Polling: During a minor poll, Prime Infrastructure triggers client discovery only on device interfaces
and ports which became active recently. Prime Infrastructure uses interface uptime data to detect when a port
or interface is recently added or removed by any client.
Related Topics
How Does Auto SPT Differ From Manual SPT?, on page 265
Why Does Auto SPT Take Longer to Find Wired Rogues?, on page 266
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 264
Figure 1: HA Deployment
An HA deployment consists of two Prime Infrastructure servers: a primary and a secondary. Each of these
servers has an active database and a standby backup copy of the active database. Under normal circumstances,
the primary server is active: It is connected to its active database while it manages the network. The secondary
server is passive, connected only to its standby database, but in constant communication with the primary
server.
The Health Monitor processes running on both servers monitor the status of its opposite server. Oracle Recovery
Manager (RMAN) running on both servers creates the active and standby databases and synchronizes the
databases when there are changes, with the help of Oracle Data Guard Broker running on the primary server.
When the primary server fails, the secondary takes over, connecting to its active database, which is in sync
with the active primary database. You can trigger this switch, called a “failover”, either manually, which is
recommended, or have it triggered automatically, You then use the secondary server to manage the network
while working to restore access to the primary server. When the primary is available again, you can initiate
a switch (called a “failback”) back to the primary server and resume network management using the primary.
If you choose to deploy the primary and secondary servers on the same IP subnet, you can configure your
devices to send a notifications to Prime Infrastructure at a single virtual IP address. If you choose to disperse
the two servers geographically, such as to facilitate disaster recovery, you will need to configure your devices
to send notifications to both servers.
Related Topics
About the Primary and Secondary Servers, on page 273
Sources of Failure, on page 273
File and Database Synchronization, on page 273
HA Server Communications, on page 274
Sources of Failure
Prime Infrastructure servers can fail due to issues in one or more of the following areas:
• Application Processes: Failure of one or more of the Prime Infrastructure server processes, including
NMS Server, MATLAB, TFTP, FTP, and so on. You can view the operational status of each of these
application processes by running the ncs status command through the admin console.
• Database Server: One or more database-related processes could be down. The Database Server runs as
a service in Prime Infrastructure.
• Network: Problems with network access or reachability issues.
• System: Problems related to the server's physical hardware or operating system.
• Virtual Machine (VM): Problems with the VM environment on which the primary and secondary servers
were installed (if HA is running in a VM environment).
For more information, see How High Availability Works
File changes are synchronized using the HTTPS protocol. File synchronization is done either in:
• Batch: This category includes files that are not updated frequently (such as license files). These files are
synchronized once every 500 seconds.
• Near Real-Time: Files that are updated frequently fall under this category. These files are synchronized
once every 11 seconds.
By default, the HA framework is configured to copy all the required configuration data, including:
• Report configurations
• Configuration Templates
• TFTP-root
• Administration settings
• Licensing files
Related Topics
How High Availability Works, on page 271
HA Server Communications
The primary and secondary HA servers exchange the following messages in order to maintain the health of
the HA system:
• Database Sync: Includes all the information necessary to ensure that the databases on the primary and
secondary servers are running and synchronized.
• File Sync: Includes frequently updated configuration files. These are synchronized every 11 seconds,
while other infrequently updated configuration files are synchronized every 500 seconds.
• Process Sync: Ensures that application- and database-related processes are running. These messages fall
under the Heartbeat category.
• Health Monitor Sync: These messages check for the following failure conditions:
• Network failures
• System failures (in the server hardware and operating system)
• Health Monitor failures
Related Topics
How High Availability Works, on page 271
Related Topics
How High Availability Works, on page 271
1 Settings area displays Health Monitor state and configuration detail in five separate
sections.
2 Status indicates current functional status of the HA setup (green check mark indicates
that HA is on and working).
3 Check Failover Readiness field displays the values of system failback and system failover
details of the checklist items.
For more details, see "Check Failover Readiness" given below the table.
4 Primary IP Address identifies the IP of the peer server for this secondary server (on the
primary server, this field is labeled “Secondary IP Address”).
5 Events table displays all current HA-related events, in chronological order, with most
recent event at the top.
6 Message Level field lets you change the logging level (your choice of Error, Informational,
or Trace). You must press Save to change the logging level.
7 Logging Download area lets you download Health Monitor log files.
8 State shows current HA state of the server on which this instance of Health Monitor is
running.
9 Failover Type shows whether you have Manual or Automatic failover configured.
10 Identifies the HA server whose Health Monitor web page you are viewing.
11 Action shows actions you can perform, such as failover or failback. Action buttons are
enabled only when Health Monitor detects HA state changes needing action.
SYSTEM - CHECK DISK IOPS This validates the disk iops in both primary and secondary
server.
The minimum expected disk iops is 200 MBps.
NETWORK - CHECK NETWORK This checks if the eth0 interface speed matches the
INTERFACE BANDWIDTH recommended speed of 100 Mbps in both primary and
secondary sever.
This test will not measure network bandwidth by
transmitting data between primary and secondary server.
NETWORK - CHECK NETWORK This checks if the network bandwidth speed matches the
BANDWIDTH SPEED recommended speed of 100 Mbps in both primary and
secondary sever.
This test will measure network bandwidth by transmitting
data between primary and secondary server.
Note In Cisco Prime Infrastructure, the network
bandwidth speed test is calculated only in Mbps.
Therefore, GBps, MBps, KBps, and Mbps are
changed over to Mbps and given as an input to
the speed test.
DATABASE - SYNC STATUS This ensures the oracle data guard broker configuration
which syncs the primary and secondary database.
Related Topics
How High Availability Works, on page 271
How to Resolve Database Synchronization Issues, on page 311
we fail to reconfigure devices to send their notifications to the secondary server as well as the primary server,
then when the secondary Prime Infrastructure server goes into Active mode, none of these notifications will
be received by the secondary server.
Setting all of your managed devices to send notifications to two separate servers demands extra device
configuration work. To avoid this additional overhead, HA supports use of a virtual IP that both servers can
share as the Management Address. The two servers will switch IPs as needed during failover and failback
processes. At any given time, the virtual IP Address will always point to the correct Prime Infrastructure
server.
Note that you cannot use virtual IP addressing unless the addresses for both of the HA servers and the virtual
IP are all in the same subnet. This can have an impact on how you choose to deploy your HA servers (see
“Planning HA Deployments” and “Using the Local Model” in Related Topics).
Also note that a virtual IP address is in no way intended as a substitute for the two server IP addresses. The
virtual IP is intended as a destination for syslogs and traps, and for other device management messages being
sent to the Prime Infrastructure servers. Polling of devices is always conducted from one of the two Prime
Infrastructure server IP addresses. Given these facts, if you are using virtual IP addressing, you must open
your firewall to incoming and outgoing TCP/IP communication on all three addresses: the virtual IP address
as well as the two actual server IPs.
You can also use virtual IP addressing if you plan to use HA with Operations Center. You can assign a virtual
IP as SSO to the Prime Infrastructure instance on which Operations Center is enabled. No virtual IP is needed
for any of the instances managed using Operations Center (see “Enable HA for Operations Center”).
You can enable virtual IP addressing during HA registration on the primary server, by specifying that you
want to use this feature and then supplying the virtual IPv4 (and, optionally, IPv6) address you want the
primary and secondary servers to share (see “How to Register HA on the Primary Server”).
To remove Virtual IP addressing after it is enabled, you must remove HA completely (see “Remove HA Via
the GUI”).
Related Topics
What If I Cannot Use Virtual IP Addressing?, on page 282
Planning HA Deployments, on page 279
Using the Local Model, on page 280
Enable HA for Operations Center, on page 283
How to Register HA on the Primary Server, on page 287
How High Availability Works, on page 271
Remove HA Via the GUI, on page 315
To set up HTTPS access for Cisco Prime Infrastructure, see Set Up HTTPS Access to Prime Infrastructure
Step 1 Launch Firefox and enter the following URL in the location bar: about:preferences#advanced.
Firefox displays its Options > Advanced tab.
Step 2 Select Certificates > View Certificates > Your Certificates, then click Import....
Step 3 Navigate to the downloaded certificate files, select them, then click OK or Open.
Step 4 If the certificate files are encrypted: You will be prompted for the password used to encrypt the certificate file. Enter it
and click OK.
The certificate is now installed in the browser.
Planning HA Deployments
Prime Infrastructure’s HA feature supports the following deployment models:
• Local: Both of the HA servers are located on the same subnet (giving them Layer 2 proximity), usually
in the same data center.
• Campus: Both HA servers are located in different subnets connected via LAN. Typically, they will be
deployed on a single campus, but at different locations within the campus.
• Remote: Each HA server is located in a separate, remote subnet connected via WAN. Each server is in
a different facility. The facilities are geographically dispersed across countries or continents.
The following sections explain the advantages and disadvantage of each model, and discusses underlying
restrictions that affect all deployment models.
HA will function using any of the supported deployment models. The main restriction is on HA’s performance
and reliability, which depends on the bandwidth and latency criteria discussed in “Network Throughput
Restrictions on HA”. As long as you are able to successfully manage these parameters, it is a business decision
(based on business parameters, such as cost, enterprise size, geography, compliance standards, and so on) as
to which of the available deployment models you choose to implement.
Related Topics
Network Throughput Restrictions on HA, on page 279
Using the Local Model, on page 280
Using the Campus Model, on page 281
Using the Remote Model, on page 281
What If I Cannot Use Virtual IP Addressing?, on page 282
Automatic Versus Manual Failover, on page 282
Enable HA for Operations Center, on page 283
The main exception to this rule is the delay for a full database copy operation. This kind of operation is
triggered when the primary server has been down for more than the data retention period and you then bring
it back up. The data retention period for the express, express-plus and standard configurations server is six
hours and for professional and Gen 2 appliance server it is12 hours.
Prime Infrastructure will trigger a full database copy operation from the secondary to the primary. No failback
is possible during this period, although the Health Monitor page will display any events encountered while
the database copy is going on. As soon as the copy is complete, the primary server will go to the “Primary
Synching” state, and you can then trigger failback. Be sure not to restart the primary server or disconnect it
from the network while the full database copy is in progress.
Variations in net throughput during a full database copy operation, irrespective of database size or other
factors, can mean the difference between a database copy operation that completes successfully in under an
hour and one that does not complete at all. Cisco has tested the impact of net throughput on HA deployment
in configurations following the Remote model, using typical Prime Infrastructure database sizes of between
105 GB and 156 GB. Based on these tests, Cisco recommends for a typical database of 125 GB (generating
a 10 GB backup file):
• For best results: With sub-millisecond latency, and net throughput of 977 Mbps or more, expect a complete
database copy time of one hour or less.
• For good results: With latency of 70 milliseconds, and net throughput of 255 Mbps or more, expect a
complete database copy time of two hours or less.
• For acceptable results: With latency of 220 milliseconds or less, and net throughput of 86 Mbps or more,
expect a complete database copy time of 4.5 hours or less.
With latencies of 330ms or higher, and throughput of 46Mbps or less, you run the risk of the database copy
not completing successfully.
Related Topics
Planning HA Deployments, on page 279
Using the Remote Model, on page 281
• Does not permit use of a virtual IP address as the single management address for the system, so it requires
more device configuration (see “What If I Cannot Use Virtual IP Addressing?” in Related Topics).
• Usually provides lower bandwidth and higher latency than the other two models. This can affect HA
reliability and may require administrative intervention to remedy (see “Network Throughput Restrictions
on HA” in Related Topics).
Related Topics
Planning HA Deployments, on page 279
Network Throughput Restrictions on HA, on page 279
Using the Local Model, on page 280
Using the Campus Model, on page 281
What If I Cannot Use Virtual IP Addressing?, on page 282
If the failover type is set to Automatic and the network connection goes down or the network link between
the primary and secondary servers becomes unreachable, there is also a small possibility that both the primary
and secondary servers will become active at the same time. We refer to this as the “split brain scenario”.
To prevent this, the primary server always checks to see if the secondary server is Active. As soon as the
network connection or link is restored and the primary is able to reach the secondary again, the primary server
checks the secondary server's state. If the secondary state is Active, then the primary server goes down on its
own. Users can then trigger a normal, manual failback to the primary server.
Note that this scenario only occurs when the primary HA server is configured for Automatic failover.
Configuring the primary server for Manual failover eliminates the possibility of this scenario. This is another
reason why we recommend Manual failover configuration.
Automatic failover is especially ill-advised for larger enterprises. If a particular HA deployment chooses to
go with Automatic failover anyway, an administrator may be forced to choose between the data that was
newly added to the primary or to the secondary. This means, essentially, that there is a possibility of data loss
whenever a split-brain scenario occurs. For help dealing with this issue, see “How to Recover From Split-Brain
Scenario” in Related Topics.
To ensure that HA is managed correctly, Cisco recommends that Prime Infrastructure administrators always
confirm the overall health of the HA deployment before initiating failover or failback, including:
• The current state of the primary.
• The current state of the secondary.
• The current state of connectivity between the two servers.
Related Topics
Planning HA Deployments, on page 279
Network Throughput Restrictions on HA, on page 279
How to Trigger Failback, on page 300
How to Recover From Split-Brain Scenario, on page 310
Enable HA for Operations Center, on page 283
If you already have a Prime Infrastructure server with Operations Center enabled, and wish to use it as
your primary Operations Center server with HA: Remove Single Sign On (SSO) servers from the Operations
Center instance and all the Prime Infrastructure instances managed by that Operations Center server. You
can easily do this by selecting Administration > Users > Users, Roles & AAA > SSO Servers and then
using the Delete SSO Server(s) command.
3. Install the secondary server and configure it for use with HA. For details, see “How to Install the HA
Secondary Server ” in Related Topics.
4. Register the secondary server on the primary, specifying that you want to Enable virtual IP and supplying
the virtual IP address you selected. Logout from the Server and login back with the virtual IP. For details,
see “How to Register HA on the Primary Server” in Related Topics.
5. If this is a new primary HA server: Apply the Operations Center license file to the primary server to
transform it into an Operations Center instance. For details, see “Activate Your Operations Center License”.
6. Setup the virtual IP address as the SSO server on the primary server, specifying the virtual IP address as
the IP address for the SSO server.For details, see “Enable SSO for Operations Center” in Related Topics.
Note By default TOFU is enabled in the primary server and if no CA certificate is deployed in primary
or secondary, then after failover, delete the Virtual IP TOFU from the PI instances and secondary
server. After failback repeat the same from primary server. To remove TOFU for Virtual IP from
SSO (primary) client server:
ncs certvalidation tofu-certs deletecert host <virtual ip>
7. Repeat the virtual IP SSO server setup on all instances of Prime Infrastructure that will be managed by
the primary Operations Center server. Make sure you have deleted any old SSO configuration and launch
PI server with its own IP.
8. Log out of all Prime Infrastructure instances and log back into the Operations Center instance, using the
virtual IP address as the Operations Center server IP.
9. If this is a new primary HA server: Add Prime Infrastructure instances to the Operations Center server,
as explained in “Add Cisco Prime Infrastructure Instances to Operations Center” in the Related Topics.
For more information, see "Activate Your Operations Center License" in Related Topics.
Note It is recommended to use either the host-name or the IP address uniformly for both managed
servers and SSO configuration. Including both IP address and host-name may cause unexpected
behaviour in SSO when cross launching from OPC to managed PI's.
To set up HA for Operations Center without using virtual IP, follow this workflow:
1. Install Prime Infrastructure on the server you plan to use as your primary Operations Center HA server.
If you already have a Prime Infrastructure server with Operations Center enabled, and wish to use it as
your primary Operations Center server with HA: Remove Single Sign On (SSO) servers from the Operations
Center instance and all the Prime Infrastructure instances managed by that Operations Center server. You
can easily do this by selecting Administration > Users > Users, Roles & AAA > SSO Servers and then
using the Delete SSO Server(s) command.
2. Install the secondary server and configure it for use with HA. For details, see “How to Install the HA
Secondary Server ” in Related Topics.
Related Topics
Using Virtual IP Addressing With HA, on page 276
Before You Begin Setting Up High Availability, on page 286
How to Install the HA Secondary Server, on page 287
How to Register HA on the Primary Server, on page 287
Activate Your Operations Center License, on page 5
Add Instances to Operations Center, on page 6
• If you plan on using Operations Center with an HA implementation of Prime Infrastructure: Ensure that
all of your HA-enabled Prime Infrastructure servers (both primary and secondary) have fully resolved
host names.
For more information, see Cisco Prime Infastructure Quick Start Guide
Related Topics
Set Up High Availability, on page 285
How to Patch Paired HA Servers Set for Manual Failover, on page 295
Using Virtual IP Addressing With HA, on page 276
Enable HA for Operations Center, on page 283
Network Throughput Restrictions on HA, on page 279
Step 1 Begin installing the Prime Infrastructure server software on your secondary server just as you would for a primary server.
For instructions on installing the server, see the Cisco Prime Infrastructure Quick Start Guide.
Step 2 During the installation, you will be prompted as follows:
Will this server be used as a secondary for HA? (yes/no)
Enter yes at the prompt.
Step 3 You will then be prompted for the HA authentication key, as follows:
Enter Authentication Key:
Enter the authentication key at the prompt. Enter it again at the confirmation prompt.
Related Topics
Set Up High Availability, on page 285
Before You Begin Setting Up High Availability, on page 286
Check Prime Infrastructure Version and Patch Status, on page 121
Check Prime Infrastructure Server Status, on page 120
How to Register HA on the Primary Server, on page 287
• The IP address or host name of the secondary HA server you have already installed and configured (see
“How to Install the HA Secondary Server” in Related Topics)
• The authentication key you set during installation of the secondary server.
• One or more email addresses, to which notifications will be sent.
• The Failover Type (see “Automatic Versus Manual Failover”).
If you plan to use virtual IP addressing (see “Using Virtual IP Addressing With HA”), you will also need to:
• Select the Enable Virtual IP checkbox.
• Specify the IPv4 virtual IP address to be shared by the primary and secondary HA servers. You may also
specify an IPv6 virtual IP address, although this is not required.
The following steps explain how to register HA on the primary server. You follow these same steps when
re-registering HA.
Step 1 Log in to Prime Infrastructure with a user ID and password that has administrator privileges.
Step 2 From the menu, select Administration > Settings > High Availability. Prime Infrastructure displays the HA status page.
Step 3 Select HA Configuration and then complete the fields as follows:
a. Secondary Server: Enter the IP address or the host name of the secondary server.
b. Authentication Key: Enter the authentication key password you set during the secondary server installation.
c. Email Address: Enter the address (or comma-separated list of addresses) to which notification about HA state changes
should be mailed. If you have already configured email notifications using the Mail Server Configuration page (see
“Configure Email Server Settings”), the email addresses you enter here will be appended to the list of addresses
already configured for the mail server.
d. Failover Type: Select either Manual or Automatic. We recommend that you select Manual.
Step 4 If you are using the virtual IP feature: Select the Enable Virtual IP checkbox, then complete the additional fields as
follows:
a. IPV4 Virtual IP: Enter the virtual IPv4 address you want both HA servers to use.
b. IPV6 Virtual IP: (Optional) Enter the IPv6 address you want both HA servers to use.
Note that virtual IP addressing will not work unless both servers are on the same subnet. You should not use IPV6 address
block fe80, it is been reserved for link-local unicast addressing.
Step 5 Click Check Readiness to ensure if the HA related environmental parameters are ready for the configuration.
For more details, see "Check Readiness for HA Registration/Configuration".
Step 6 Click Register to view the Milestone progress bar, to check the 100% completion of Pre-HA Registration, Database
Replication and Post HA Registration as shown below. Prime Infrastructure initiates the HA registration process. When
registration completes successfully, Configuration Mode will display the value Primary Active.
For more information, see Configure Email Server Settings , on page 377.
Related Topics
How to Install the HA Secondary Server, on page 287
Automatic Versus Manual Failover, on page 282
Using Virtual IP Addressing With HA, on page 276
Before You Begin Setting Up High Availability, on page 286
What Happens During HA Registration, on page 292
Set Up High Availability, on page 285
Check Readiness for HA Registration/Configuration, on page 289
Step 1 Log in to Prime Infrastructure with a user ID and password that has administrator privileges.
Step 2 From the menu, select Administration > Settings > High Availability. Prime Infrastructure displays the HA status page.
Step 3 Select HA Configuration.
Step 4 Provide the secondary server IP address in the Secondary Server field and secondary Authentication Key Authentication
Key field .
Step 5 Click Check Readiness.
A pop up window with the system specifications and other parameters will be displayed. The screen will show the
Checklist Item name, Status, Impact and Recommendation details.
Below, is the list of checklist test name and the description displayed for Check Readiness:
SYSTEM - Check CPU Count This validates the CPU count in primary and secondary
server.
The CPU count in primary server can be less than or equal
to the secondary server.
DATABASE - LISTENER STATUS This checks if the database listeners are up and running in
both primary and secondary server.
If there is a failure, the test will restart and report the status.
This checks if all the wcs instances exist under oracle
"listener.ora" file. This is executed in both primary and
secondary server.
DATABASE - CHECK MEMORY TARGET This checks for "/dev/shm" database memory target size
for HA setup.
DATABASE - CHECK LISTENER CONFIG This checks for all the database instances exist under
CORRUPTION database listener configuration.
This is executed in both primary and secondary server.
SYSTEM - HEALTH MONITOR STATUS This checks whether the health monitor process is running
in both primary and secondary server.
SYSTEM - CHECK DISK IOPS This validates the disk IOPS in both primary and secondary
server.
The minimum expected disk IOPS is 200 MBps.
NETWORK - CHECK FIREWALL FOR DATABASE This checks if the database port 1522 is open in the system
PORT ACCESSIBILITY firewall.
If the port is disabled, the test will grant permission for 1522
in the iptables list.
NETWORK - CHECK NETWORK INTERFACE This checks if the eth0 interface speed matches the
BANDWIDTH recommended speed of 100 Mbps in both primary and
secondary sever.
This test will not measure network bandwidth by
transmitting data between primary and secondary server.
NETWORK - CHECK NETWORK BANDWIDTH SPEED This checks if the network bandwidth speed matches the
recommended speed of 100 Mbps in both primary and
secondary sever.
This test will measure network bandwidth by transmitting
data between primary and secondary server.
DATABASE - CHECK ONLINE STATUS This checks if the database files status is online and
accessible in both primary and secondary server.
DATABASE - CHECK TNS CONFIG CORRUPTION This validates if the tnsping is successful in both primary
and secondary server.
DATABASE - TNS REACHABILITY STATUS This checks if all the wcs instances exist under oracle
"listener.ora" file.
This is executable in both primary and secondary server.
DATABASE - VALIDATE STANDBY DATABASE This validates if the standby database instance (stbywcs) is
INSTANCE available in both primary and secondary server.
SYSTEM - CHECK RAM SIZE This checks if the disk size of primary server less than or
equal to secondary server.
SYSTEM - CHECK SERVER PING REACHABILITY This ensures that the primary server can run ping check
with the remote (secondary) server.
Step 6 Once the check is completed for all the parameters, check their status and click Clear to close the window.
Note The validation failback and failover events during Check Readiness will be sent to the Alarms and Events page;
whereas, the registration failure event will not be present in the Alarms and Evens page.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 119).
Step 2 Enter the following command to display the current status of Prime Infrastructure HA processes:
PIServer/admin# ncs ha status
Related Topics
Set Up High Availability, on page 285
You can view these state changes on the HA Status page for the primary server, or the Health Monitor web
pages for either of the two servers. If you are using the HA Status page, click Refresh to view progress. Once
the data is fully synchronized, the HA Status page will be updated to show the current state as “Primary
Active”, as shown in the following figure.
After registration is initiated, Prime Infrastructure initiates synchronization between the primary and the
secondary HA servers. The synchronization should not have any impact on user activity, although users may
observe slow system response until the synchronization is complete. The length of the synchronization is a
function of the total database size and, is handled at the Oracle database level by the Oracle RMAN and Data
Guard Broker processes. There is no impact on the execution of user- or system-related activity during the
sync.
During registration, Prime Infrastructure performs a full database replication to the secondary server. All
processes on the secondary server will be running, but the server itself will be in passive mode. If you execute
the Prime Infrastructure CLI command ncs status on the secondary server while the secondary server is in
the “Secondary Syncing” state, the command output will show all processes as running.
Related Topics
How High Availability Works, on page 271
Planning HA Deployments, on page 279
Note You will be prompted for the username and authentication key. Enter the username as 'root' and authkey
and click Login.
Note Verify that the secondary server state displayed on the HM web page is in the Secondary Syncing state.
b) You will be prompted for the username and authentication key. Enter the username as 'root' and authkey and click
Login.
c) Click the HM web page’s Software Update link. You will be prompted for the authentication key a second time.
Enter it and click Login again.
d) Click Upload Update File and browse to the location where you saved the patch file.
e) Select the UBF file and click OK to upload the file.
f) When the upload is complete: On the Software Upload page, confirm that the Name, Published Date and Description
of the patch file are correct.
g) Select the patch file and click Install.
h) Click Yes in the warning pop-up. When the installation is complete, the server will restart automatically. The restart
typically takes 15 to 20 minutes.
i) After the installation is complete on the secondary server, verify that the Status of Updates table on the Software
Update page shows “Installed” for the patch.
Step 3 Verify that the patch status is the same on both servers, as follows:
a) Log in to the primary server and access its Software Update page as you did in step 1, above. The “Status” column
should show “Installed” for the installed patch.
b) Access the secondary server’s Health Monitor page as you did in step 2, above. The “Status” column should show
“Installed” for the installed patch
Step 4 Register the servers.
For more information, see "Software patches listing for Cisco Prime Infrastructure", "Restart Prime Infrastructure Using
CLI" and "Check Prime Infrastructure Server Status".
Related Topics
Set Up High Availability, on page 285
How to Register HA on the Primary Server, on page 287
How to Patch HA Servers, on page 293
Note You will be prompted for the username and authentication key Entered when HA was enabled.
provie the username as 'root' and authentication key and click Login.
Step 1 Ensure that your HA implementation is enabled and ready for update:
a) Log in to the primary server using an ID with Administrator privileges.
b) Select Administration > Settings > High Availability, The primary server state displayed on the HA Status page
should be “Primary Active”.
c) Select HA Configuration. The current Configuration Mode should show “HA Enabled”. We recommend that you
set the Failover Type to “manual” during the patch installation.
d) Access the secondary server’s Health Monitor (HM) web page by pointing your browser to the following URL:
https://ServerIP:8082
where ServerIP is the IP address or host name of the secondary server.
e) Verify that the secondary server state displayed on the HM web page is in the “Secondary Syncing” state.
Step 2 You will be prompted for the user name and authentication key entered when HA was enabled. Enter username as 'root'
with authentication key and click Login.
Step 3 Download the UBF patch and install it on the primary server:
a) Point your browser to the software patches listing for Cisco Prime Infrastructure (see Related Topics) .
b) Click the Download button for the patch file you need to install (the file name ends with a UBF file extension), and
save the file locally.
c) Log in to the primary server using an ID with administrator privileges and choose Administration > Licenses and
Software Updates > Software Update.
d) Click the Upload link at the top of the page and browse to the location where you saved the patch file.
e) Select the UBF file and click OK to upload the file.
f) When the upload is complete: On the Software Upload page, verify that the Name, Published Date and Description
of the patch file are correct.
g) Select the patch file and click Install.
h) Click Yes in the warning pop-up. When the installation is complete, the server will restart automatically. The restart
typically takes 15 to 20 minutes.
i) After the server restart is complete on the primary server, select Administration > Settings > High Availability,
The primary server state displayed on the HA Status page should be “Primary Active”.
j) Verify that the Status of Updates table on the Software Update page shows “Installed” for the patch.
Step 4 Install the same patch on the secondary server once patching is complete on the primary server:
a) Access the secondary server’s HM web page and login if needed.
b) Click the HM web page’s Software Update link. You will be prompted for the authentication key a second time.
Enter it and click Login again.
c) Click Upload Update File and browse to the location where you saved the patch file.
d) Select the UBF file and click OK to upload the file.
e) When the upload is complete: On the Software Upload page, confirm that the Name, Published Date and Description
of the patch file are correct.
f) Select the patch file and click Install.
g) Click Yes in the warning pop-up. When the installation is complete, the server will restart automatically. The restart
typically takes 15 to 20 minutes.
h) After the server restart is complete on the secondary server, log in to the secondary HM page (https://serverIP:8082)
and verify that the secondary server state displayed on the HM web page is “Secondary Syncing”.
i) Verify that the Status of Updates table on the Software Update page shows “Installed” for the patch.
Step 5 Once the server restart is complete, verify the patch installation as follows:
a) Log in to the primary server and access its Software Update page as you did in step 2, above. The “Status” column
on the Status of Updates > Update tab should show “Installed” for the patch.
b) Access the secondary server’s Software Update page as you did in step 3, above. The “Status” column on the Status
of Updates > Updates tab should show “Installed” for the patch.
For more information, see
• Software patches listing for Cisco Prime Infrastructure.
• Start Prime Infrastructure, on page 120
• Stop Prime Infrastructure, on page 121
• Check Prime Infrastructure Server Status, on page 120
Related Topics
Set Up High Availability, on page 285
Check High Availability Status, on page 291
Remove HA Via the GUI, on page 315
How to Patch New HA Servers, on page 293
How to Patch Paired HA Servers Set for Automatic Failover, on page 297
Step 1 Ensure that your HA implementation is enabled and ready for update:
a) Log in to the primary server using an ID with Administrator privileges.
b) Select Administration > Settings > High Availability, The primary server state displayed on the HA Status page
should be “Primary Active”.
c) Select HA Configuration. The current Configuration Mode should show “HA Enabled”.
d) Access the secondary server’s Health Monitor (HM) web page by pointing your browser to the following URL:
https://ServerIP:8082
where ServerIP is the IP address or host name of the secondary server.
e) You will be prompted for the user name and authentication key entered when HA was enabled. Enter username as
'root' with authentication key and click Login.
f) Verify that the secondary server state displayed on the HM web page is in the “Secondary Syncing” state.
Step 2 Download the UBF patch and install it on the primary server:
a) Point your browser to the software patches listing for Cisco Prime Infrastructure (see Related Topics) .
b) Click the Download button for the patch file you need to install (the file name ends with a UBF file extension), and
save the file locally.
c) Log in to the primary server using an ID with administrator privileges and choose Administration > Licenses and
Software Updates > Software Update.
d) Click the upload link at the top of the page and browse to the location where you saved the patch file.
e) Select the UBF file and then click OK to upload the file.
f) When the upload is complete: On the Software Upload page, verify that the Name, Published Date and Description
of the patch file are correct.
g) Select the patch file and click Install.
h) Click Yes in the warning pop-up. Failover will be triggered and the primary server will restart automatically. Failover
will take 2 to 4 minutes to complete. After the failover is complete, the secondary server will be in “Secondary Active”
state.
i) After the primary server is restarted, run the ncs status command (see “Check Prime Infrastructure Server Status”)
to verify that the primary’s processes have re-started. Before continuing: Access the primary server’s HM web page
and verify that the primary server state displayed is “Primary Synching”.
Step 3 Failback to the primary using the secondary server’s HM web page:
a) Access the secondary server’s HM web page and login if needed.
b) Click Failback to initiate a failback from the secondary to the primary server. It will take 2 to 3 minutes for the
operation to complete. As soon as failback completes, the secondary server will be automatically restarted in the
standby mode. It will take a maximum of 15 minutes for the restart to complete, and it will be synched with the
primary server.
You can verify the restart by logging into the secondary server’s HM web page and looking for the message “Prime
Infrastructure stopped successfully” followed by “Prime Infrastructure started successfully.”
After failback is complete, the primary server state will change to “Primary Active”
c) Before continuing: Run the ncs ha status command on both the primary and secondary servers. Verify that the
primary server state changes to “Primary Active” and the secondary server state is “Secondary Synching”.
Step 4 Once failback completes, verify the patch installation by logging in to the primary server and accessing its Software
Update page (as you did in step 2, above). The “Status” column on the Status of Updates > Update tab should show
“Installed” for the patch.
Step 5 Install the same patch on the secondary server once patching is complete on the primary server:
a) Access the secondary server’s HM web page and login if needed.
b) Click the HM web page’s Software Update link. You will be prompted for the authentication key a second time.
Enter it and click Login again.
c) Click Upload Update File and browse to the location where you saved the patch file.
d) Select the UBF file and then click OK to upload the file.
e) When the upload is complete: On the Software Upload page, confirm that the Name, Published Date and Description
of the patch file are correct.
f) Select the patch file and click Install.
g) Click Yes in the warning pop-up. The server will restart automatically. The restart typically takes 15 to 20 minutes.
h) After the installation is complete on the secondary server, verify that the Status of Updates table on the Software
Update page shows “Installed” for the patch.
i) After the server restart is complete on the secondary server, log in to the secondary HM page and verify that the
secondary server state displayed on the HM web page is “Secondary Syncing”.
Step 6 Once server restart is complete, verify the patch installation as follows:
a) Log in to the primary server and access its Software Update page as you did in step 2, above. The “Status” column
on the Status of Updates > Update tab should show “Installed” for the patch.
b) Access the secondary server’s Software Update page as you did in step 5, above. The “Status” column on the Status
of Updates > Updates tab should show “Installed” for the patch.
For more information, see Software patches listing for Cisco Prime Infrastructure, Stop Prime Infrastructure, Start
Prime Infrastructure and Check Prime Infrastructure Server Status.
Related Topics
Set Up High Availability, on page 285
Note You will be prompted for the username and authentication key .Enter the username as 'root' and authentication
key and click Login.
You can also access the Health Monitor web page for the currently active server by logging in to Prime
Infrastructure, selecting Administration > Settings > High Availability, and then clicking the Launch
Health Monitor link at the top right of the HA Status page.
Related Topics
Monitor High Availability, on page 299
How to Trigger Failover, on page 299
How to Trigger Failback, on page 300
Force Failover, on page 301
Health Monitor (HM) detects failure conditions using the heartbeat messages that the two servers exchange.
If the primary server is not responsive to three consecutive heartbeat messages from the secondary, it is
considered to have failed. During the health check, HM also checks the application process status and database
health; if there is no proper response to these checks, these are also treated as having failed.
The HA system takes approximately 10 to 15 seconds to detect a process failure on the primary server and
initiate a failover. If the secondary server is unable to reach the primary server due to a network issue, it might
take more time to initiate a failover. In addition, it may take additional time for the application processes on
the secondary server to be fully operational.
As soon as HM detects the failure, it sends an email notification. The email includes the failure status along
with a link to the secondary server's Health Monitor web page.
If HA is currently configured for automatic failover, the secondary server will activate automatically and there
is no action you need to perform.
If HA is currently configured for manual failover, you must trigger the failover as mentioned in the below
procedure.
Failover should be considered temporary. The failed primary Prime Infrastructure instance should be restored
to normal as soon as possible, and failback should be re-initiated.
Step 1 Access the secondary server's Health Monitor web page using the web link given in the email notification, or using the
steps in “Accessing the Health Monitor Web Page”.
Step 2 Trigger the failover by clicking the Failover button.
Related Topics
How High Availability Works, on page 271
How to Trigger Failback, on page 300
Monitor High Availability, on page 299
How to Register HA on the Primary Server, on page 287
Access the Health Monitor Web Page, on page 299
Step 1 Access the secondary server's Health Monitor web page using the link given in the email notification, or using the steps
in “Accessing the Health Monitor Web Page”.
Step 2 Trigger the failback by clicking the Failback button.
The secondary server is automatically restarted in the standby mode after the failback and is automatically synced with
the primary server. The primary server will now be the available Prime Infrastructure server.
Related Topics
How High Availability Works, on page 271
How to Trigger Failover, on page 299
Force Failover, on page 301
Monitor High Availability, on page 299
Access the Health Monitor Web Page, on page 299
Force Failover
A forced failover is the process of making the secondary server active while the primary server is still up.
You will want to use this option when, for example, you want to test that your HA setup is fully functional.
Forced failover is available to you only when the primary is active, the secondary is in the “Secondary syncing”
state, and all processes are running on both servers. Forced failover is disabled when the primary server is
down. In this case, only the normal Failover is enabled.
Once the forced failover completes, the secondary server will be active and the primary will restart in standby
automatically. You can return to an active primary server and standby secondary server by triggering a normal
failback.
Step 1 Access the secondary server's Health Monitor web page using the steps in “Accessing the Health Monitor Web Page”.
Step 2 Trigger the forced failover by clicking the Force Failover button. The forced failover will complete in 2 to 3 minutes.
Related Topics
How High Availability Works, on page 271
How to Trigger Failover, on page 299
How to Trigger Failback, on page 300
Monitor High Availability, on page 299
How to Register HA on the Primary Server, on page 287
Access the Health Monitor Web Page, on page 299
HA Registration Fails
If HA registration fails, you will see the following HA state-change transitions for each server (instead of
those detailed in “What Happens During HA Registration”:
Step 1 Use ping and other tools to check the network connection between the two Prime Infrastructure servers. Confirm that the
secondary server is reachable from the primary, and vice versa.
Step 2 Check that the gateway, subnet mask, virtual IP address (if configured), server hostname, DNS, NTP settings are all
correct.
Step 3 Check that the configured DNS and NTP servers are reachable from the primary and secondary servers, and that both
are responding without latency or other network-specific issues.
Step 4 Check that all Prime Infrastructure licenses are correctly configured.
Step 5 Once you have remedied any connectivity or setting issues, try the steps in “How to Register High Availability on the
Primary Server” again in related topics.
Related Topics
Respond to Other HA Events, on page 301
What Happens During HA Registration, on page 292
How to Register HA on the Primary Server, on page 287
Step 1 Check on and restore network connectivity between the two servers. Once network connectivity is restored and the primary
server can detect that the secondary is active, all services on the primary will be restarted and made passive automatically.
You will see the following state changes:
Step 2 Trigger a failback from the secondary to the primary. You will then see the following state transitions:
Related Topics
Respond to Other HA Events, on page 301
How to Trigger Failback, on page 300
You will get email notifications that each server has lost the other.
Step 1 Check on and, if needed, restore the network connectivity between the two servers.
You will see the following state changes once network connectivity is restored.:
Step 2 If network connection cannot be restored for any reason, use the HM web page for the secondary server to trigger a
failover from the primary to the secondary server. You will see the following state changes:
You will get an email notification that the secondary server is now active.
Step 3 Check and restore network connectivity between the two servers. Once network connectivity is restored and the primary
server detects that the secondary server is active, all services on the primary server will be restarted and made passive.
You will see the following state changes:
Related Topics
Respond to Other HA Events, on page 301
When this process is complete, you will get an email notification that the secondary server is now active.
Step 1 Restart the primary server and ensure that it is running. Once the primary is restarted, it will be in the state “Primary
Syncing”. You will see the following state transitions:
Step 2 Trigger a failback from the secondary to the primary. You will then see the following state transitions:
Related Topics
Respond to Other HA Events, on page 301
How to Trigger Failback, on page 300
Step 1 Trigger on the secondary server a failover from the primary to the secondary. You will then see the following state
transitions:
Step 2 Restart the primary server and ensure that it is running. Once the primary server is restarted, the primary’s HA state will
be “Primary Syncing”. You will see the following state transitions:
Step 3 Trigger a failback from the secondary to the primary. You will then see the following state transitions:
Related Topics
Respond to Other HA Events, on page 301
The “Primary Alone” and “Primary Active” states occur immediately after the primary comes back online.
No administrator response should be required.
Related Topics
Respond to Other HA Events, on page 301
Step 1 Restart the secondary server and the instance of Prime Infrastructure running on it. If for some reason you cannot restart
the secondary server, see “Both HA Servers Are Down and Secondary Will Not Restart” in Related Topics.
Step 2 When Prime Infrastructure is running on the secondary, access the secondary server’s Health Monitor web page. You
will see the secondary server transition to the state “Secondary Lost Primary”.
Step 3 Restart the primary server and the instance of Prime Infrastructure running on it. When Prime Infrastructure is running
on the primary, the primary will automatically sync with the secondary. To verify this, access the primary server’s Health
Monitor web page. You will see the two servers transition through the following series of HA states:
Related Topics
Both HA Servers Are Down and the Secondary Will Not Restart, on page 309
Access the Health Monitor Web Page, on page 299
Respond to Other HA Events, on page 301
Step 1 Power on the secondary server and the instance of Prime Infrastructure running on it.
The secondary HA restart will fail at this stage because the primary is not reachable. However, the secondary Health
Monitor process will be running with an error.
Step 2 When Prime Infrastructure is running on the secondary, access the secondary server’s Health Monitor web page. You
will see the secondary server transition to the state “Secondary Lost Primary”.
Step 3 Power on the primary server and the instance of Prime Infrastructure running on it.
Step 4 When Prime Infrastructure is running on the primary, the primary will automatically sync with the secondary. To verify
this, access the primary server’s Health Monitor web page. You will see the two servers transition through the following
series of HA states:
Step 5 Restart the secondary server and the instance of Prime Infrastructure running on it. This is required because not all
processes will be running on the secondary at this point.
If for some reason you cannot restart the secondary server, see “Both HA Servers Are Down and Secondary Will Not
Restart” in Related Topics.
Step 6 When Prime Infrastructure finishes restarting on the secondary server, all processes should be running. Verify this by
running the ncs status command (see “Check Prime Infrastructure Server Status” in Related Topics).
Related Topics
Both HA Servers Are Down and the Secondary Will Not Restart, on page 309
Both HA Servers Are Down and the Secondary Will Not Restart
If both HA servers are down at the same time and the secondary will not restart, you will need to remove the
HA configuration from the primary server in order to use it as a standalone until you can replace or restore
the secondary server.
The following steps assume that you have already tried and failed to restart the secondary server.
Step 1 Attempt to restart the primary instance of Prime Infrastructure. If the primary is able to restart at all, the restart will abort
with an error message indicating that you must remove the HA configuration.
Step 2 Open a CLI session with the primary Prime Infrastructure server (see How to Connect Via CLI, on page 119).
Step 3 Enter the following command to remove the HA configuration on the primary server:
PIServer/admin# ncs ha remove
Step 4 You will be prompted to confirm that you want to remove the HA configuration. Answer Y to the prompt.
You should now be able to restart the primary instance of Prime Infrastructure without the error message and use it as a
standalone.
When you are able to restore or replace the secondary server, proceed as explained in “How to Register High Availability
on the Primary Server” in Related Topics.
Related Topics
Access the Health Monitor Web Page, on page 299
How to Register HA on the Primary Server, on page 287
Remove HA Via the CLI, on page 316
Respond to Other HA Events, on page 301
Step 1 Ensure that the secondary server is currently in “Secondary Active” state. If you have set the Failover Type on the primary
server to “manual”, you will need to trigger the failover to the secondary manually.
Step 2 Ensure that the old primary server you are replacing has been disconnected from the network.
Step 3 Ensure that the new primary server is ready for use. This will include connecting it to the network and assigning it the
same server IP, subnet mask, gateway as the old primary server. You will also need to enter the same authentication key
that you entered when installing the secondary server.
Step 4 Ensure that both the primary and secondary servers are at the same patch level and if you want to replace the primary
server, then you must :
a) Ensure the primary and secondary server are in TOFU Mode.
b) Login to Secondary server admin CLI.
c) Execute the following command in the secondary server CLI:
d) PIServer/admin# ncs certvalidation tofu-certs deletecert host <primaryserver's-hostname>
This is required to re-establish the communication between the Primary and Secondary servers.
Step 5 Trigger a failback from the secondary to the newly installed primary. During failback to the new primary HA server, a
full database copy will be performed, so this operation will take time to complete depending on the available bandwidth
and network latency (see “Network Throughput Restrictions on HA” in Related Topics). You will see the two servers
transition through the following series of HA states:
Related Topics
How to Trigger Failover, on page 299
How to Trigger Failback, on page 300
Respond to Other HA Events, on page 301
Network Throughput Restrictions on HA, on page 279
Step 1 Once the network is up, and the secondary server is up, the primary will restart itself automatically, using its standby
database. The HA status of the primary server will be, first, “Primary Failover” transitioning to “Primary Synching”. You
can verify this by logging on to the primary server’s Health Monitor web page.
Step 2 Once the primary server’s status is “Primary Syncing, confirm that a user can log into the secondary server’s Prime
Infrastructure page using the web browser (for example, https://x.x.x.x:443). Do not proceed until you have verified this.
Step 3 Once access to the secondary is verified, initiate a failback from the secondary server's Health Monitor web page (see
How to Trigger Failback, on page 300 ). You can continue to perform monitoring activities on the secondary server until
the switchover to the primary is completed.
For more information, see Restart Prime Infrastructure Using CLI, on page 121.
Related Topics
Automatic Versus Manual Failover, on page 282
Remove HA Via the CLI, on page 316
How to Register HA on the Primary Server, on page 287
Step 1 Remove HA, see Remove HA Via the CLI, on page 316 and Remove HA Via the GUI, on page 315.
Step 2 After both the primary and secondary servers reaches "HA not configured" state, perform the HA registration. See Set
Up High Availability, on page 285
Mode Description
HA initializing The HA registration process between the primary and secondary server has started.
Mode Description
HA alone Primary server is now running alone. HA is enabled, but the primary server is out of sync with the secondary,
or the secondary is down or otherwise unreachable.
Related Topics
High Availability Reference Information, on page 311
HA State Reference
The following table lists all possible HA states, including those that require no response from you.
Primary Alone Primary Primary restarted after it lost secondary. Only Health Monitor is running in this state.
HA Initializing Both HA Registration process between the primary and secondary server has started.
Primary Active Primary Primary server is now active and is synchronizing with secondary server.
Primary Database Copy Failed Primary Primary servers being restarted will always check to see if a data gap has occurred due
to the primary being down for 24 hours or more. If it detects such a gap, it will
automatically trigger a data copy from the active secondary server. In rare cases, this
database copy can fail, in which case this transition state is set on the primary. All
attempts to failback to the primary are blocked until the database copy completes
successfully. As soon as it does, the primary state is set to “Primary Syncing”.
Primary Lost Secondary Primary Primary server is unable to communicate with the secondary server.
Primary Preparing for Failback Primary This state will be set on primary server startup after a failover to the secondary. This
state signifies that the primary server has started up in standby mode (because the
secondary server is still active) and is ready for failback. Once the primary server is
ready for failback, its state will be set to “Primary Syncing”.
Primary Syncing Primary Primary server is synchronizing the database and configuration files from the active
secondary. Primary gets into this state when primary processes are brought up after
failover to secondary and secondary is playing the active role.
Primary Uncertain Primary Primary server's application processes are not able to connect to its database.
Secondary Alone Secondary Primary server is not reachable from secondary after primary server restart.
Secondary Syncing Secondary Secondary server is synchronizing the database and configuration files from the primary.
Secondary Active Secondary Failover from the primary server to the secondary server has completed successfully.
Secondary Lost Primary Secondary Secondary server is not able to connect to the primary server (occurs when the primary
fails or network connectivity is lost).
In case of automatic failover from this state, the secondary will automatically move to
Active state. In case of a manual failover, the user can trigger a failover to make the
secondary active.
Secondary Failback Secondary Failback triggered and in progress (database and file replication is in progress).
Secondary Post Failback Secondary This state occurs after failback is triggered, replication of database and configuration
files from the secondary to the primary is complete, and Health Monitor has initiated
changes of the secondary server's status to Secondary Syncing and the primary server's
status to Primary Active. These status changes and associated process starts and stops
are in progress.
Secondary Uncertain Secondary Secondary server's application processes are not able to connect to secondary server's
database.
Related Topics
High Availability Reference Information, on page 311
The following figure details all possible state transitions for the secondary server.
Related Topics
High Availability Reference Information, on page 311
Command Description
ncs ha authkey authkey Update the authentication key for high availability
Related Topics
High Availability Reference Information, on page 311
Step 1 Connect to the primary server via CLI. Do not enter “configure terminal” mode.
Step 2 Enter the following at the command line:
admin# ncs ha authkey MyNewAuthKey
Where MyNewAuthKey is the new authorization key. For more information, see How to Connect Via CLI, on page 119.
Related Topics
Before You Begin Setting Up High Availability, on page 286
High Availability Reference Information, on page 311
Step 1 Log in to the primary Prime Infrastructure server with a user ID that has administrator privileges.
Step 2 Select Administration > Settings > High Availability > HA Configuration.
Related Topics
Remove HA Via the CLI, on page 316
How to Trigger Failback, on page 300
High Availability Reference Information, on page 311
Step 1 Connect to the primary server via CLI. Do not enter “configure terminal” mode.
Step 2 Enter the following at the command line:
admin# ncs ha remove. For more information, see How to Connect Via CLI, on page 119.
Related Topics
Remove HA Via the GUI, on page 315
How to Trigger Failback, on page 300
High Availability Reference Information, on page 311
Step 1 Use the GUI to remove the HA settings from the primary server (see “Remove HA Via the GUI” in Related Topics).
Step 2 Restore the primary server as needed.
Step 3 Once the restore is complete, perform the HA registration process again.
For more information, see Restore Data, on page 58 and How to Connect Via CLI, on page 119.
Related Topics
Remove HA Via the GUI, on page 315
How to Register HA on the Primary Server, on page 287
High Availability Reference Information, on page 311
Step 1 Use the GUI to remove the HA settings from the primary server (see “Remove HA Via the GUI” in Related Topics,
below).
Step 2 Upgrade the primary server as needed.
Step 3 Re-install the secondary server using the current image.
Note that upgrading the secondary server from the previous version or a beta version is not supported. The secondary
server must always be a fresh installation.
Step 4 Once the upgrade is complete, perform the HA registration process again.
Note After upgrade, health montior page will display the below health monitor event message:
Primary Authentication Key was changed by Admin
For more information, see How to Connect Via CLI, on page 119.
Related Topics
Remove HA Via the GUI, on page 315
How to Register HA on the Primary Server, on page 287
High Availability Reference Information, on page 311
Step 1 View the Health Monitor page for the server having trouble.
Step 2 In the Logging area, in the Message Level dropdown, select the error-logging level you want.
Step 3 Click Save.
Step 4 When you want to download the log files: In the Logs area, click Download. You can open the downloaded log files
using any ASCII text editor.
Related Topics
Access the Health Monitor Web Page, on page 299
High Availability Reference Information, on page 311
• Every active primary MSE is backed up by another inactive instance. The purpose of the secondary MSE
is to monitor the availability and state of the primary MSE. The secondary MSE becomes active only
after the failover procedure is initiated.
• One secondary MSE can support one primary MSE.
The MSEs, Synchronize Services, Synchronization History, High Availability, Context Aware Notifications,
and Mobile Concierge pages on the Services tab are available only in the virtual domain in Release 7.3.
The following related topics provide additional details on the MSE high availability architecture.
Related Topics
MSE High Availability Pairing Matrix, on page 319
Guidelines and Limitations for MSE High Availability, on page 319
Failover Scenario for MSE High Availability, on page 320
Failback Scenario for MSE High Availability, on page 320
Licensing Requirements for MSE High Availability, on page 321
Configure MSE High Availability , on page 318
3355 Y N N N N
VA-2 N Y Y Y Y
VA-3 N N Y Y Y
VA-4 N N N Y Y
VA-5 N N N N Y
Related Topics
Using the Remote Model, on page 281
Guidelines and Limitations for MSE High Availability, on page 319
takes to restore the failed MSE, the longer you are running with a single MSE without high availability
support.
• You can use either manual or automatic failback.
• Both the primary and secondary MSE should be running the same software version.
• High Availability over WAN is not supported.
• High Availability over LAN is supported only when both the primary and secondary MSEs are in the
same subnet.
• The ports over which the primary and secondary MSEs communicate must be open (not blocked with
network firewalls, application fireways, gateways, and so on). The following input/output ports should
be opened: 80, 443, 8080, 8081, 22, 8001, 1521, 1411, 1522, 1523, 1524, 1525, 9006, 15080, 61617,
59000, 12091, 1621, 1622, 1623, 1624, 1625, 8083, 8084, and 8402.
Related Topics
Overview of the MSE High Availability Architecture, on page 318
MSE High Availability Pairing Matrix, on page 319
Failover Scenario for MSE High Availability, on page 320
Step 1 Ensure that the network connectivity between the primary and secondary MSEs is functioning and that all the necessary
ports are open.
Step 2 Install the correct version of MSE on the primary MSE.
Step 3 Make sure that the same MSE version is installed on the secondary MSE.
Related Topics
Replace Primary MSEs, on page 335
Configure MSE High Availability , on page 318
Note that the default gateway must be reachable from the first Ethernet interface.
Enter default gateway address [172.20.104.123]:
And, now you want to restore the configuration from Secondary via Cisco Prime Infrastructure
Do you wish to start this MSE in HA receovery mode?: (yes/no} [no]:no
Current IP address = [1.1.1.10]
Current eth0 netmask=[255.255.255.0]
Current gateway address=[1.1.1.1]
Configure eth0 interface parameters? (Y)es/(S)kip/(U)se default [Skip]:
Enter an IP address for first Ethernet interface of this machine.
Enter eth0 IP address [1.1.1.10]: 10.10.10.12
Enter the network mask for IP address 10.10.10.12
Enter network mask [255.255.255.0]: 255.255.255.0
Enter an default gateway address for this machine.
Note that the default gateway must be reachable from the first Ethernet interface. Enter default gateway address
[1.1.1.1]:10.10.10.1
The second Ethernet interface is currently disabled for this machine.
Configure eth1 interface parameters? (Y)es/(S)kip/(U)se default [Yes]: S
Time zone=America/Los_Angeles
Enable DNS=yes, DNS servers=8.8.8.8
Enable NTP=yes, NTP servers=time.nist.gov
Time zone=America/Los_Angeles
Root password is changed.
Cisco Prime Infrastructure password is changed.
------------------------------END-----------------------------
You may enter "yes" to proceed with configuration, "no" to make
more changes.
Configuration Changed
Is the above information correct (yes or no): yes
--------------------------------------------------------------
Checking mandatory configuration information...
Root password: Not configured
**WARNING**
The above parameters are mandatory and need to be configured.
-------------------------------------------------------------
Ignore and proceed (yes/no): yes
Setup will now attempt to apply the configuration. Restarting network services with new settings. Shutting down
interface eth0:
The system is minimally configured right now. It is strongly recommended that you run the setup script under
/opt/mse/setup/setup.sh command to configure all appliance related parameters immediately after installation is complete.
PRESS <ENTER> TO EXIT THE INSTALLER:
Database started successfully. STarting framework and services....... Framework and services successfully started
Step 14 After all services have started, confirm MSE services are working properly by entering the following command:
[root@mse1]# getserverinfo
Related Topics
Prepare the MSEs for High Availability, on page 321
Configure MSE High Availability on Secondary MSEs, on page 330
Configure MSE High Availability , on page 318
Direct connect configuration facilitates use of a direct cable connection between the primary and secondary MSE
servers.This can help reduce latencies in heartbeat response times, data replication and failure detection times.Please
choose a network interface that you wish to use for direct connect. You should appropriately configure the respective
interfaces.
"none" implies you do not wish to use direct connect configuration.
-------------------------------------------------------------------
Select direct connect interface [eth0/eth1/none] [none]:
Current IP address=[1.1.1.10]
Current eth0 netmask=[255.255.255.0] Current gateway address=[1.1.1.1]
Configure eth0 interface parameters? (Y)es/(S)kip/(U)se default [Yes]:
Enter an IP address for first Ethernet interface of this machine. Enter eth0 IP address [1.1.1.10]: 10.10.10.13
Enter the network mask for IP address 10.10.10.13
Enter network mask [255.255.255.0]:
Enter an default gateway address for this machine.
Note that the default gateway must be reachable from the first Ethernet interface. Enter default gateway address
[1.1.1.1]:10.10.10.1
The second Ethernet interface is currently disabled for this machine. Configure eth1 interface parameters? (Y)es/(S)kip/(U)se
default [Yes]: S
Restarting network services with new settings. Shutting down interface eth0:
The system is minimally configured right now. It is strongly recommended that you run the setup script under
/opt/mse/setup/setup.sh command to configure all appliance related parameters immediately after installation is complete.
PRESS <ENTER> TO EXIT THE INSTALLER:
Related Topics
Prepare the MSEs for High Availability, on page 321
Configure MSE High Availability on Primary MSEs, on page 322
Configure MSE High Availability , on page 318
A new license is required on the this new primary MSE, as the original license will not match the UDI of the primary,
and will not work.
Related Topics
Configure MSE High Availability on Primary MSEs, on page 322
Configure MSE High Availability , on page 318
• The primary and secondary controllers must be of the same hardware model.
• The primary and secondary controllers must be running the same Controller software release.
• The IP addresses of the management, redundancy management, and peer redundancy management
interfaces must be in the same subnet.
• The service port IP address and route information is maintained for each device.
• If the redundancy is enabled on a controller, the Prime Infrastructure or any other device cannot manage
the standby controller.
• You cannot enable the redundancy on a controller if the controller is added to the Prime Infrastructure
through the service port. You must delete the controller and add it through the management interface to
enable the redundancy on that controller.
• When there is an audit mismatch between a controller and the Prime Infrastructure, you must not restore
the redundancy parameters from the Prime Infrastructure on to the controller. However, you can refresh
the redundancy parameters in the Prime Infrastructure.
• Before you enable the redundancy, you must download the certificates for each device.
• Configuration is downloaded from the network to the active controller, and then the details are transferred
to the standby controller through the redundancy interface.
• When an old active controller pairs up with the new active controller, the control is not transferred back
to the old active controller and it becomes the standby controller for the new active controller.
Step 3 Select the group of wireless controllers that match the device for which you have configured the redundancy-management
interface IP address (for example: Cisco 5500 Series Wireless LAN Controllers). Members of this device group are
displayed on the right.
Step 4 Click on the Device Name of the controller for which you have configured the redundancy-management interface IP
address.
Step 5 Click the Configuration tab.
Step 6 From the left sidebar menu, choose Redundancy > Global Configuration. The Global Configuration page appears.
Step 7 You must configure the following parameters before you enable the redundancy mode for the primary controller:
a. Redundancy-Management IP—The IP address of the local physical management interface, which you had configured
in the redundancy-management interface details page is displayed. You can also modify the IP address.
b. Peer Redundancy-Management IP—Enter the IP address of the peer redundancy-management interface.
c. Redundant Unit—Choose Primary.
d. Mobility MAC Address—Enter the virtual MAC address for the redundancy pair. Ensure that the mobility MAC
address that you enter is the same for both primary and secondary controllers.
Step 8 Click Save. The Enabled check box for the redundancy mode becomes available.
Step 9 Select the Enabled check box for the redundancy mode to enable the redundancy on the primary controller.
After you enable the redundancy, you cannot modify the Redundancy-Management IP, Peer Redundancy-Management
IP, Redundant Unit, and Mobility MAC Address parameters.
You cannot configure this controller during the redundancy pair-up process.
Step 10 Click Save. The configuration is saved and the system reboots.
d. Mobility MAC Address—Enter the virtual MAC address of the redundancy pair. Ensure that the mobility MAC
address that you enter is the same for both primary and secondary controllers.
Step 8 Click Save. The Enabled check box for the redundancy mode becomes available for editing.
Step 9 Select the Enabled check box for the redundancy mode to enable the redundancy on the secondary controller.
After you enable the redundancy, you cannot modify the Redundancy-Management IP, Peer Redundancy-Management
IP, Redundant Unit, and Mobility MAC Address parameters.
You cannot configure the primary controller during the redundancy pair-up process.
Step 10 Click Save. The configuration is saved and the system reboots.
Step 6 From the left sidebar menu, choose me Redundancy > Global Configuration. The Global Configuration page appears.
Step 7 Complete the following fields:
a. Peer Service Port IP—Enter the IP address of the peer service port.
b. Peer Service Netmask IP—Enter the IP address of the peer service subnet mask.
Step 3 Select the group of wireless controllers that contains the controller for which you have configured the
redundancy-management interface IP address. Members of this device group are displayed on the right.
Step 4 Click on the Device Name of the controller for which you have configured the redundancy-management interface IP
address.
Step 5 Click the Configuration tab.
Step 6 From the left sidebar menu, choose Redundancy > Redundancy Commands.
Step 7 Under Administrative Commands, choose Select a command > Reset Standby > Go to reset the secondary server.
Step 8 Under Upload/Download Commands:
a) Choose the transport protocol you want to use when uploading files from the secondary to the primary server (TFTP
is the default).
b) ChooseSelect a command > Upload File from Standby Controller > Go to upload files from the secondary to the
primary server.
Note The mediatrace feature has been deprecated from the latest IOS releases.
supports tracing Real-Time Transport Protocol (RTP) and TCP application traffic paths across endpoints and
sites. Tracing data paths depends on Cisco Medianet and Web Services Management Agent (WSMA). Both
are built-in features of Cisco IOS software and Catalyst switches that help isolate and troubleshoot problems
with RTP and TCP data streams. supports all versions of Cisco Medianet and WSMA and makes it easy to
enable them on any router.
Where Cisco Network Analysis Module (NAM) traffic monitoring data is not available, supports RTP service
path tracing (Mediatrace) using Cisco Medianet Performance Monitor and Cisco IOS NetFlow. When properly
configured, Mediatrace can be your most valuable tool when troubleshooting RTP and TCP application
problems.
Related Topics
Prerequisites for Traffic Metrics With Mediatrace, on page 343
Configure Mediatrace on Routers and Switches, on page 345
Configure WSMA and HTTP(S) Features on Routers and Switches, on page 345
Step 1 Add NAMs to the system. You can do this either automatically using Discovery, or manually using bulk import or the
Device Work Center (see the section Add and Organize Devices in Cisco Prime Infrastructure User Guide).
Step 2 Enable NAM Data collection. To do this:
a) Choose Services > Application Visibility & Control > Data Sources.
b) In the NAM Data Collector section, select each NAM and click Enable to enable data collection on the selected
NAMs (see the section Enable NAM Data Collection in Cisco Prime Infrastructure User Guide).
Step 3 Create a site structure for your organization and assign your principal routers to the appropriate sites:
a) Choose Maps > Site Maps.
b) Add one or more campuses, buildings, and floors.
Step 4 Associate your sites with authorized data sources:
a) Choose Services > Application Visibility & Control > Data Deduplication.
b) Click Enable Data Deduplication, then click Apply. You can then assign authoritative sources for ART, Traffic
Analysis and Voice/Video data (see Enable Data Deduplication, on page 144).
Step 5 Associate your sites with endpoint subnets:
a) Choose Services > Application Visibility & Control > Endpoint Association.
b) Associate subnets with your sites. (see the section Associate Endpoints with a Site inCisco Prime Infrastructure User
Guide).
If you fail to do this, the data collected for these endpoints will have their sites set to “Unassigned.”
Step 6 Configure your routers for Mediatrace and WSMA (see the section Troubleshoot RTP and TCP Flows Using Mediatrace
in Cisco Prime Infrastructure User Guide).
For more details, see Control System Jobs".
Step 1 Create a site structure for your organization and assign your principal routers to the appropriate sites:
a) Choose Maps > Site Maps.
b) Add one or more campuses, buildings, and floors (for details, see the section Work With Site Maps in Cisco Prime
Infrastructure User Guide).
Step 2 Associate your sites with authorized data sources:
a) Choose Services > Application Visibility & Control > Data Deduplication.
b) Click Enable Data Deduplication, then click Apply. You can then assign authoritative sources for ART, Traffic
Analysis and Voice/Video data (see Enable Data Deduplication, on page 144).
Step 3 Associate your sites with endpoint subnets:
a) Choose Services > Application Visibility & Control > Endpoint Association.
b) Associate subnets with your sites. (see the section Associate Endpoints with a Site in Cisco Prime Infrastructure User
Guide).
If you fail to do this, by default the data collected for these endpoints will have their sites set to “Unassigned.”
Step 4 Configure your compatible routers for Cisco Medianet Performance Monitor (see Configure Mediatrace on Routers and
Switches).
Step 5 Configure your routers for Mediatrace and WSMA (see the section Troubleshoot RTP and TCP Flows Using Mediatrace
in Cisco Prime Infrastrucutre User Guide).
Related Topics
Enable Data Deduplication, on page 144
Step 1 Choose Configuration > Templates > Features & Technologies > CLI Templates > System Templates - CLI >
Mediatrace -Responder-Configuration.
Step 2 Enter the required information for the template (see the Field reference for the template).
Step 3 Click Save as New Template and give the new template a name and description. Click Save.
Step 4 Click Deploy to deploy the new template .
For more details, see Enabling NetFlow Data Collection, Field Reference: Mediatrace-Responder-Configuration and
Deploying Templates .
Step 1 Choose Configuration > Templates > Features & Technologies > CLI Templates > System Templates - CLI >
HTTP-HTTPS Server and WSMA Configuration-IOS.
Step 2 Enter the required information for the template (see the Field reference for the template.
Be sure to enable the HTTP protocol. WSMA over HTTPS is not supported in the current version of Prime Infrastructure.
Step 3 Click Save as New Template and give the new template a name and description. Click Save.
Step 4 Click Deploy to deploy the new template.
When adding a device to Prime Infrastructure, you must provide the HTTP user and password for the device.
For more details, see Field Reference: HTTP-HTTPS Server and WSMA Configuration-IOS, Deploying Templates and
Add Devices to Prime Infrastructure .
Related Topics
Configure Mediatrace on Routers and Switches, on page 345
Note To use the features described in this chapter, your Prime Infrastructure implementation must include Assurance
licenses. These features are supported on ASR platforms only.
In the following workflow, we take the role of a network administrator who has just been told that a large
staff expansion is planned for a branch office. This change will add more users to the branch LAN, many of
whom will be using WAN applications. We want to monitor the branch’s key interfaces for usage and traffic
congestion, so we can see if more users on the branch LAN will mean degraded WAN application performance
for those users. To be certain we have an adequate picture, we will need to look at both short- and long-term
performance trends for all the WAN applications the branch uses.
Before You Begin
• Set up the Top N WAN Interfaces by Utilization dashlet:
• Choose Monitor > Monitoring Policies and create an Interface Health template.
• Choose Inventory > Group Management > Port Groups, select the interfaces and click Add to
Group, then select WAN Interfaces as the group.
Step 4 To see the utilization statistics for the past month, click the Clock icon next to the Top N Interface Utilization dashlet
title to change the Time Frame on the Filters line to Past 4 Weeks.
Step 5 In the Top N Interface Utilization dashlet, find the WAN interface for the branch to which you are adding users.
Step 6 In the Interface column, click the interface’s name to display the Dashboard > Performance > Interface page for that
interface. The page shows the following dashlets for this single interface:
• Interface Details
• Interface Tx and Rx Utilization
• Top N Applications
• Top N Clients
• Number of Clients Over Time
• DSCP Classification
• QoS Class Map Statistics
• oS Class Map Statistics Trend
• Top Application Traffic Over Time
Step 7 Concentrate on the Top Application Traffic Over Time dashlet on this page. This dashlet gives a color-coded map of
the top ten applications with the heaviest traffic over this interface.
Step 8 To get a better idea of the longer-term performance trend, click the Clock icon next to the Top Application Traffic Over
Tim dashlet title to change the Time Frame to Past 24 Hours, Past 4 Weeks, or Past 6 Months.
To zoom in on particular spikes in the graph, use the Pan and Zoom handles in the lower graph.
Step 9 For a quick report of the same data as the interface page, choose Reports > Report Launch Pad. Then choose
Performance > Interface Summary. Specify filter and other criteria for the report, select the same interface in Report
Criteria, then click Run.
What to do next
The following table shows the ISP profile used to test against (it is very similar to the Caida.org Internet
profile).
Number of Parallel Active Users 60,000 Derived from the number of flows
Important At any point of time only one version of controller will be active (either 16.12.x or 17.6.1). By default when
you first install Prime Infrastructure 3.10, support for Catalyst 9800 17.6.1 will be active.
Step 1 Change the Catalyst 9800 version using https://<prime ip>/ncsdiag/coralService.html url.
Step 2 In the Coral Service page, click Change coral to change the current Catalyst 9800 version supported by Prime Infrastructure
3.10.
Example: If the Coral Service page shows the Current Coral verison is "Coral 17", once you click Change Coral you
will be swapped to "Coral 16".
Step 4 When Prime Infrastructure is not on High Availability mode, please skip to Step 5.
Step 5 Restart Prime Infrastructure
Important Restarting the server after toggling the version is essential for the new Catalyst 9800 changes to take effect.
Step 6 Go to the directory /opt/CSCOlumos/coralinstances/coral2/coral/bin to verify if the Catalyst 9800 version has changed
by running the ./coral version 1 commands:
When you have changed to version Catalyst 9800 17.6.1 , the expected result is:
ade # cd /opt/CSCOlumos/coralinstances/coral2/coral/bin/
ade # sudo ./coral version 1
BuildTime: 2021-07-30_14.55
ReleaseDate: Fri-30-Jul-21-16:16
BuildArch: x86_64
Platform: CORAL
Build: 17.06.01
BuildPath: /nobackup/mcpre/release/BLD-V17_06_01_FC6/binos
Version: 17.06.01.0.250.1627682159..Bengaluru
InstallVersion: 1.0.0
BootArch: Linux Name Space Container
Host System uptime: 0 days, 23 hours, 36 minutes, 13 seconds [84973.16 sec]
Coral service uptime: 0 days, 23 hours, 15 minutes, 53 seconds [83753.89 sec]
When you have changed to version Catalyst 9800 16.12.x, the expected result is:
ade # sudo ./coral version 1
BuildTime: 2019-07-30_16.43
ReleaseDate: Tue-30-Jul-19-08:15
BuildArch: x86_64
Platform: CORAL
Build: 16.12.01
BuildPath: /scratch/mcpre/release/BLD-V16_12_01_FC4/binos
Version: 16.12.1.0.544.1564530231..Gibraltar
InstallVersion: 1.0.0
BootArch: Linux Name Space Container
Host System uptime: 4 days, 22 hours, 24 minutes, 7 seconds [426247.80 sec]
Coral service uptime: 4 days, 0 hours, 16 minutes, 28 seconds [346588.20 sec]
ade #
During installation, Prime Infrastructure also creates a web root user account, prompting the installer for the
password to be used for this account. The web root account is needed to enable first-time login to the Prime
Infrastructure server and its web user interface. We recommend that you never use this account for normal
operations. Instead, use it to create user IDs with appropriate privileges for day-to-day operations and network
management, and administrative user IDs for managing Prime Infrastructure itself. Once these user accounts
are created, disable the default “web root” account created at install time, and create user accounts using your
administrative user IDs thereafter.
If you forget the shell password, you can recover (and then reset) the shell password by following the steps
to recover the administrator password. See Recovering Administrator Passwords on Virtual Appliances .
Because recovering the administrator password requires the Prime Infrastructure server to reboot, your system
might go down for approximately 20 minutes.
To disable the root accounts:
Step 1 Open a CLI session with the Prime Infrastructure server (seeHow to Connect Via CLI, on page 119 ). Do not enter
“configure terminal” mode.
Step 2 Disable the web root account by entering the following command:
PIServer/admin# ncs webroot disable
Prime Infrastructure disables the web root account.
Step 3 Disable the root shell account by entering the following command at the prompt:
PIServer/admin# shell disable
Prime Infrastructure will prompt you for the root shell account password. Enter it to complete disabling of the root shell
account.
Related Topics
Use SNMPv3 to Import Devices, on page 357
Use SNMPv3 to Run Discovery, on page 357
Use SNMPv3 Instead of SNMPv2, on page 356
Related Topics
Use SNMPv3 to Add Devices, on page 356
Use SNMPv3 to Run Discovery, on page 357
Use SNMPv3 Instead of SNMPv2, on page 356
Step 1 Select Inventory > Device Management > Discovery. The Discovery Jobs page appears.
Step 2 Click the Discovery Settings link in the upper right corner of the page. The Discovery Settings page appears.
Step 3 Choose New to add new SNMP v3 credentials.
Step 4 Complete the fields as needed.
Step 5 Click Save to save the SNMPv3 settings and use them thereafter.
Related Topics
Use SNMPv3 to Add Devices, on page 356
Use SNMPv3 to Import Devices, on page 357
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > Users > Users, Roles & AAA > TACACS+ or Administration > Users > Users, Roles &
AAA > RADIUS.
Step 3 Enter the TACACS+ or RADIUS server IP address and shared secret in the appropriate fields.
Step 4 Select Administration > Users > Users, Roles & AAA > AAA Mode Settings.
Step 5 Set the AAA mode as appropriate.
Related Topics
Authenticate With External AAA, on page 358
Set Up External AAA Via CLI, on page 358
Step 1 Log in to Prime Infrastructure using the command line, as explained in How to Connect Via CLI, on page 119 . Be sure
to enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to setup an external TACACS+ server:
PIServer/admin/terminal# aaa authentication tacacs+ server tacacs-ip key plain shared-secret
Where:
• tacacs-ip is the IP address of an active TACACS+ server.
• shared-secret is the plain-text shared secret for the active TACACS+ server.
Step 3 At the prompt, enter the following command to create a user with administrative authority, who will be authenticated by
the above AAA server:
PIServer/admin/terminal# username username password remote role admin email emailID
Where:
• username is the name of the user ID.
• password is the plain-text password for the user.
• emailID is the email address of the user (optional).
Related Topics
Authenticate With External AAA, on page 358
Set Up External AAA Via GUI, on page 358
Step 1 Log in to Prime Infrastructure using the command line, as explained in How to Connect Via CLI, on page 119 .Be sure
to enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to setup an external NTPv4 server:
PIServer/admin/terminal# ntp server serverIP userID plain password
Where:
• serverIP is the IP address of the authenticating NTPv4 server you want to use.
• userID is the md5 key id of the NTPv4 server.
• password is the corresponding plain-text md5 password for the NTPv4 server.
For example: ntp server 10.81.254.131 20 plain MyPassword
Step 3 To ensure that NTP authentication is working correctly, test it by executing the following commands:
• To check the NTP update details: sh run
• To check NTP sync details: sh ntp
Step 1 Log in to the Prime Infrastructure server using the command line, as explained in How to Connect Via CLI, on page 119
. Do not enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to enable client certificate authentication:
PIServer/admin# ocsp responder custom enable
Step 3 At the prompt, enter the following command to set the custom OCSP responder URL:
PIServer/admin# ocsp responder set url Responder#URL
Where:
• Responder# is the number of the OCSP responder you want to define (e.g., 1 or 2).
• URL is the URL of the OCSP responder, as taken from the client CA certificate.
Note that there should be no space between the Responder# and URL values.
Step 4 To delete an existing custom OCSP responder defined on the Prime Infrastructure server, use the following command:
PIServer/admin# ocsp responder clear url Responder#
If you do not already know the number of the OCSP responder you want to delete, use the show security-status command
to view the OCSP responders currently configured on the server. For details, see Check on Server Security Status.
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > Users > Users, Roles & AAA > Local Password Policy.
Step 3 Select the check boxes next to the password policies you want to enforce, including:
• The minimum number of characters passwords must contain.
If you enable any of the following password policies, you can also specify:
• The minimum password length, in number of characters.
• The minimum elapsed time between password re-uses.
• The password expiry period.
• The number of days in advance to start warning users about future password expiration.
22/tcp SSHD Used by SCP, SFTP, and SSH connections to and from the system N
1522/tcp Oracle Oracle/JDBC Database connections: These include both internal server N
connections and for connections with the High Availability peer server.
61617/tcp JMS (over SSL) For interaction with remote Plug&Play Gateway server Y
• Certificate Expiry
Prime Infrastructure does not send SNMPv2 Inform or SNMPv3 notifications.
Note Prime Infrastructure displays the alarms, stating the port unavailability, even if the traps are disabled for a
device.
Appliance Process FTP, MATLAB, Whenever the FTP, MATLAB, or TFTP process on Prime Infrastructure server fails,
Failure TFTP the server will generate a failure trap and the server's instance of Health Monitor will
try to restart the process automatically. If Health Monitor cannot restart it after 3 tries,
the HA server will send another failure trap.
Appliance Process NMS Whenever the NMS process on a server starts or fails, the Prime Infrastructure server's
Failure Health Monitor thread will generate a corresponding trap.
To stop or restart the process, connect to the server via CLI and log in as admin. Then
execute the nms stop or nms start command, as appropriate.
HA Operations Registration Trigger Prime Infrastructure generates this trap whenever the primary server initiates HA
registration (whether registration fails or succeeds).Once HA registration is triggered,
the primary server generates the trap, indicating the start of the operation.
HA Operations Registration Success When HA registration is successful, the primary server generates this trap, indicating
success.
HA Operations Registration Failure When HA registration fails for any reason, the primary or secondary server on which
the failure occurred, generates a trap indicating the failure. The trap contains details
about the failure. For assistance, contact the Cisco Technical Assistance Center (TAC).
HA Operations Failover Trigger This trap is generated whenever the Prime Infrastructure primary server fails and, as
part of a failover, the secondary server tries to become active (whether failover fails or
succeeds, and whether the secondary server comes up or fails to do so). If the HA
configuration (set during registration) has a Manual failover type, users must trigger
the failover. Otherwise, the Health Monitor will trigger failover to the secondary server
automatically.
One trap will be generated to indicate that the failover was triggered. Because the trap
is sent before the failover completes, it will not be logged on the secondary server.
HA Operations Failover Success When the triggered failover operation is successful, the secondary server generates a
trap indicating success. Users can view the trap in the secondary server's alarm browser.
HA Operations Failover Failure When the triggered failover operation fails, a trap will be generated indicating the
failure. Users can view the trap in the hm-#-#.log (see How to Troubleshoot Prime
Infrastructure SNMP Traps, on page 379). The trap contains details about the failure.
For assistance, contact Cisco TAC. As with other failure traps, alarms and a “clear”
trap are sent if the failure corrects itself.
HA Operations Failback Trigger This trap is generated whenever a failback to the primary server is triggered on the
secondary server (whether or not the failback is successful). Once the primary server
is restored, a user must trigger a failback from the secondary server to the primary
server using the Failback button on the secondary server Health Monitor web page
(there is no automatic Failback option). Once triggered, the secondary server generates
the trap indicating the start of the operation.
HA Operations Failback Success When the triggered failback operation is successful, the secondary server generates a
trap indicating success. Failback success sets the primary server to the ‘Active’ state
and the secondary server to the ‘Sync’ state.
HA Operations Failback Failure When the triggered failback operation fails, a trap will be generated indicating this
failure. Since the failure can occur on either server, the server on which it occurred will
generate the trap. Users can view the trap in the hm-#-#.log and on the northbound
management server.
A failback failure triggers an automatic rollback, in which the secondary server tries
to return to its previous ‘Active’ state. Failure of this operation will cause the secondary
server to generate an additional trap indicating rollback failure. The failure traps contain
details about the failures. For assistance, contact Cisco TAC. As with other failure traps,
alarms and a “clear” trap are sent if the failure corrects itself.
Hardware Traps CPU Utilization Traps will be sent only when the usage exceeds the preset threshold value for CPU
utilization. To view these traps, check the jobs and active sessions for the server that
generated the trap.
Hardware Traps Disk Utilization Traps will be sent only when the disk usage exceeds the set threshold limit for Disk
utilization. To respond, try to free up disk space under the /opt and /localdisk partitions.
Do not delete folders under /opt/CSCOlumos without guidance from Cisco TAC.
Hardware Traps Memory Utilization Traps will be sent to the SNMP trap receiver, only when memory usage exceeds the
set threshold limit for memory utilization.
Hardware Traps Disk Failure Traps will be sent to the SNMP trap receiver when disk failure is detected. Contact
your local system administrator for corrective action. As with other failure traps, alarms
and a “clear” trap are sent if the failure corrects itself.
Hardware Traps Fan Failure Traps will be sent to the SNMP trap receiver when fan failure is detected. The bad or
missing fan will be identified in the trap or alarm message. Contact your local system
administrator for corrective action. As with other failure traps, alarms and a “clear”
trap are sent if the failure corrects itself.
Hardware Traps PSU Failure Traps will be sent to the SNMP trap receiver when PSU failure is detected. The
problematic power supply will be identified in the trap or alarm message. Contact your
local system administrator for corrective action. As with other failure traps, alarms and
a “clear” trap are sent if the failure corrects itself.
Threshold Traps Backup Failure Traps will be sent to the SNMP trap receiver when failure of the daily background task
of Prime Infrastructure server backup is detected. The background task runs everyday
and takes a backup of the server at the scheduled time. If the backup fails due to
insufficient disk space, the event will be processed. If the backup is taken successfully,
the alarm will be cleared.
Threshold Traps Backup Threshold Informs users when Prime Infrastructure scheduled daily backup has not been taken
for a threshold number of days. The default threshold is seven days. If no backup has
been taken for seven days, users are notified by this event.
Threshold Traps Certificate Expiry Traps will be sent to the SNMP trap receiver when the certificate is about to expire. A
critical trap is sent when the certificate is set to expire in 15 days and a major trap is
sent when the certificate expiry is in 60 days.
System Traps Lifecycle Lifecycle license is used to manage devices. Alarm is generated when the license usage
exceeds the configured threshold percentage. By default, traps will be sent when the
usage exceeds 80%. However, this can be customized.
System Traps Assurance Assurance License is used to display the devices that pump NetFlow to Prime
Infrastructure. Alarm is generated when the license usage exceeds the configured
threshold percentage. By default, traps will be sent when the usage exceeds 80%.
However, this can be customized.
System Traps Collector Collector License is used to display the volume of NetFlow pumped to Prime
Infrastructure. Alarm is generated when the license usage exceeds the configured
threshold percentage. By default, traps will be sent when the usage exceeds 80%.
However, this can be customized.
System Traps Lifecycle License Traps will be sent when the expiry period of the License goes below the threshold limit.
By default, traps will be sent when the limit is 30 days. However, you can customize
the limit between 1-99 days. This event is considered only when you use Evaluation
License.
System Traps Assurance License Traps will be sent when the expiry period of the License goes below the threshold limit.
By default, traps will be sent when the limit is 30 days. However, you can customize
the limit between 1-99 days. This event is considered only when you use Evaluation
License.
System Traps Collector License Traps will be sent when the expiry period of the License goes below the threshold limit.
By default, traps will be sent when the limit is 30 days. However, you can customize
the limit between 1-99 days. This event is considered only when you use Evaluation
License.
the server, Result: Warning, Failure, Success, Information, Exception, MSG: Free-form text of the message
for a given SNMP Trap
Table A-2 describes possible values for each of the generic trap format attributes.
Attribute Value
Server From which server (Primary, Secondary or Standalone) was this trap sent?
Type Which type of action (Process, Sync, Activity, etc.) resulted in this trap?
Service Which Prime Infrastructure service reported this issue? The possible values include Registration, Failover, Failback,
NMS, NCS, Health Monitor, All, Prime Infrastructure, Database, Disk Space, and so on.
When At what point in the Prime Infrastructure server's life cycle (Startup, Shutdown, etc.) did this happen?
State What is the server state (Standalone, Failover, Failback, Registration, etc.)?
MSG Freeform text providing more details specific to each SNMP trap.
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
cWNotificationIndex None. Uniquely generated None None Index value that increases
for each trap. with each northbound trap
sent until it wraps back to
one.
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
cWNotificationSpecialAttributes All alarm fields Various, based on specific Various, based on Contains the contents of
alarm field specific alarm field the alarm itself (fields and
values)
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
Purpose Informs users that a specific Prime Infrastructure server service is down and
that the Health Monitor is attempting to restart it.
When Sent The trap is sent when Health Monitor tries to restart the process.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
Example Component: Health Monitor, Server: Primary, Type: Process, Service: NCS,
When: Startup, State: Stand Alone, Result: Warning, MSG: FTP service is
down and an attempt will be made to automatically restart the service
Value Type, Range and Constraints The servername parameter in the MSG attribute will take the value of the
Prime Infrastructure server’s host name. This parameter can take one of the
following values: NMS Server, FTP, TFTP or MATLAB.
Purpose Informs users that a failback from the secondary server to the
primary server has been initiated.
When Sent This trap is sent when a failback is initiated from the secondary
server to the primary server, irrespective of whether the failback
operation fails or succeeds.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
When Sent When the primary server is down and, as part of failover, the
secondary server comes up, traps are generated, irrespective of
whether the failover operation fails or succeeds.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
Purpose Informs users that CPU utilization has crossed the set threshold limit.
When Sent After the CPU utilization crosses the set threshold, the trap is generated on the next polling cycle.
The system poller job runs every 5 minutes. A trap is also generated when the threshold limit is
changed on the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1.
Example CPU Utilization is at 85% and has violated threshold limit of 80%.
Value Type, Range and All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying
Constraints a threshold limit.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle.
Purpose Informs users that disk utilization has crossed the set threshold limit.
When Sent After the disk utilization crosses the set threshold, the trap is generated on the next polling cycle. The
system poller job runs every 5 minutes. A trap is also generated when the threshold limit is changed
on the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1
Examples PI opt disk volume utilization is at 85% and has violated threshold limit of 0%.
PI opt disk volume is within the recommended disk usage range, less than 80% used.
PI local disk volume utilization is at 85% and has violated threshold limit of 80%.
PI local disk volume is within the recommended disk usage range, less than 80% used.
Value Type, Range and All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying
Constraints a threshold limit.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle.
Purpose Informs users that memory utilization has crossed the set threshold limit.
When Sent After the memory utilization crosses the set threshold, the trap is generated on the next polling cycle.
The system poller job runs every 5 minutes. A trap is also generated when the threshold limit is
changed on the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1.
Examples Memory Utilization is at 85% and has violated threshold limit of 80%.
Value Type, Range and All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying
Constraints a threshold limit.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle.
When Sent Once a disk drive issue is detected, a trap will be generated on the next polling cycle. The system poller
job runs every 5 minutes.
OID .1.3.6.1.4.1.9.9.712.0.1
Example Component: Appliance, Server: Standalone, Type: Hardware, Message: A problem was detected in the
RAID device. A rebuild is in progress. Device at enclosure 252 slot ZERO is bad or missing. Drive0 is
missing or bad.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle. If the drive is unplugged at
the time of system restart, the trap is generated.
When Sent When a fan fails, a trap is generated on the next polling cycle. The system poller job runs every 5 minutes.
OID .1.3.6.1.4.1.9.9.712.0.1
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle, or the fan is unplugged at the
time of system restart.
When Sent When a power supply is unplugged, a trap is generated on the next polling cycle. The system poller job
runs every 5 minutes.
OID .1.3.6.1.4.1.9.9.712.0.1
Example Component: Appliance, Server: Standalone, Type: Hardware, Message: Power supply: PSx is either bad
or missing.
Constraints and Caveats If the PSU is unplugged, a Power Supply alarm will be seen in Prime Infrastructure and a trap will be sent.
If the PSU is unplugged at the time of system shutdown, and Prime Infrastructure is not up till restart, an
alarm will not be generated.
When Sent When an ISE is down or unreachable, the trap is generated via polling.
Note This is a system generated trap. Hence it does not have any
corresponding OID.
Purpose Informs users when the number of devices Prime Infrastructure is actually managing exceeds the number of devices it
is licensed to manage.
When Sent At 2:10AM, on the day following the completion of the job that added the extra devices to Prime Infrastructure inventory
Note This is a system generated trap. Hence it does not have any corresponding OID.
Example Number of managed devices N is greater than licensed devices N. Please purchase and install a license that will cover
the number of managed devices, or remove unused devices from the system.
Table 35: Prime Infrastructure does not have enough disk space for backup
Purpose Informs users when Prime Infrastructure does not have sufficient space in the specified directory to perform a backup.
When Sent Whenever Prime Infrastructure runs a server backup job and the backup repository specified (or “defaultrepo”) is 100
percent full. The trap is generated after the job completes.
Note This is a system generated trap. Hence it does not have any corresponding OID.
Example Prime Infrastructure with address localIPAddress does not have sufficient disk space in directory directoryName for
backup. Space needed: Needed GB, space available Free GB.
Purpose Informs users that an attempt to send an email notification has failed.
When Sent This trap is generated by polling when Prime Infrastructure attempts to send an email notification to an invalid user,
or email notification is enabled without specifying the email server in Prime Infrastructure.
Note This is a system generated trap. Hence it does not have any corresponding OID.
Example Prime Infrastructure with address localIPAddress failed to send email. This may be due to possible SMTP
misconfiguration or network issues.
When Sent This trap is generated by polling when a destination northbound notification server is down or unreachable.
OID .1.3.6.1.4.1.9.9.712.0.1
Example Northbound notification server OSSIPAddress is unreachable. NCS alarms will not be processed for this server until
it is reachable.
Configure Notifications
For Prime Infrastructure to send northbound SNMP trap notifications, you must configure the correct settings
on both the Prime Infrastructure Event Notification and Notification Destiantion pages. Once configured,
traps will be generated based on the values associated with the Threshold and Severity for the following SNMP
Events:
• Appliance Process Failure
• HA Operations
• CPU, disk and memory utilization
• Disk, fan and PSU Failure
• Backup failure, certification expiry and licenses violations
You can edit the threshold and severity associated with each event, and enable or disable trap generation for
the associated event.
Step 1 Log in to Prime Infrastructure using a user ID with root domain privileges.
Step 2 Select Administration > Settings > System Settings > Alarms and Events > System Event configuration.
Step 3 For each SNMP event you want to configure:
a) Click on the row for that event.
b) Set the Event Severity level to Critical, Major, or Minor, as needed.
c) For the CPU, disk, memory utilization, life cycle, assurance, and collector traps: Enter the Threshold percentage
(from 1-99). These events will send the associated SNMP traps when the utilization exceeds the threshold limit. You
cannot set thresholds for events for which the threshold setting is shown as NA. These events send traps whenever
the associated failure is detected.
d) For backup threshold, certificate expiry, certificate expiry (critical), lifecycle license, assurance license, and collector
license trap: Enter the Threshold in days (from x-y, where x is the minimum value and y is the maximum value in
days).
e) Set the Event Status to Enabled or Disabled. If set to Enabled, the corresponding trap will be generated for this event.
f) For the CPU, disk, memory utilization, enter the Create and Clear Alarm Iteration value. The default value is two.
The first polling after setting the iteration value will take two times the iteration value entered in minutes. All the
future polling will take 20 minutes only.
The default polling time is 20 minutes.
Step 4 When you are finished, click Save to save your changes.
Related Topics
Configure Alarms Notification Destination, on page 229
Step 5 (Optional) Complete the same fields under Secondary SMTP Server.
Step 6 Under Sender and Receivers, enter a legitimate email address for the Prime Infrastructure server.
Step 7 (Optional) Enter a subject line in the Subject text box.
Step 8 When you are finished, click Save.
Related Topics
View Events and Alarms for SNMP Traps, on page 377
Filter Events and Alarms for SNMP Traps, on page 378
Purge Alarms for SNMP Traps, on page 379
How to Troubleshoot Prime Infrastructure SNMP Traps, on page 379
Configure Notifications, on page 376
Port Used To Send Traps , on page 377
Step 6 To save the Advanced filter, click the Save icon and supply a name for the filter.
Step 7 To clear the Advanced Filter, click Clear Filter.
For more details, see Purge Alarms for SNMP Traps, on page 379.
Related Topics
How to Troubleshoot Prime Infrastructure SNMP Traps, on page 379
Configure Notifications, on page 376
Port Used To Send Traps , on page 377
View Events and Alarms for SNMP Traps, on page 377
Filter Events and Alarms for SNMP Traps, on page 378
Step 1 Ping the notification destination from the Prime Infrastructure server, to ensure that there is connectivity between Prime
Infrastructure and your management application.
Step 2 Check if any firewall ACL settings are blocking port 162, and open communications on that port if needed.
Step 3 Log in to Prime Infrastructure with a user ID that has administrator privileges. Select Administration > Settings >
Logging and download the log files. Then compare the activity recorded in these log files with the activity you are seeing
in your management application:
• ncs_nb.log: This is the log of all the northbound SNMP trap messages Prime Infrastructure has sent. Check for
messages you have not received.
• ncs-# -# .log: This is the log of other recent Prime Infrastructure activity. Check for hardware trap messages you
have not received.
• hm-# -# .log: This is the complete log of Health Monitor activity. Check for recent messages about High Availability
state-changes and application-process failures that you have not received.
The messages you see in these logs should match the activity you see in your management application. If you find
major differences, open a support case with Cisco Technical Assistance Center (TAC) and attach the suspected log
files with your case.
Related Topics
Prime Infrastructure SNMP Trap Types, on page 364
Prime Infrastructure SNMP Trap Reference, on page 370
Configure Prime Infrastructure Traps , on page 375
• Ensure that the primary and secondary SSL server certificates used for Message Queue Ports 61617 and
Health Monitor port 8082 are available for extraction from primary and secondary servers for HA mode
with different IP addresses. See Set Up High Availability, on page 285 for more details.
• For virtual IP Address based HA, both primary and secondary servers must have the virtual IP address
and certificates. See Using Virtual IP Addressing With HA, on page 276 for more details.
• At least one of the server Message Queue port 61617 port must be active at all times depending on the
service which will take the HA role.
• Install the primary and secondary Plug and Play Gateway Virtual Machines. See the latest Cisco Prime
Infrastructure Quick Start Guide for details of installation of virtual machines from OVA file.
Note Cisco Plug and Play Gateway integrated with will not work when the primary and secondary servers have
different IP addresses because the bootstrap configuration needs to be changed according to the active node.
Related Topics
Cisco Plug and Play Gateway HA Prerequisites, on page 381
Set up Standalone Cisco Plug and Play Gateway for Prime Infrastructure HA, on page 382
Remove Cisco Plug and Play Gateway in HA, on page 385
Cisco Standalone Plug and Play Gateway Server HA Setup, on page 383
Cisco Plug and Play Gateway HA and Combinations, on page 386
Note The standalone Cisco Plug and Play Gateway with in HA has automatic failover from primary to secondary.
Manual failover is not available.
The standalone Cisco Plug and Play Gateway with in HA can be configured to failback manually or
automatically from the secondary to primary server.
Enter the Cisco Plug and Play Gateway virtual IP address, virtual host name, IP address and username and
password of the secondary server as part of pnp setup. Enter 0 for manual failback and 1 for automatic failback
when prompted during the setup.
Note We recommend manual failback. Automatic failback is not recommended because in case of scenarios like
flapping interface, failover and failback happens continuously.
Related Topics
Cisco Plug and Play Gateway Status, on page 384
How Cisco Plug and Play Gateway HA Works, on page 381
Setting up Cisco Plug and Play Gateway HA
Cisco Plug and Play Gateway HA and Combinations, on page 386
System | | UP |
------------------------------------------------------------------------------------------
Event Messaging Bus | PLAIN TEXT | UP | pid: 6426
CNS Gateway Dispatcher | PLAIN TEXT | UP | pid: 7107, port:
11011
CNS Gateway | PLAIN TEXT | UP | pid: 7141, port:
11013
CNS Gateway | PLAIN TEXT | UP | pid: 7180, port:
11015
CNS Gateway | PLAIN TEXT | UP | pid: 7224, port:
11017
CNS Gateway | PLAIN TEXT | UP | pid: 7263, port:
11019
CNS Gateway | PLAIN TEXT | UP | pid: 7309, port:
11021
CNS Gateway Dispatcher | SSL | UP | pid: 7381, port:
11012
CNS Gateway | SSL | UP | pid: 7537, port:
11014
CNS Gateway | SSL | UP | pid: 7581, port:
11016
CNS Gateway | SSL | UP | pid: 7685, port:
11018
CNS Gateway | SSL | UP | pid: 7855, port:
11020
CNS Gateway | SSL | UP | pid: 7902, port:
11022
HTTPD | | UP |
Image Web Service | SSL | UP |
Config Web Service | SSL | UP |
Resource Web Service | SSL | UP |
Image Web Service | PLAIN TEXT | UP |
Config Web Service | PLAIN TEXT | UP |
Resource Web Service | PLAIN TEXT | UP |
Prime Infrastructure Broker | SSL | UP | Connection: 1,
Connection Detail: ::ffff:10.104.105.170:61617
PnP Gateway Monitoring | SSL | UP | port: 11010
PnP Gateway HA | SSL | UP | Primary Server
is in Active state
bgl-dt-pnp-ha-217/admin#
Note When deleting Cisco Plug and Play Gateway HA, the administrator must manually modify the dynamic port
allocation cns event command and decommission the secondary server, if HA is being turned off. The Cisco
Plug and Play Gateway secondary server will continue to run with the virtual IP address if it is not
decommissioned.
Related Topics
Cisco Plug and Play Gateway HA and Combinations, on page 386
Limitations of Cisco Plug and Play Gateway HA, on page 386
How Cisco Plug and Play Gateway HA Works, on page 381
Setting up Cisco Plug and Play Gateway HA
Related Topics
Limitations of Cisco Plug and Play Gateway HA, on page 386
How Cisco Plug and Play Gateway HA Works, on page 381
Setting up Cisco Plug and Play Gateway HA
Remove Cisco Plug and Play Gateway in HA, on page 385
Cisco Plug and Play Gateway Status, on page 384
• integrated Plug and Play Gateway will support HA if the HA configuration in Prime is based on a virtual
IP address. HA with different IP addresses for primary and secondary servers will not support the Plug
and Play Gateway HA functionality in the integrated server.
• For the integrated Plug and Play Gateway, SSLv3 is disabled by default on all Gateway SSL ports (for
example, ports 11012, 11014, and so on).
• Related Topics
Related Topics
How Cisco Plug and Play Gateway HA Works, on page 381
Setting up Cisco Plug and Play Gateway HA
Remove Cisco Plug and Play Gateway in HA, on page 385
Cisco Plug and Play Gateway HA and Combinations, on page 386