Cisco Prime Infrastructure 3.9 Administrator Guide
Cisco Prime Infrastructure 3.9 Administrator Guide
Cisco Prime Infrastructure 3.9 Administrator Guide
9 Administrator Guide
First Published: 2020-12-17
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,
INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH
THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,
CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain version of
the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS" WITH ALL FAULTS.
CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT
LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS
HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network
topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional
and coincidental.
All printed copies and duplicate soft copies of this document are considered uncontrolled. See the current online version for the latest version.
Cisco has more than 200 offices worldwide. Addresses and phone numbers are listed on the Cisco website at www.cisco.com/go/offices.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL:
https://www.cisco.com/c/en/us/about/legal/trademarks.html. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. (1721R)
© 2020 Cisco Systems, Inc. All rights reserved.
CONTENTS
Add Licenses 21
Delete Licenses 21
Troubleshoot Licenses 21
Controller Licensing 23
MSE Licensing 25
Migrate Data from Cisco Prime LMS to Cisco Prime Infrastructure 165
User Interfaces, User Types, and How To Transition Between Them 167
User Interfaces and User Types 167
How to Transition Between the CLI User Interfaces in Prime Infrastructure 169
Transition Between the Prime Infrastructure admin CLI and Prime Infrastructure config CLI 170
Log In and Out as the Linux CLI root User 171
Enable and Disable root Access for the Linux CLI and the Prime Infrastructure Web GUI 172
Disable and Enable the Linux CLI Users in Prime Infrastructure 172
Disable and Enable the Web GUI root User 172
Control the Tasks Web Interface Users Can Perform (User Groups) 173
Types of User Groups 173
User Groups—Web UI 173
User Groups—NBI 174
View and Change the Tasks a User Can Perform 175
View and Change the Groups a User Belongs To 176
Renew AAA Settings After Installing a New Prime Infrastructure Version 222
Use Cisco ISE With RADIUS or TACACS+ for External Authentication 222
Convert Old Email and Trap Notification Data to New Alarm Notification Policy 241
Configure Default Settings for E-Mail Notifications 242
Specify Alarm Clean Up, Display and Email Options 242
Configure Global Display and Search Settings for Acknowledged, Cleared, and Assigned Alarms 245
Change Alarm Severity Levels 245
Change Alarm Auto-Clear Intervals 246
Change the Information Displayed in the Failure Source for Alarms 247
Change the Behavior of Expedited Events 247
Customize Generic Events That Are Displayed in the Web GUI 248
Disable and Enable Generic Trap and Syslog Handling 249
Disable and Enable Generic Trap Processing 249
Disable and Enable Generic Syslog Processing 249
Customize Generic Events Based on SNMP Traps 249
Troubleshoot Fault Processing Errors 250
Get Help from the Cisco Support Community and Technical Assistance Center (TAC) 251
Open a Cisco Support Case 251
Join the Cisco Support Community 252
Audit Configuration Archive and Software Image Management Changes ( Change Audit Dashboard)
253
What is the Difference Between “Major Polling” and “Minor Polling”? 280
Enable Backward Compatibility between Catalyst 9800 WLC Devices and Prime Infrastructure 3.9
365
APPENDIX C Configure High Availability for Plug and Play Gateway 395
How Cisco Plug and Play Gateway HA Works 395
Cisco Plug and Play Gateway HA Prerequisites 395
Set up Standalone Cisco Plug and Play Gateway for Prime Infrastructure HA 396
Cisco Prime Infrastructure in HA with Virtual IP Address 396
Cisco Prime Infrastructure in HA with Different IP Address 396
Cisco Standalone Plug and Play Gateway Server HA Setup 397
Cisco Plug and Play Gateway Status 398
Remove Cisco Plug and Play Gateway in HA 399
Cisco Plug and Play Gateway HA and Cisco Prime Infrastructure Combinations 400
Install any required product licenses and software updates Licenses and Software Updates, on page 19
Modify the stored Cisco.com credentials (user name and Configure Stored Cisco.com Credentials, on
password) used to log on to Cisco.com and: page 93
• Check for product updates
• Check for device software image updates
• Open or review Cisco support cases
Task See
Set up HTTPS on the server for secure interactions between Secure the Connectivity of the Prime
the server and browser-based GUI client (you can use HTTP Infrastructure Server, on page 81
but HTTPS is recommended)
Adjust data retention and purging Data Collection and Background Tasks, on page
145
For server-related traps that signal system problems, Customize Server Internal SNMP Traps and
customize the threshold settings and severities, and forward Forward the Traps, on page 103
the traps as SNMP trap notifications to configured receivers
Configure Alarms Notification Destination, on
page 239
Set up NTP (Network Time Protocol) so that time is Set Up NTP on the Server, on page 90
synchronized between the server and network devices
Configure FTP/TFTP on the server for file transfers between Enable FTP/TFTP/SFTP Service on the Server,
the server and network devices on page 92
Configure a proxy for the Prime Infrastructure server Set Up the Prime Infrastructure Proxy Server ,
on page 91
Configure the email server Set Up the SMTP E-Mail Server, on page 92
Set global SNMP polling parameters for managed network Configure Global SNMP Settings for
elements Communication with Network Elements, on
page 94
Enable the Compliance feature if you plan to use it to identify Enable and Disable Compliance Auditing
device configuration deviations
Configure product feedback to help Cisco improve its Set Up Defaults for Cisco Support Requests,
products on page 104
Configure product feedback to help Cisco improve its Configure Cisco Product Feedback Settings,
products on page 104
Create web GUI users that have administration Create Web GUI Users with Administrator Privileges, on
privileges, and disable the web GUI root page 199
account
Disable and Enable the Web GUI root User, on page 172
Task See
Create user accounts and user groups Control the Tasks Web Interface Users Can Perform (User
Groups), on page 173
Adjust user security settings (password rules Configure Global Password Policies for Local
for local authentication, idle time logout setting) Authentication, on page 209
Configure the Global Timeout for Idle Users, on page 209
Specify which users can approve jobs Configure Job Approvers and Approve Jobs, on page 207
Create virtual domains to control device access Create Virtual Domains to Control User Access to Devices,
on page 211
Create a message that is displayed when users Create a Login Banner (Login Disclaimer), on page 93
log in to the GUI client
Forward alarms and events to other receivers in e-mail Configure Alarms Notification Destination, on
format page 239
Forward alarms and events to other receivers in SNMP Configure Alarms Notification Destination, on
trap format page 239
Configure global settings for alarm and event displays Configure Global Display and Search Settings for
and searches: Acknowledged, Cleared, and Assigned Alarms,
on page 245
• Hide acknowledged, assigned, and cleared alarms in
the Alarms and Events tables
• Include acknowledged and assigned alarms in search
results
• Include device names in alarm messages
Customize the severity for specific events Change Alarm Severity Levels, on page 245
Customize the auto-clear interval for specific alarms Change Alarm Auto-Clear Intervals, on page 246
Make the text in the alarm Failure Source field more Change Alarm Severity Levels, on page 245
user-friendly
Control generic event handling Disable and Enable Generic Trap Processing, on
page 249
Task See
Control if and how users can create Cisco Support Set Up Defaults for Cisco Support Requests, on
Requests page 104
Note You can also activate your operation center license on the Prime Infrastructure server that will host Operations
Center using smart licensing feature. Applying the smart license will also automatically enableOperations
Center as the SSO server for the cluster of Prime Infrastructure instances it manages. To know more on Smart
Licensing, see Smart Licensing, on page 32.
2. Add to Operations Center the Prime Infrastructure instances you want to manage. You can configure each
instance as an SSO client as it is added to Operations Center
3. (Optional) Disable the personal and global idle-user timeouts for Operations Center and all of its managed
instances.
4. (Optional) Configure remote AAA using TACACS+ or RADIUS servers for Operations Center and all
of its managed instances,
• By default, five is the maximum SSO login sessions for one Operations Center user. This is also applicable
for instances. Hence, ensure that the number of Active SSO Sessions does not exceed five, or else the
managed instances will go into an “unreachable” state.
• If you plan to use remote AAA with Operations Center: Set up a RADIUS or TACACS+ AAA server
before you begin (see “Enable AAA for Operations Center” in Related Topics)
Operations Center does not require a separate installation. Instead, you can select or install the Prime
Infrastructure server that you want to use to manage other Prime Infrastructure instances, and then activate
an Operations Center license on that server.
Note Enabling Operations Center license will prevent the same server instance from monitoring the devices directly.
The devices will be added to a separate instance.
When activating the license, Operations Center automatically configures itself as the SSO server Prime
Infrastructure.
The number of Prime Infrastructure instances you can manage using Operations Center depends on the license
you have purchased. For details, see the Cisco Prime Infrastructure Ordering and Licensing Guide.
Step 1 Select Administration > Licenses and Software Updates > Licenses > Files > License Files. The License Files page
displays.
Step 2 Click Add. The Add a License File dialog box displays.
Step 3 Click Choose File.
Step 4 Navigate to your license file, select it, then click Open.
Step 5 Click OK. Prime Infrastructure will confirm that the Operations Center license has been added.
Step 6 If you are notified that SSO is not set up:
• Click Yes, to configure this new Operations Center as an SSO server automatically.
• Click No to configure SSO with DNS Name. Seamless SSO will Add SSO server with DNS Name.
Step 7 When prompted to log out: Click OK. The newly active license should now be listed in the Licenses > License Files
page.
Step 8 Log out of Prime Infrastructure and then log back in. The login page that appears should display “Cisco Prime Infrastructure
Operations Center [SSO]”, which indicates the license has been applied.
Related Topics
Set Up Operations Center, on page 4
Enable AAA for Operations Center, on page 7
Change User Group Memberships, on page 198
Step 1 If this is the first time you are choosing Smart licenses:
a) Choose Administration > Licenses and Software Updates > Licenses.
After a few moments, Prime Infrastructure displays a dialog box informing you that you cannot access the page
because you are not using traditional licensing. This is normal.
b) In the dialog box, click Smart License Settings.
c) Click the Licensing Settings tab.
Step 2 If you are already using Smart Licensing:
a) Choose Administration > Licenses and Software Updates > Smart Software Licensing.
b) Click the Licensing Settings tab.
Step 3 Click Smart Software Licensing radio button.
Step 4 Choose Prime Infrastructure Operation Center from the Product Name drop-down list and click Enable Smart Software
Licensing.
Note To enable Operation Center SSO, click Yes in the If you want to add SSO for the same server with IP/DNS
dialog box.
Step 5 Select the licenses in the Available Licenses dialog box, then click Save.
c) Click OK again.
Step 6 Repeat these steps to add more Prime Infrastructure servers, up to the license limit.
Note If you configure High Availability on a managed instance after adding it in Prime Operations Center, make
sure that the primary and secondary server details are appearing correctly by navigating to the Monitor >
Managed Elements > Manage and Monitor Servers.
Related Topics
Set Up Operations Center, on page 4
Add SSO Servers
Related Topics
Set Up Operations Center, on page 4
5. Click on Enable Fall-back to Local check box and select "On Authentication Failure or No Response from
Server" from the drop-down list. Remember that the shared secret configured on the AAA server must
match the shared secret.
Note Make sure you do not change the AAA setting under Administration > Users > Users, Roles & AAA >
AAA Mode Setting. It should be in SSO mode only.
Note Prime Infrastructure Manage Instance will only fall back to TACACS+ or RADIUS if SSO server is unreachable
or not responding.
What to do Next
When you have completed the setup tasks, you are ready to use Operations Center.
You can enable the Operations Center instance for High Availability (HA). HA uses a pair of linked,
synchronized Prime Infrastructure servers, to minimize or eliminate the impact of application or hardware
failures that may take place on either server. For details, see “Enable HA for Operations Center” in Related
Topics
Related Topics
Set Up Operations Center, on page 4
Enable HA for Operations Center, on page 295
Configure SNMP
To ensure that Prime Infrastructure can query SNMP devices and receive traps and notifications from them,
you must:
• Set SNMP credentials (community strings) on each device you want to manage usingPrime Infrastructure.
• Configure these same devices to send SNMP notifications to thePrime Infrastructure server.
Use the following Cisco IOS configuration commands to set read/write and read-only community strings on
an SNMP device:
where:
• private and public are the community strings you want to set.
After you set the community strings, you can specify that device notifications be sent as traps to the Prime
Infrastructure server using the following Cisco IOS global configuration command on each SNMP device:
admin(config)# snmp-server host Host traps version community notification-type
where:
• Host is the IP address of the Prime Infrastructure server.
• version is the version of SNMP that is used to send the traps.
• community is the community string sent to the server with the notification operation.
• notification-type is the type of trap to send.
You may need to control bandwidth usage and the amount of trap information being sent to the Prime
Infrastructure server using additional commands.
For more information on configuring SNMP, see:
• The snmp-server community and snmp-server host commands in the Cisco IOS Network Management
Command Reference.
• The Configuring SNMP Support section and the list of notification-type values in the Cisco IOS
Configuration Fundamentals Configuration Guide, Release 12.2.
If you are planning on implementing IPSec tunneling between your devices and the Prime Infrastructure
server, be advised that you will not receive syslogs transmitted from those devices to the Prime Infrastructure
server after implementing IPSec tunneling because IPSec does not support free-form syslogs. However, IPSec
does support SNMP traps. To continue getting SNMP notifications of any kind from these devices, you need
to configure your devices to send SNMP traps to thePrime Infrastructure server.
Configure NTP
Network Time Protocol (NTP) must be properly synchronized on all devices in your network as well as on
thePrime Infrastructure server. This includes all Prime Infrastructure-related servers: any remote FTP servers
that you use for Prime Infrastructure backups, secondary Prime Infrastructure high-availability servers, the
Prime Infrastructure Plug and Play Gateway, VMware vCenter and the ESX virtual machine, and so on.
You specify the default and secondary NTP servers during Prime Infrastructure server installation. You can
also use Prime Infrastructure ntp server command to add to or change the list of NTP servers after installation.
For details, see How to Connect Via CLI, on page 125 and the section on the ntp server command in the
Command Reference Guide . Note that Prime Infrastructure cannot be configured as an NTP server; it acts
as an NTP client only.
Failure to manage NTP synchronization across your network can result in anomalous results in Prime
Infrastructure. Management of network time accuracy is an extensive subject that involves the organization's
network architecture, and is outside the scope of this Guide. For more information on this topic, see (for
example) the Cisco White Paper Network Time Protocol: Best Practices .
Table 1: Prime Infrastructure Assurance: Supported Data Sources, Devices and Software Versions
Device Type Cisco IOS Releases Supported NetFlow Export NetFlow Configuration
That Support NetFlow Types
Catalyst 15.0(1)SE TCP and UDP traffic See the Configure NetFlow on Catalyst 3000, 4000, and 6000
3750-X / Family of Switches section in the Cisco Prime Infrastructure
IP base or IP services
3560-X User Guide.
feature set and equipped
with the network
services module.
' 15.0(1)EX TCP and UDP traffic, To configure TCP and UDP traffic, See the Configure NetFlow
Voice & Video on Catalyst 3000, 4000, and 6000 Family of Switches section
Catalyst 3850
in the Cisco Prime Infrastructure User Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
Device Type Cisco IOS Releases Supported NetFlow Export NetFlow Configuration
That Support NetFlow Types
Catalyst 4500 15.0(1)XO and 15.0(2) TCP and UDP traffic, To configure TCP and UDP traffic, See the Configure NetFlow
Voice & Video on Catalyst 3000, 4000, and 6000 Family of Switches section
in the Cisco Prime Infrastructure User Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
Catalyst 6500 SG15.1(1)SY TCP and UDP traffic, To configure TCP and UDP traffic, See the Configure NetFlow
Voice & Video on Catalyst 3000, 4000, and 6000 Family of Switches section
in the Cisco Prime Infrastructure User Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
ISR 15.1(3) T TCP and UDP traffic, To configure TCP and UDP traffic, use this CLI template:
Voice & Video
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Collecting
Traffic Statistics
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
ISR G2 15.2(1) T and 15.1(4)M TCP and UDP traffic, To configure TCP, UDP, and ART, see the Configure NetFlow
application response time, on ISR Devices section in Cisco Prime Infrastructure User
Voice & Video Guide.
To configure Voice & Video, use this CLI template:
Configuration > Templates > Features & Technologies >
CLI Templates > System Templates - CLI > Medianet -
PerfMon
ISR G2 15.2(4) M2 or later, TCP and UDP traffic, To configure TCP, UDP, and ART, see the Improve
15.3(1)T or later application response time, Application Performance With Application Visibility and
Voice and Video Control chapter in the Cisco Prime Infrastructure User Guide.
Use a configuration like the following example to ensure that Prime Infrastructure gets the Medianet data it
needs:
• flow record type performance-monitor PerfMonRecord
• match ipv4 protocol
• match ipv4 source address
• match ipv4 destination address
• match transport source-port
• match transport destination-port
• collect application media bytes counter
• collect application media bytes rate
• collect application media packets counter
• collect application media packets rate
• collect application media event
• collect interface input
• collect counter bytes
• collect counter packets
• collect routing forwarding-status
• collect transport packets expected counter
• collect transport packets lost counter
• collect transport packets lost rate
• collect transport round-trip-time
• collect transport event packet-loss counter
• collect transport rtp jitter mean
• collect transport rtp jitter minimum
• collect transport rtp jitter maximum
• collect timestamp interval
• collect ipv4 dscp
• collect ipv4 ttl
• interfacename is the name of the interface (such as GigabitEthernet0/0 or fastethernet 0/1) sending
Medianet NetFlow data to the specified PrInIP .
For more information on Medianet configuration, see the Medianet Reference Guide.
As of version 2.1, Prime Infrastructure supports Flexible NetFlow versions 5 and 9. Note that you must enable
NetFlow on each physical interface for which you want Prime Infrastructure to collect data. These will normally
be Ethernet or WAN interfaces. This applies to physical interfaces only. You do not need to enable NetFlow
on VLANs and Tunnels, as they are included automatically whenever you enable NetFlow on a physical
interface.
Use the following commands to enable NetFlow on Cisco IOS devices:
• Device(config)# interface interfaceName
• Device(config)# ip route-cache flow where interfaceName is the name of the interface (such as fastethernet
or fastethernet0/1) on which you want to enable NetFlow.
Once NetFlow is enabled on your devices, you must configure exporters to export NetFlow data to Prime
Infrastructure. You can configure an exporter using these commands:
• Device(config)# ip flow-export version 5
• Device(config)# ip flow-export destination PrInIP PiInPort
• Device(config)# ip flow-export source interfaceName where:
If you configure multiple NetFlow exporters on the same router, make sure that only one of them exports to
the Prime Infrastructure server. If you have more than one exporter on the same router exporting to the same
destination, you risk data corruption.
Use the following commands to verify that NetFlow is working on a device:
• Device# show ip flow export
• Device# show ip flow export
• Device# show ip cache flow
• Device# show ip cache verbose flow
If your NAMs are deployed properly, then no other pre installation work is required. When you conduct
discovery using Cisco Prime AM, you will need to enter HTTP access credentials for each of your NAMs.
Prime Infrastructure uses a more efficient REST interface to query NAMs. For this reason, it does not support
the direct export of NetFlow data from NAMs. Any device exporting NetFlow data must export that NetFlow
data directly to Prime Infrastructure, not via a NAM. Exporting NetFlow data from any NAM to Prime
Infrastructure will result in data duplication.
Router (config)# collect art all where application name is the name of the application whose flow data you
want to collect.To Configure teh PA flow Monitor type:
• Router (config)# flow monitor type mace mace-monitor
• Router (config)# record mace-record
• Router (config)# exporter mace-export
To configure a PA policy map and forward the PA traffic to the correct monitor:
• Router (config)# policy-map type mace mace_global
• Router (config)# class mace-traffic
• Router (config)# flow monitor mace-monitor
For more information on configuring Performance Agent, see the Cisco Performance Agent Deployment
Guide.
Step 1 Download the appropriate point patch to a local resource in your environment:
a) With the Cisco Download Software navigator displayed in your browser, choose Products > Cloud and Systems
Management > Routing and Switching Management > Network Management Solutions > Prime Infrastructure.
b) Select the version of Prime Infrastructure that most closely matches the one you are currently using.
c) Click Prime Infrastructure Patches to see the list of available patches for that version of the product.
d) Next to each patch that is required, click Download, then follow the prompts to download the file.
Step 2 Open a command-line interface session with the Prime Infrastructure server (see How to Connect Via CLI, on page 125
).
Step 3 Copy the downloaded patch file to the default local repository. For example:
admin# copy source path/defaultRepo
Where:
• source is the downloaded patch file’s location and name.
• path is the complete path to the default local backup repository, defaultRepo (for example: /localdisk )
To ensure you have the licenses to achieve these goals, do the following:
1. Familiarize yourself with the types of license packages available to you, and their requirements.
2. View the existing licenses. See for help on ordering and downloading licenses.
3. Calculate the number of licenses you will need, based both on the package of features you want and the
number of devices you need to manage.
4. Add new licenses.
5. Delete existing licenses.
Note As Prime Infrastructure no longer supports the node-locked licensing approach, the UDI information required
to generate licenses are limited to a standard syntax as shown below:
• PID = PRIME-NCS-APL (For Physical Appliance)
PID = PRIME-NCS-VAPL (For Virtual Appliance/Virtual Machine)
• SN = ANY:ANY
You must provide the subtleties in the mentioned format to generate new licenses.
For more information, see Cisco Prime Infrastructure Ordering and Licensing Guide.
Related Topics
Verify License Details , on page 20
Add Licenses , on page 21
Delete Licenses, on page 21
Add Licenses
You need to add new licenses when:
• You have purchased a new Prime Infrastructure license.
• You are already using Prime Infrastructure and have bought additional licenses.
Step 1 Choose Administration > Licenses and Software Updates > Licenses.
Step 2 In the Summary folder, click Files, then click License Files.
Step 3 Click Add.
Step 4 Browse to the location of the license file, then click OK.
Related Topics
Delete Licenses, on page 21
Troubleshoot Licenses, on page 21
MSE License Structure Matrix, on page 25
Verify Assurance License Details, on page 30
Delete Licenses
When you delete licenses from Prime Infrastructure, all licensing information is removed from the server.
Make a copy of your original license file in case you want to add it again later. There are several reasons you
might want to delete licenses:
• You installed temporary licenses and want to delete them before applying your permanent licenses.
• You want to move your licenses to a different server. You must first delete the licenses from the original
server, then send an email to licensing@cisco.com requesting a re-host for your licenses. You can then
apply the re-hosted licenses to the new server.
Step 1 Choose Administration > Licenses and Software Updates > Licenses.
Step 2 Click Files > License Files.
Step 3 Select the license file you want to delete, then click Delete.
Related Topics
Add Licenses , on page 21
Troubleshoot Licenses, on page 21
MSE License Structure Matrix, on page 25
Verify Assurance License Details, on page 30
Troubleshoot Licenses
To troubleshoot licenses, you will need to get details about the licenses that are installed on your system. to:
• Get a quick list of the licenses you have: Click Help > About Prime Infrastructure.
• Get license details: Choose Administration > Licenses and Software Updates > Licenses.
When troubleshooting licenses, it is important to remember that Prime Infrastructure has six types of licenses:
• Base: Required for every Prime Infrastructure installation. The requirement stems primarily from the
need to do accurate royalty accounting by knowing how many Prime Infrastructure instances have been
purchased. A Base license is required for each instance of Prime Infrastructure, and is a prerequisite for
all other license types.
• Lifecycle: Regulates the total number of devices under Prime Infrastructure management. Lifecycle
license is consumed only for admin VDC in Prime Infrastructure. The child VDC does not consume any
license. It is either auto-added by admin or added separately.
• Assurance: Regulates the total number of NetFlow devices under Prime Infrastructure management.
• Collector: Regulates the total number of NetFlow data flows per second that Prime Infrastructure can
process.
Lifecycle and Assurance licenses are supplied in either evaluation or permanent form (there is no explicit
evaluation version of the Base or Collector licenses):
• Evaluation: These licenses permit or extend access to Prime Infrastructure for a pre-set period. You can
apply only one evaluation license of each type (that is, only one Lifecycle evaluation license, one Assurance
evaluation license, and so on). You cannot apply an evaluation license over a permanent form of the
same license.
• Permanent License: These permit access to Prime Infrastructure features as specified and are not
time-limited. Permanent licenses can be applied over evaluation licenses, and can also be applied
incrementally (that is, you can have multiple permanent Assurance licenses, and so on).
Prime Infrastructure also performs the following basic license checks:
• A Lifecycle license is a required prerequisite for Assurance licenses.
• An Assurance license is a required prerequisite for Collector licenses.
Also note that:
• From Release 3.0 Prime Infrastructure enables the user to set threshold limit for generating an alarm for
all licenses. To set threshold limit for licenses, see “Configuring Notifications” in Related Topics.
• Prime Infrastructure hides Assurance-related features, menu options and links until an Assurance license
is applied. Even if you have purchased an Assurance license, these features remain hidden until you
apply it.
• Whenever you apply an Assurance license, you automatically apply a Collector license permitting an
instance of Prime Infrastructure to process up to 20,000 NetFlow data flows per second. Collector licenses
permitting 80,000 flows per second can be applied only with the Professional or equivalent configurations,
due to the hard disk requirements imposed by this data rate.
• You can add Lifecycle and Assurance permanent licenses incrementally. However, you can add only
one Collector 80K license, and then only with the Professional or equivalent configuration.
The following table provides some scenarios and tips for troubleshooting.
Prime Infrastructure The license file may be corrupted and unusable. 1. Delete the existing license.
reports a Licensing This can occur anyone attempts to modify the 2. Download and install a new license.
error. license file.
Unable to add new Some types of license must be added in the correct 1. Add the Base license
licenses. order. The Base license is a prerequisite for adding 2. Add Lifecycle licenses
Lifecycle licenses. A Lifecycle license is a 3. Add Assurance licenses
prerequisite for adding an Assurance license. An 4. Add Datacenter licenses
Assurance license is a prerequisite for adding a
5. Add Collector licenses
Collector license (a Collector license is added
automatically with the Assurance license).
The state of the devices The device limit must be less than or equal to 1. Delete the additional devices.
has changed to lifecycle license limit. The state of the inventoried 2. The state of the devices will change to managed after
unmanaged. devices will change to unmanaged if you add or the 24 hours synchronization.
delete devices.
To verify that the status of the inventoried devices has
changed to “managed” after synchronization:
1. Choose Monitor > Network Devices.
2. Check the Inventory Collection Status column for
the row listing the devices in which you are
interested. This will give you a summary of current
collection status efforts for those devices.
3. For details about the collection status, hover the
mouse cursor over the cross-hair icon in the Inventory
Collection Status column.
Related Topics
Configure Notifications, on page 390
Add Licenses , on page 21
Delete Licenses, on page 21
MSE License Structure Matrix, on page 25
Verify Assurance License Details, on page 30
Controller Licensing
To view controller licenses, choose Administration > Licenses and Software Updates > Licenses, then
select Files > Controller Files from the left sidebar menu.
Note Prime Infrastructure does not directly manage controller licenses, rather it simply monitors the licenses. To
manage the licenses you can use command-line interface (CLI) commands, Web UI, or Cisco License Manager
(CLM), or Cisco Smart Software Manager (CSSM).
For every physical license installed, two license files display in the controller: a feature level license and an
ap-count license. For example if you install a “WPlus 500” license on the controller, “wplus” and
“wplus-ap-count” features are displayed. There are always two of these features active at any one time that
combine to enable the feature level (WPlus or Base) and the AP count.
You can have both a WPlus and a Base license, but only one can be active at any given time.
• AP Limit
AP Limit—The maximum capacity of access points allowed to join this controller.
• EULA status—Displays the status of the End User License Agreement and is either Accepted or Not
Accepted.
• Comments
Comments—User entered comments when the license is installed.
• Type
Type—The four different types of licenses are as follows:
• Permanent
Permanent—Licenses are node locked and have no usage period associated with them. They are
issued by Cisco licensing portal and must be installed using management interfaces on the device.
Upon installation of these licenses, you have the necessary permissions across different versions.
• Evaluation—Licenses are non-node locked and are valid only for a limited time period. They are
used only when no permanent, extension, or grace period licenses exist. Before using an evaluation
license, you must accept an End User License Agreement (EULA). Even though they are non-node
locked, their usage is recorded on the device. The number of days left displays for the evaluation
license with the fewest number of remaining active license days.
• Extension—Licenses are node locked and metered. They are issued by Cisco licensing portal and
must be installed using management interfaces on the device. Before using an extension license,
you must accept a EULA during installation.
• Grace Period—Licenses are node locked and metered. These licenses are issued by Cisco licensing
portal as part of the permission ticket to rehost a license. They are installed on the device as part of
the rehost operation, and you must accept a EULA as part of the rehost operation.
Types other than Permanent display the number of days left until the license expires. Licenses not currently
in use do not have their counts reduced until they become “In Use.”
• Status
• In Use—The license level and the license are in use.
• Inactive—The license level is being used, but this license is not being used.
• Not In Use—The license level is not being used and this license is not currently recognized.
• Expired In Use—The license is being used, but is expired and will not be used upon next reboot.
• Expired Not In Use—The license has expired and can no longer be used.
• Count Consumed—The ap-count license is In Use.
If you need to filter the list of license files, you can enter a controller name, feature, or type and click Go.
MSE Licensing
The MSE packages together multiple product features related to network topology, design such as NMSP,
Network Repository along with related Service Engines, and application processes, such as the following:
• Context-Aware Service
• Wireless Intrusion Prevention System(WIPS)
To enable smooth management of MSE and its services, various licenses are offered.
You must have a Cisco Prime Infrastructure license to use MSE and its associated services.
Related Topics
MSE License Structure Matrix, on page 25
Sample MSE License File, on page 25
Revoke and Reuse an MSE License, on page 26
MSE Services Coexistence, on page 27
Manage MSE Licenses, on page 27
MSE Platform High-end appliance and infrastructure Low-end appliance and infrastructure —
platform, such as the Cisco 3350 and 3355 platform, such as Cisco 3310 mobility
mobility services engines services engine
Context Aware 25,000 Tags 2000 Tags Validity 60 days, 100 Tags
Service and 100 Elements
25,000 Elements 2000 Elements
wIPS 3000 access points 2000 access points Validity 60 days, 20 access
points
Related Topics
Sample MSE License File, on page 25
Revoke and Reuse an MSE License, on page 26
MSE Services Coexistence, on page 27
Manage MSE Licenses, on page 27
Note Limits for individual services differ. For example, a low-end mobility services engine (MSE-3310) tracks a
total of 2,000 CAS elements; a high-end mobility services engine (MSE-3350) tracks a total of 25,000 CAS
elements.A low-end mobility services engine has a maximum limit of 2000 wIPS elements; a high-end mobility
services engine has a maximum limit of 3000 wIPS elements.
Tag licenses are installed using the AeroScout System Manager only if the tags are tracked using the Partner
engine. Otherwise the tags will be counted along with the CAS element license. Because tag licenses are
added and managed using appropriate vendor applications, tag licenses are not displayed in this page. For
more information, see the AeroScout Support Page in Related Topics. Evaluation (demo) licenses are also
not displayed.
For more information, see AeroScout Support Page.
Related Topics
Register Product Authorization Keys, on page 28
Install Client and wIPS License Files, on page 29
Delete Mobility Services Engine License Files, on page 29
Step 1 Point your browser to the Cisco Product License Registration Portal (see Related Topics).
You can also access this site by clicking the Product License Registration link located on the License Center page of
Prime Infrastructure.
Step 4 In the Designate Licensee page, enter the mobility service engine UDI in the host ID text box. This is the mobility services
engine on which the license will be installed.
UDI information for a mobility services engine is found in the General Properties area at Services > Mobility Services
Engine > Device Name > System.
Step 5 Select the Agreement check box. Registrant information appears beneath the check box.
Modify information as necessary.
Ensure that the phone number does not include any characters in the string for the registrant and end user. For example,
enter 408 555 1212 rather than 408.555.1212 or 408-555-1212.
Step 6 If registrant and end user are not the same person, select the License (End-User) check box beneath registrant information
and enter the end-user information.
Step 7 Click Continue.
Step 8 At the Finish and Submit page, review registrant and end-user data. Click Edit Details to correct information, if necessary,
then click Submit. For more information, see AeroScout Support Page and Cisco Product License Registration Portal.
Related Topics
Install Client and wIPS License Files, on page 29
Delete Mobility Services Engine License Files, on page 29
Step 1 Choose Administration > Licenses and Software Updates > Licenses.
Step 2 From the left sidebar menu, choose Files > MSE Files.
Step 3 Click Add to open the Add a License File dialog box.
Step 4 From the MSE Name drop-down list, choose the mobility services engine to which you want to add the license file.
Note Verify that the UDI of the selected mobility services engine matches the one you entered when registering the
PAK.
Step 5 Enter the license file in the License File text box or browse to the applicable license file.
Step 6 Once displayed in the License File text box, click Upload. Newly added license appears in mobility services engine
license file list.
Note • A Context Aware Service (CAS) restarts if a client or tag license is installed; a wIPS service restarts if a
wIPS license is installed.
• Services must come up before attempting to add or delete another license.
Related Topics
Delete Mobility Services Engine License Files, on page 29
Step 1 Choose Administration > Licenses and Software Updates > Licenses, then select Files > MSE Files from the left
sidebar menu.
Step 2 Select the check box of the mobility services engine license file that you want to delete.
Step 3 Click Delete, then click OK to confirm the deletion.
Related Topics
Register Product Authorization Keys, on page 28
Install Client and wIPS License Files, on page 29
Assurance Licensing
As explained in “Purchasing Prime Infrastructure Licenses” (see Related Topics), licenses for Assurance
features are based on the number of NetFlow-monitored devices and Network Analysis Module (NAM) data
collection-enabled devices you have in your network. You manage, verify, and troubleshoot Assurance licenses
much as you do with other feature licenses, as explained in “Add Licenses”, “Delete Licenses” and
“Troubleshoot Licenses”.
In addition to these functions, Prime Infrastructure also lets you choose which NetFlow and NAM devices
you want to manage using Assurance features. For example, if you have only 50 Assurance feature licenses
and more than 50 NetFlow and NAM devices, you can choose to manage only your most critical devices. If
you later purchase additional Assurance licenses, you can add license coverage for the devices previously left
unmanaged.
Related Topics
Purchase Prime Infrastructure Licenses, on page 20
Verify Assurance License Details, on page 30
Add Licenses , on page 21
Delete Licenses, on page 21
Troubleshoot Licenses, on page 21
To see Choose
The NetFlow-enabled devices in your network that are under Assurance Administration > Licenses and Software Updates
management, as a percentage of the total number of Assurance licenses you > Licenses > Summary.
have.
The total number of Assurance licenses you have and the files associated with Administration > Licenses and Software Updates
them. > Licenses > Files.
A list of the devices sending NetFlow or NAM polling data to Prime Administration > Licenses and Software Updates
Infrastructure. > Licenses > Assurance Licenses (link is in upper
right corner of the page)
The number of Assurance Licenses in use.
By default, the total count of Assurance licenses on the Assurance Licenses page and on the Summary and
Files > License Files pages is always updated whenever you add or delete Assurance licenses. Addition or
removal of devices covered under these added or deleted Assurance licenses takes place as part of a System
Defined Job, which runs automatically once every 12 hours. It can take up to 12 hours for the added or deleted
devices to appear.
You can always access the Administration > Licenses and Software Updates > Licenses > Assurance
Licenses page from the Assurance Licenses link in the upper right corner of the Administration > Licenses
and Software Updates > Licenses > Summary and Administration > Licenses and Software Updates >
Licenses > Files pages.
Related Topics
Install Client and wIPS License Files, on page 29
Delete Mobility Services Engine License Files, on page 29
Step 1 Choose Administration > Licenses and Software Updates > Licenses > Assurance Licenses (the Assurance Licenses
link is in the upper right corner of the page).
Step 2 Above the list of devices currently under Assurance management, click Add Device.
Step 3 Select the check box next to each device you want to put under Assurance management, then click Add License. Prime
Infrastructure adds the devices immediately.
Step 4 When you are finished, click Cancel.
Related Topics
Delete License Coverage for NetFlow and NAM Devices, on page 31
Step 1 Choose Administration > Licenses and Software Updates > Licenses > Assurance Licenses (the Assurance Licenses
link is in the upper right corner of the page).
Prime Infrastructure displays the list of devices currently under Assurance management. It also displays the total number
of Assurance licenses you have, and the total number of devices under Assurance management.
Step 2 Select the check box next to each device you want to remove from Assurance management, then click Remove Device.
Related Topics
Add License Coverage For NetFlow and NAM Devices , on page 31
Smart Licensing
Smart Licensing feature provides a standardized licensing platform that simplifies user experience.When
Smart Licensing is first enabled, Prime Infrastructure is in Evaluation mode until you register Prime
Infrastructure with the Smart Software Manager (which resides on a centralized Cisco web site).
If you are currently using traditional licensing, Cisco recommends that you convert to Smart Licensing. For
information on the differences between the two types of licensing, refer to the Cisco Smart Licensing Overview
on Cisco.com .
The purpose of the smart licensing feature is to reduce license-related complexity by enabling users to:
• Purchase additional licenses and automatically update the information.
• Monitor current purchases and entitlements (duration and number of units).
• Monitor current usage information and trending information.
• Easily track if adequate licenses are purchased.
• Save time with the ability to transfer licenses across the company.
Note From Cisco Prime Infrastructure Release 3.5, Smart Licensing is supported for Operation Center.
Step See:
1. Create a Smart Account with Cisco Systems. Go to: Smart Account Request and follow the
instructions on the web site
2. Set up communication between Prime Infrastructure and Setting Up the Transport Mode Between Prime
the Cisco Smart Software Manager (CSSM) on Infrastructure and Cisco Smart Software
Cisco.com. Manager
3. Enable Smart Licensing in Prime Infrastructure (you Enabling Smart License on Prime Infrastructure
will have to restart the web GUI).
4. Register Prime Infrastructure with the CSSM on Registering Prime Infrastructure with the Cisco
Cisco.com, then enter the license tokens into the Prime Smart Software Manager
Infrastructure web GUI (you will have to restart the web
GUI).
5. Choose the licenses you want to use in Prime Choosing Smart Software Licenses
Infrastructure.
6. Set up the Smart License Dashboard to signal when you Configuring License Thresholds for the Prime
are running out of licenses. Infrastructure License Dashboard
Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart
Software Manager
Step 1 Choose Administration > Settings > System Settings > General > Account Credentials and select Smart Licensing
Transport tab.
Alternatively, you can click the link mentioned in the Smart Software Licensing page to direct you to the Smart
Licensing Transport tab to set up transport settings.
Step 3 Click Test Connectivity to test the connection status. Click Save to update the smart licensing transport mode.
Step 4 Proceed to Enabling Smart License on Prime Infrastructure .
Related Topics
Smart Licensing, on page 32
Step 1 Choose Administration > Licenses and Software Updates > Smart Software Licensing.
Step 2 In the Licensing Settings tab, select Smart Software Licensing.
Step 3 Choose Prime Infrastructure from the Product Name drop-down list.
Step 4 Click Enable Smart Software Licensing. Prime Infrastructure displays a dialog box informing you that you must log
out of Prime Infrastructure and log back in, before you can proceed to the configuration step.
Step 5 Click OK in the dialog box.
Once the smart license is enabled and before it is registered, the product will be in Evaluation Mode for 90 days and
you can manage any number of devices.
Note If you prefer traditional licenses, then in the Licensing Settings tab, select Traditional Licensing as the
Licensing Mode and click Register. The Administration > Licenses and Software Updates > Licenses page
is displayed.
Related Topics
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart Software Manager, on page
33
Perform Additional Actions, on page 39
View the Licensing Dashboard, on page 37
Disable Smart Licensing, on page 38
Reference: Product Registration and License Authorization Statuses, on page 39
Note Refer to the Cisco Smart Software Manager User Guide for information on other actions you can perform
from the CSSM—for example, renewing license registration and license authorization, unregistering the
product from Cisco Smart Licensing, and so forth.
Related Topics
Generate Token ID, on page 35
Register Product Instance, on page 36
Generate Token ID
If this is a new installation (you are not converting from traditional licensing), follow these steps:
Step 6 Copy the Token ID to your clipboard and proceed to Registering Product Instance.
Step 1 Choose Administration > Licenses and Software Updates > Smart Software Licensing.
Step 2 Under the Licensing Settings tab, paste your token into the Registration Token field.
Step 3 Click Register.
Step 4 Log out of Prime Infrastructure, then log back in.
Step 5 Proceed to Choosing Smart Software Licenses.
Related Topics
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Choose Smart Software Licenses, on page 36
Smart Licensing, on page 32
Enable Smart License on Prime Infrastructure, on page 34
Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart Software Manager, on page
33
Perform Additional Actions, on page 39
View the Licensing Dashboard, on page 37
Reference: Product Registration and License Authorization Statuses, on page 39
Step 1 If this is the first time you are choosing Smart licenses:
a) Choose Administration > Licenses and Software Updates > Licenses.
After a few moments, Prime Infrastructure displays a dialog box informing you that you cannot access the page
because you are not using traditional licensing. This is normal.
b) In the dialog box, click Smart License Settings.
c) Click the Licensing Settings tab.
Step 2 If you are already using Smart Licensing:
a) Choose Administration > Licenses and Software Updates > Smart Software Licensing.
b) Click the Licensing Settings tab.
Step 3 Click Smart Software Licensing radio button.
Step 4 Select the licenses in the Available Licenses dialog box, then click Save.
Step 5 Proceed to Configuring License Thresholds for the Prime Infrastructure License Dashboard.
Step 1 Choose Administration > Licenses and Software Updates > Smart Software Licensing, then click the License
Dashboard Settings tab.
Step 2 Select a license from the License Type drop-down list.
Step 3 Enter a value in the Threshold Value field.
Step 4 Click Save.
The threshold value is displayed as a straight line in the graphical representation of the License Summary and the Device
Distribution for License dashlets.
Related Topics
View the Licensing Dashboard, on page 37
Choose Smart Software Licenses, on page 36
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Enable Smart License on Prime Infrastructure, on page 34
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Disable Smart Licensing, on page 38
Reference: Product Registration and License Authorization Statuses, on page 39
The information displayed in the dashboard depends on the licensing mode that is enabled. If smart software
licensing is currently enabled, the following dashlets are displayed:
• License Summary Count area—Displays the number of licenses consumed and the compliance status
for each license type. The number of licenses displayed is based on the current date.
• License Summary dashlet—Displays a bar chart that graphs the number of licenses consumed for each
license type during a particular time period. To view additional information, place your cursor over the
chart.
• Device Distribution for License dashlet—To view the device distribution chart for a particular license,
click its link from the top of the chart displayed in the License Summary dashlet. To view additional
information, place your cursor over the chart.
Note The information displayed in the License Dashboard is refreshed daily after the SmartLicense job runs at
02:00 A.M. (its pre-configured run time). To view this job in the Job Dashboard, choose Administration >
Dashboards > Job Dashboard.
If traditional licensing is currently enabled, the Licensing dashboard displays the Traditional Licensing
dashlet. Specify whether you want to view information about Lifecycle or Assurance licenses by choosing
the corresponding option from the License Type drop-down list. The dashlet updates, displaying information
such as the device families with that license type, the number of tokens allocated to each device in those
families, as well as the number of tokens that are not being used at the moment.
Note The token consumption is based on the number devices, for example for a stack switch having 4 switches the
number of tokens consumed is 4.
Related Topics
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Enable Smart License on Prime Infrastructure, on page 34
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Configure License Thresholds for the Prime Infrastructure License Dashboard, on page 37
Disable Smart Licensing, on page 38
Reference: Product Registration and License Authorization Statuses, on page 39
Related Topics
Configure License Thresholds for the Prime Infrastructure License Dashboard, on page 37
Enable Smart License on Prime Infrastructure, on page 34
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Perform Additional Actions, on page 39
Registered Prime Infrastructure is registered with the CSSM. Prime Infrastructure has
received an ID certificate that will be used for future communication with the
Cisco licensing authority.
Registration Expired Prime Infrastructure did not successfully renew its registration prior to the
expiration date and has been removed from CSSM.
Evaluation Mode Prime Infrastructure is running in evaluation mode until the evaluation period
expires (90 days).
Authorized Prime Infrastructure has a valid Smart Account and is registered. All licenses
requested by the product are authorized for use.
Out of Compliance Prime Infrastructure has exceeded the number of licenses that were
purchased.The Virtual account containing the product instance has a shortage
of one or more of license types used.
Evaluation Expired The Evaluation period has expired and Prime Infrastructure will be in
unlicensed state.
Authorization Expired Prime Infrastructure did not successfully renew its license authorization prior
to the authorization expiration date.
Related Topics
Smart Licensing, on page 32
Enable Smart License on Prime Infrastructure, on page 34
Set Up Cisco Smart Licensing on Prime Infrastructure, on page 32
Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35
Perform Additional Actions, on page 39
The update notifications that Prime Infrastructure displays depend on the Notification Settings specified by
your administrator. See Enable or Disable Notifications About Software Updates, on page 41 . All software
updates are packaged in .ubf files. A large update can contain individual smaller updates, from which you can
choose what you want to install. When you install an update, Prime Infrastructure does the following:
• Verifies that the file publisher is Cisco Systems and the file has not been tampered with.
• Automatically installs any other updates that are required.
If you have connectivity to http://www.cisco.com , you can download and install the updates directly from
Cisco.com. If you do not have internet connectivity, copy the update from a server that has the necessary
connectivity and install it from there.
To use the CLI, see Establish an SSH Session With the Prime Infrastructure Server, on page 89.
Step 1 Configure the default Cisco.com credentials so that Prime Infrastructure can get information about available updates.
a) Choose Administration > Settings > System Settings, then choose General > Account Settings.
b) Click the Cisco.com Credentials tab, enter the credentials, then click Save.
Step 2 Configure your software update notification settings.
a) Choose Administration > Settings > System Settings, then choose General > Software Update.
b) Under Notification Settings, select or deselect the update categories. To disable all notifications, make sure no
categories are selected. For an explanation of the categories, see What Are Software Updates?, on page 40
c) Click Save.
You do not have to manually validate UBF packages that are downloaded using the Software Update feature.
This is because Prime Infrastructure automatically validates the .ubf files during the Software Update installation
process. If a file is not signed, Prime Infrastructure generates an error message and will not install the .ubf
file. If this occurs, contact your Cisco representative.
You do need to manually validate ISO and OVA images. Use the following procedure to validate them before
installation.
Step 1 If you do not have openssl installed, download and install it (see http://www.openssl.org).
Step 2 Place the following files in a temporary directory:
• The product file to be verified (*.iso or *.ova).
• The signature file (*.signature) that is packaged with the product file.
• The certificate file (*.pem). The same certificate is used to verify OVA and ISO images.
Step 3 Move to the temporary directory and run the following command as the Linux CLI root user (see Log In and Out as the
Linux CLI root User, on page 171):
openssl dgst -sha512 -verify cert-file -signature sig-file content-file
Where:
• cert-file is the Prime Infrastructure certificate file
• sig-file is the Prime Infrastructure signature file
• content-file is the Prime Infrastructure ISO file or OVA image to be verified
• For an ISO file, proceed with the installation (you do not have to perform any more steps as part of this validation
procedure).
• For an OVA package, proceed to the next steps.
Step 5 (OVA package only) Verify that Cisco Systems is the publisher.
a) In the VMware vSphere client, choose File > Deploy OVF Template.
b) Browse to the OVA file (*.ova), select it, and click Next.
c) Verify that the Publisher field in the OVF Template Details window displays Cisco Systems, Inc. with a green
check mark next to it. Proceed to the next step.
Note Do not validate the image using the Vendor field. This field does not authenticate Cisco Systems as the publisher.
Note Do not proceed if the Publisher field displays No certificate present. This indicates the image is not signed,
is not from Cisco Systems, or has been tampered with.
Step 1 Back up your data. See Perform a Manual Backup, on page 57.
Step 2 Download the file to your local machine, then upload it from your local machine to the Prime Infrastructure server.
a) Log into cisco.com and go to the Prime Infrastructure Software Download site.
b) Locate the .ubf file you want to download, and download it to your local machine.
Step 3 Copy the file from your local machine to the Prime Infrastructure server as described in Copy a File from a Client Machine
to the Prime Infrastructure Server, on page 44.
Step 4 Log in to the Prime Infrastructure web GUI as a user with Administrator privileges.
Step 5 Upload the file to the Prime Infrastructure server.
a) Choose Administration > Licenses and Software Updates > Software Update.
b) Click Upload at the top of the page.
c) Use one of the following options to upload the UBF file.
1. Upload from local computer
• Click the Upload from local computer radio button in the Upload Update window.
• Click Browse, navigate to the file, and click OK. After the successful upload, the software will appear under
the Files tab.
Step 6 Select the software update, click Install, and then click Yes in the confirmation pop-up window.
Note If the .ubf file is not signed or has been modified since it was downloaded from Cisco.com, Prime Infrastructure
will abort the installation. Contact your Cisco representative.
Prime Infrastructure will auto-restart and the web GUI will not be accessible for some time. (If it does not, restart it by
following the procedure in Stop and Restart Prime Infrastructure, on page 93.)
Step 7 When the web GUI is accessible, log in and check the version on the Software Update page.
a) Choose Administration > Licenses and Software Updates > Software Update.
b) Verify the information under the Updates tab.
What to do next
Instruct all users to clear their browser cache before opening the Prime Infrastructure web GUI.
Where:
• clientUsername is your username on the client machine
• clientIP is the IP address of the client machine where the file resides
• fullpath-to-file is the full pathname of the file on the client machine
For example:
scp jsmith@123.456.789.101:/temp/myfile.tar.gz /localdisk/defaultRepo
Note For details on what is considered application data and what is considered platform data, see Information That
Is Backed Up, on page 48.
Backup Scheduling
Prime Infrastructure performs automatic scheduled application backups. This feature is enabled by default
and creates one application backup file every day in the default local backup repository.
You can change this schedule as needed. You can also take an automatic application backup at any time from
the web GUI. Appliance backups can only be taken from the command line.
Automatic application backups can create storage space problems if the backup repository is local to the Prime
Infrastructure server. While this is usually acceptable in test implementations, it is not intended to substitute
for routine scheduled backups to remote servers in a production environment.
We recommend the following for production environments:
• Set up remote repositories to store the backup files.
• Use the automatic schedule application backup to create backups on the remote repositories on a regular
schedule.
Even if you are using scheduled backups, you can still use the command line to create application or appliance
backups at any time.
Note By default, two minutes are added to the job execution time for job creation.
Backup Repositories
By default, automatic application backup feature stores backup files in the local backup repository
/localdisk/defaultRepo. You can use the web GUI to create a new local backup repository and then choose
it when you set up automatic application backups. You can also specify a remote repository but you must
create the repository first as described in Set Up and Manage Repositories, on page 50.
When taking application or appliance backups using the command line, you must specify the local or remote
repository you want the backup to be stored in. In a production environment, this is normally a remote repository
that is accessed via NFS, SFTP, or FTP. We recommend you use NFS because it is typically much faster and
more reliable than other protocols.
There is no difference between performing an application backup from the command line or performing it
from the web GUI. Both actions create the same backup file.
Whenever you use NFS to take backups or restore data from a remote backup, make sure the mounted NFS
server remains active throughout the backup or restore operation. If the NFS server shuts down at any point
in the process, the backup or restore operation will hang without warning or an error message.
Backup Filenames
Application backups launched from the web GUI—either automatically or manually—are assigned a
filename with the following format:
host-yymmdd-hhmm_VERver_BKSZsize_CPUcpus_MEMtarget_RAMram_SWAPswap_APP_CKchecksum.tar.gpg
Application backups launched from the CLI use the same format, except that the file starts with the
user-specified filename rather than the server name.
filename-yymmdd-hhmm_VERver_BKSZsize_CPUcpus_MEMtarget_RAMram_SWAPswap_APP_CKchecksum.tar.gpg
Appliance backups launched from the CLI have files that also start with the user-specified filename, but
the type is indicated as SYS, not APP.
filename-yymmdd-hhmm_VERver_BKSZsize_CPUcpus_MEMtarget_RAMram_SWAPswap_SYS_CKchecksum.tar.gpg
The following table describes the variables used by the backup files.
Variable Description
host Host name of the server from which the backup was taken (for application backups
launched from web GUI).
filename Filename specified by user in command line (for application backups launched from CLI,
and for appliance backups)
yymmdd-hhmm Date and time the backup was taken
cpus Total number of CPUs in the server from which the backup was taken
target Total amount of system memory in the server from which the backup was taken
ram Total amount of RAM in the server from which the backup was taken
swap Total size of the swap disk on the server from which the backup was taken
If you manually transfer the backup file, or if you want to verify that the backup file transfer is completed,
view the file's md5CheckSum and file size.
Another best practice for validating a backup is to restore it to a standalone "test" installation of Prime
Infrastructure.
Note The /opt/CSCOlumos/conf/Migration.xml file contains all configuration files and reports that are backed up.
This file is included in the backup and is restored.
Platform CLI settings All CLI information and settings are preserved. This includes the list of
Data backup repositories, the FTP user name, users created using the CLI,
AAA information specified via the CLI, and other CLI settings (such as
the terminal timeout).
See the following topics for information on how to set up and manage these different types of repositories.
d. If it is an FTP repository, check the FTP check box and enter the location and credentials.
e. Click Submit. The new repository is added to the Backup Repository drop-down list in the Edit Job Properties dialog
box.
As with any resource that you plan to access remotely, specifying the correct server IP address and login
credentials during setup are a requirement for successful use of remote backup repositories with Prime
Infrastructure.
You can create backup repositories on a remote NFS server and configure the Prime Infrastructure server to
use them. The NFS server hosting your backups can be set up anywhere in your network, as long as the server:
For the NFS server details to appear in the Backup Repository drop down list in UI, you should configure the
NFS server using CLI. You can configure the NFS server only using CLI.
SUMMARY STEPS
1. Open a CLI session with the Prime Infrastructure server. (see How to Connect Via CLI, on page 125).
2. Enter configuration mode:
3. Configure a symbolic link to the remote NFS server:
4. Verify creation of the symbolic link:
5. When taking backups at the command line, specify the new repository as the repository name in the backup
command. For example:
DETAILED STEPS
Step 1 Open a CLI session with the Prime Infrastructure server. (see How to Connect Via CLI, on page 125).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
To specify a relative path to the shared folder, use only one slash in the URL. For example:
nfs://RemoteServerIP/sharedfolder
• Stagingfolder is the name of the staging backup folder on the NFS server, where the initial data will be transferred
temporarily to tar the file later.
• Sharedfolder is the name of the shared backup folder on the NFS server, where the backups will be stored
• UserName is the name of a user with write privileges to the repository on the NFS server.
• UserPassword is the corresponding password for that user.
Step 5 When taking backups at the command line, specify the new repository as the repository name in the backup command.
For example:
If you want to perform backups automatically, select the repository name you created as the repository name in the Prime
Infrastructure web interface.
Other than these requirements, no other configuration is needed on the SFTP backup server.
We recommend using remote NFS repositories.
For the SFTP server details to appear in the Backup Repository drop down list in UI, you should configure
the SFTP server using CLI. You can configure the SFTP server only using CLI.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 125).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
Step 5 When taking backups at the command line, specify the new repository as the repository name in the backup command.
For example:
PIServer/admin# backup MyBackupFileName repository MyRepo application NCS
If you want to perform backups automatically, select the repository name you created as the repository name in the Prime
Infrastructure web interface.
Related Topics
Use Remote NFS Backup Repositories, on page 51
Perform an Immediate Application Backup Using the CLI, on page 58
Perform an Immediate Appliance Backup Using the CLI, on page 57
Specify the Backup Repository for Automatic Backups, on page 56
Other than these requirements, no other configuration is needed on the FTP backup server.
We recommend using remote NFS repositories.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 125).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
Step 5 When taking backups at the command line, specify the new FTP repository as the repository name in the backup command.
For example:
PIServer/admin# backup MyBackupFileName repository MyRepo application NCS
If you want to perform backups automatically, select the repository name you created as the repository name in the Prime
Infrastructure web interface.
Related Topics
Use Remote NFS Backup Repositories, on page 51
Perform an Immediate Application Backup Using the CLI, on page 58
Perform an Immediate Appliance Backup Using the CLI, on page 57
Specify the Backup Repository for Automatic Backups, on page 56
Step 1 Log into the server as a Prime Infrastructure CLI admin user (see Establish an SSH Session With the Prime Infrastructure
Server, on page 89).
Step 2 List the local application backup repositories and identify the one that you want to delete:
show running-config | begin repository
To check what data is saved by the backup mechanism (and verify whether you need to manually save any
data that is not backed up), see these topics:
• Information That Is Backed Up, on page 48
• Information That Is Not Backed Up, on page 50
Note After an automatic application backup fails, a pop-up message is displayed before every subsequent login
attempt. This message will continue to appear until you acknowledge the corresponding alarm.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 125).
Step 2 Display the list of appliance backups:
PIServer/(admin)#show repository repositoryName
where repositoryName is the repository on which you want to store the appliance backup.
where filename is the name that you want to give the appliance backup file (for example, myBackup).The character length
of the file name is 26. Other information is appended to the filename automatically, as explained in Backup Filenames,
on page 47
Step 1 Log into the server as a Prime Infrastructure CLI admin user (see Establish an SSH Session With the Prime Infrastructure
Server, on page 89).
Step 2 Display the list of backups, where repositoryName is the backup repository:
show repository repositoryName
You will be prompted to enter the password. Enter the password if you want to secure the backup with password, else
press Enter. You have to remember the password to restore the backup.
where, filename is the name that you want to give the application backup file (for example, myBackup). The character
length of the file name is 26. Other information is appended to the filename automatically, as explained in Backup
Filenames, on page 47.
Step 4 To verify that the backup transfer is complete, view the md5CheckSum and file size.
Note If you trigger the restore process from clients such as putty or SSH, the server may not be up even after the
restoration is complete—if there was any network issue/failure during the restoration process. To avoid the
network issue/failure, it is recommended to perform restore for:
• Gen-2 Appliance—from KVM Console
• ESXi virtual machine—from VM Console
• Hyper-V Virtual Machine—from Hyper-V Virtual Machine Connection Console
Note To restore an appliance backup, use the procedure in Restore an Appliance Backup, on page 60.
When you restore an Application backup, make sure it is being restored to a machine having equal or higher
hardware configuration as that of backup machine, else the restore will fail.
Step 1 Log into the server as a Prime Infrastructure CLI admin user (see Establish an SSH Session With the Prime Infrastructure
Server, on page 89).
Step 2 If a previous restoration attempt failed, the database may have been corrupted. Run this command to recreate the database:
ncs run reset db
Step 3 List the saved application backups and identify the one that you want to restore. repositoryName is the repository that
contains the backup files.
show repository repositoryName
Step 4 From the vmWare vSphere client (OVA) or the Cisco IMC server (Bare Metal), restore the data:
Note You will be prompted to enter the password. Enter the password if backup is password protected, else press
enter.
Step 5 If you are using Cisco Smart Licensing, re-register Prime Infrastructure with the Cisco Smart Software Manager (CSSM)
on Cisco.com. See Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35.
Note To restore an application backup, use the procedure in Restore an Application Backup, on page 59.
Step 1 Log into the server as a Prime Infrastructure CLI admin user (see Establish an SSH Session With the Prime Infrastructure
Server, on page 89).
Step 2 If a previous restoration attempt failed, the database may have been corrupted. With the backup stored in an external
repository, reinstall the setup using the same release and then retry the restore.
Step 3 List the saved appliance backups and identify the one that you want to restore. repositoryName is the repository that
contains the backup files.
show repository repositoryName
Step 4 From the vmWare vSphere client (OVA) or the Cisco IMC server (Bare Metal), restore the data:
restore backupFileName repository repositoryName
Step 5 Determine whether you should change the IP address, subnet mask, and default gateway.
a) Check if your installation meets the following criteria:
• The restored host is on the same subnet as the old host, and the old host is still active.
• The restored host is on a different subnet from the old host.
If it does, perform the next step.
b) Change the IP address, subnet mask, default gateway and (optionally) the host name on the restored server.
c) Write the changes to the server’s running configuration and restart Prime Infrastructure services. For example:
configure terminal
(config)# int GigabitEthernet 0
(config-GigabitEthernet)# ip address IPAddress subnetMask
(config-GigabitEthernet)# exit
(config)# ip default-gateway gatewayIP
(config)# hostname hostname
(config)# exit
(admin)# write mem
(admin)# ncs stop
(admin)# ncs start
(admin)# exit
Step 6 If you are using Cisco Smart Licensing, re-register Prime Infrastructure with the Cisco Smart Software Manager (CSSM)
on Cisco.com. See Register Prime Infrastructure with the Cisco Smart Software Manager, on page 35.
Step 1 Open a CLI session with the Prime Infrastructure server (see Establish an SSH Session With the Prime Infrastructure
Server, on page 89).
Step 2 Enter the following command to reset the corrupted database:
ncs run reset db
In both cases, it is relatively easy to migrate your old data to the new virtual appliance by restoring to the new
host an appliance or application backup taken from the old host.
Step 1 If you have not already done so, set up a remote backup repository for the old host, as explained in Use a Remote Backup
Repository, on page 51.
Step 2 Perform an application backup of the old host and save it to the remote repository (see Perform an Immediate Application
Backup Using the CLI, on page 58).
Step 3 Install the new host (See Cisco Prime Infrastructure Quick Start Guide).
Step 4 Configure the new host to use the same remote backup repository as the old host (see Use a Remote Backup Repository,
on page 51).
Step 5 Restore the application backup on the remote repository to the new host (see Restore an Application Backup, on page
59).
b) Take an appliance or application backup of the old appliance on the remote repository (see “Take Appliance Backups”
or “Take Application Backups”, as appropriate).
Step 2 Configure the new appliance to use the same remote backup repository as the old appliance (see “Use a Remote Backup
Repositories”).
Step 3 Restore the appliance or application backup on the remote repository to the new appliance (see “Restore From Appliance
Backups” or “Restore From Application Backups”, as appropriate). Be sure to follow the procedure appropriate for the
type of backup you are restoring. For example: If you took an application backup from the old appliance, you must restore
it using the procedure for restoring application backups, not appliance backups.
Related Topics
Use a Remote Backup Repository, on page 51
Perform an Immediate Application Backup Using the CLI, on page 58
Perform an Immediate Appliance Backup Using the CLI, on page 57
Restore an Appliance Backup, on page 60
Restore an Application Backup, on page 59
Step 3 Click System Information at the top left of the dashboard to expand the System Information field.
Related Topics
Overview Dashboard, on page 111
Performance Dashboard, on page 112
Admin Dashboard, on page 113
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Configure the General > Account Credentials > Support Request Wired
settings for and
See Set Up Defaults for Cisco Support Requests.
creating a wireless
technical support devices
request.
Configure General > Account Credentials > Smart Licensing Transport Prime
transport gateway Infrastructure
See Set Up the Transport Mode Between Prime Infrastructure and Cisco Smart Software Manager.
mode to send appliance
information over
the internet via
Smart Call Home
Transport
Gateway, while
smart licensing is
enabled.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Enable Change Mail and Notification > Change Audit Notification Wired
Audit JMS and
See Enable Change Audit Notifications and Configure Syslog Receivers, on page 254.
Notification by wireless
selecting the devices
Enable Change
Audit JMS
Notification
check box.
To send job Mail and Notification > Job Notification Mail Wired
notification mail and
See Configure Job Notification Mail for User Jobs
for every user job wireless
devices
Enable email Mail and Notification > Mail Server Configuration Prime
distribution of Infrastructure
See Configure Email Server Settings , on page 391.
reports and alarm appliance
notifications.
Enable Unified Network and Device > Unified AP Ping Reachability Wireless
AP ping devices
capability setting only
on the Cisco
Prime
Infrastructure.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Modify the Network and Device > Plug & Play Wired
settings for Plug devices
and Play. only
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Configure rogue Network and Device > Switch Port Trace (SPT) > Auto SPT Wireless
AP settings to devices
See Configure SNMP Credentials for Rogue AP Tracing, on page 275.
enable Prime only
Infrastructure to
automatically
track the switch
port to which the
rogue access point
is connected in
the network.
Set the SNMP Network and Device > Switch Port Trace (SPT) > Manual SPT Wireless
credentials and devices
See Configure SNMP Credentials for Rogue AP Tracing, on page 275.
trace parameters only
to be used in
tracing rogue AP
switch ports.
Set basic and Network and Device > Switch Port Trace (SPT) > SPT Configuration Wired
advanced switch devices
See Configure Switch Port Tracing, on page 272.
port trace only
parameters.
View, add, or Network and Device> Switch Port Trace (SPT) > Known Ethernet MAC Address Prime
delete the Infrastructure
Ethernet MAC appliance
address available
in Prime
Infrastructure. if
you add multiple
Ethernet MAC
addresses to this
list, then Auto
Switch Port
Tracing will not
scan these ports
for Rogue AP.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
Set the severity Alarms and Events > Alarm Severity and Auto Clear Wired
level of any and
See Change Alarm Severity Levels, on page 245.
generated alarm. wireless
devices
Configure SNMP Alarms and Events > System Event Configuration Prime
traps and events Infrastructure
See Internal SNMP Trap Generation, on page 377.
generated for the appliance
Prime
Infrastructure
hardware
appliance.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
• Enable
automatic
troubleshooting
of clients on
the
diagnostic
channel.
• Enable
lookup of
client
hostnames
from DNS
servers and
set how long
to cache
them.
• Set how long
to retain
disassociated
clients and
their session
data.
• Poll Wired
clients to
identify their
sessions only
when a trap
or syslog is
received.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
information
from
enhanced
trap received
from the
compatible
Cisco
WLCs.
You must
configure the
WLCs to send the
traps using the
following CLI
commands:
• config
trapflags
client
enhanced-802.11-associate
• config
trapflags
client
enhanced-8021.1-deauthenticate
• config
trapflags
client
enhanced-802.11-stats
• config
trapflags
client
enhanced-authentication
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
• Enable
discover
wired clients
on trunk
ports to
discover the
unmanaged
entity other
than switch
and router,
which is
connected to
trunk ports.
• Disable
saving of
client
association
and
disassociation
traps and
syslogs as
events.
• Enable
saving of
client
authentication
failure traps
as events,
and how
long
between
failure traps
to save them.
Add a vendor Client and User > User Defined OUI Wired
Organizationally and
See Add a New Vendor OUI Mapping.
Unique Identifier wireless
(OUI) mapping devices
XML file.
To do this: Choose Administration > Settings > System Settings >... Applicable
to:
To secure communication between the web server and web client, use the public key cryptography services
that are built in as part of the HTTPS mechanism. For that you need to generate a public key for the Prime
Infrastructure web server, store it on the server, and then share it with the web client. This can be done using
the standard PKI certificate mechanism which not only shares the web server public key with the web client,
but also guarantees that the public key belongs to the web server (URL) you are accessing. This prevents any
third party from posing as the web server and collecting sensitive information that the web client is sending
to the web server.
These topics provide additional steps you can take to secure the web server:
• Cisco recommends that the Prime Infrastructure web server authenticate web clients using certificate-based
authentication.
• To secure connectivity between a CLI client and the Prime Infrastructure CLI interface, refer to the
security hardening procedures in Best Practices: Server Security Hardening, on page 369.
• To secure connectivity between the Prime Infrastructure and systems such as AAA and external storage,
refer to the recommendations in Best Practices: Server Security Hardening, on page 369.
• Digitally signed by a Certificate Authority (CA). CAs are organizations (like Cisco and VeriSign) that
validate identities and issue certificates. Certificates issued by a CA bind a public key to the name of the
entity (such as a server or device) identified in the certificate. You can obtain CA certificates from a
third-party CA and apply them to the Prime Infrastructure server as explained in related topic “Import
CA-Signed Host Certificates”.
Note A private key and self-signed certificate with default parameters is generated at the timeof installation.
Related Topics
Generate and Apply Self-Signed Certificates, on page 82
Import CA-Signed Host Certificates, on page 82
Import Private Key, on page 84
Export Private Key, on page 84
Step 1 Start a CLI session with Prime Infrastructure (see How to Connect Via CLI, on page 125). Do not enter “configure terminal”
mode.
Step 2 Enter the following command to generate a new RSA key and self-signed certificate with domain information:
PIServer/admin# ncs key genkey –newdn
You will be prompted for the Distinguished Name (DN) fields for the certificate. It is important to specify the fully
qualified domain name (FQDN) of the server as the domain name that will be used to access Prime Infrastructure.
Step 3 To make the certificate valid, restart Prime Infrastructure (see Restart Prime Infrastructure Using CLI, on page 127).
To avoid login complaints, instruct users to add the self-signed certificate to their browsers’ trust stores when they next
access the Prime Infrastructure login page.
Note High Availability Virtual IP is designed to simplify the server management. signed server certificate
configuration does not work with the Prime Infrastructure HA Virtual IP deployment.
Step 1 Enter the following command to generate a CSR file in the default backup repository:
PIServer/admin# ncs key genkey -newdn -csr <csrfilename> repository <repositoryname>
where -newdn— Generates a new RSA key and self-signed certificate with domain information.
-csr—Generates a new CSR certificate.
Csrfilename—CSR filename. It is an arbitrary name of your choice (for example: MyCertificate.csr ).
repositoryname— file location. The file name can contain up to 80 alphanumeric characters.
Example:
PIServer/admin# ncs key genkey -newdn -csr CSRFile.csr repository <repositoryname>
The NCS server is running. Changes will take effect on the next server restart
Enter the fully qualified domain name of the server: <FQDN>
Enter the name of your organizational unit: <organization>
Enter the name of your organization: <organization>
Enter the name of your city or locality: <city>
Enter the name of your state or province: <state>
Enter the two letter code for your country: <country code>
Specify subject alternate names.
If none specified, CN will be used.
Use comma seperated list - DNS:<name>,IP:<address>
DNS:<FQDN>,IP:<IPADDRESS>
Specify the public key algorithm [rsa/ec] : rsa
Specify the RSA key size [2048/4096/8192] : 4096
Specify the signature algorithm [sha256/sha512] : sha256
Key and CSR/Certificate will be generated with following details
Subject : /C=US/ST=CA/L=SJ/O=Cisco Systems/OU=Prime Infra/CN=DNS:<FQDN>
Subject Alternate Name : DNS:<FQDN>,IP:<IPADDRESS>
Public Key Alg : rsa, 4096
Signature Alg : sha256
Continue [yes] : yes
Generating...
Completed...Changes will take affect on the next server restart
Note If you does not provide "Subject Alternate Name" - the CA certificate can be imported only in this machine.
If you provide "Subject Alternate Name" - You can import the CA certificate to be received from CA in any
of the servers having the specified FQDN. To import CA certificate in SAN sepcified servers, you need to
export private key from the server where you have generated the CSR and import the private key along with
the signed certificate in other specified servers.
In SAN List, you should add the current server's FQDN.
Step 2 Send the CSR file to a Certificate Authority (CA) of your choice.
The CA will respond by sending you an signed server certificate and one or more CA certificate files. The CA response
will indicate which of the files is:
• The signed server certificate. This is typically given a filename that reflects the host name of the server to which
you will apply it.
• The CA certificates , which are typically given filenames that reflect the name of the CA.
Combine all the certificates in to one single file by concatenating them. Host certificate should be the first one in
the file followed by the CA certificates in the same order as in the chain.
For example, in linux the following command can be used to combine files:
cat host.pem subca.pem rootca.pem > servercert.pem
Note Certificates should be in PEM format
Step 3 Enter the following command to import the Signed certificate file into the Prime Infrastructure server:
PIServer/admin# ncs key importsignedcert <certificate_name> repository <repositoryname>
Note You must re-import the CA-signed certificate, if the imported certiifcate is removed from the trust store when
you are upgrading from the beta version.
Step 4 To activate the CA-signed certificates, restart Prime Infrastructure (see “Restarting Prime Infrastructure”).
If the CA who signed the certificate is not already a trusted CA in your organization: Instruct users to add the CA-signed
certificate to their browsers’ trust stores when they next access the Prime Infrastructure login page.
For more information, see How to Connect Via CLI, on page 125 and Restart Prime Infrastructure Using CLI, on page
127.
After executing the above command private key will be generated and placed in the file location pointed in
the repository.
• ncs certvalidation trusted-ca-store deletecacert alias <ALIAS> truststore {devicemgmt | pubnet | system
| user}
• Pubnet - Communication that happens between PI and other server in pubnet level can be enabled here.
• Device management – Device management communication between PI and another server can be enabled
here.
• User – User communication between PI and another server can be enabled here.
Certificate Validation: Details about the validation used when importing or exporting certificates can be
selected here.
Field Name and Object ID Data Type Prime Infrastructure Event/Alert Description
field
Field Name and Object ID Data Type Prime Infrastructure Event/Alert Description
field
cWNotificationSubCategory OCTET STRING Type field in alert and This object represents the
eventType in event. subcategory of the alert.
Field Name and Object ID Data Type Prime Infrastructure Event/Alert Description
field
cWNotificationSourceDisplayName OCTET STRING sourceDisplayName field in This object represents the display
alert/event. name of the source of the
notification.
cWNotificationSpecialAttributes OCTET STRING All the attributes in This object represents the
alerts/events apart from the base specialized attributes in alerts
alert/event class. like APAssociated,
APDisassociated, RogueAPAlert,
CoverageHoleAlert, and so on.
The string is formatted in
property=value pairs in CSV
format.
Step 1 Start your SSH session and log in as the Prime Infrastructure admin user.
• From the command line, enter the following, where server-ip is the Prime Infrastructure:
ssh admin server-ip
Step 2 Enter the admin password. The prompt will change to the following:
(admin)
To view a list of the operations the admin user can perform, enter ? at the prompt.
To enter admin config mode, enter the following command (note the change in the prompt):
(admin) configure terminal
(config)
Note Prime Infrastructure cannot be configured as an NTP server; it acts as an NTP client only. Up to three NTP
servers are allowed.
Step 1 Log in to the Prime Infrastructure server as the admin user and enter config mode. See Establish an SSH Session With
the Prime Infrastructure Server, on page 89.
Step 2 Set up the NTP server using one of the following commands.
For an unauthenticated NTP server setup:
ntp server ntp-server-IP
Where:
• ntp-server-IP is the IP address or hostname of the server providing the clock synchronization to the Prime Infrastructure
server
• ntp-key-id is the md5 key ID md5 key of the authenticated NTP server
• ntp-type can be plain or hash
• password is the corresponding plain-text md5 password for the NTPv4 server
Step 1 Choose Administration > Settings > System Settings, then choose General > Account Settings.
Step 2 Click the Proxy tab.
Step 3 Select the Enable Proxy check box and enter the required information about the server that has connectivity to Cisco.com
and will act as the proxy.
Step 4 Select the Authentication Proxy check box and enter the proxy server’s user name and password.
Step 5 Click Test Connectivity to check the connection to the proxy server.
Step 6 Click Save.
Step 1 Choose Administration > Settings > System Settings > General > Server.
Step 2 To modify the FTP, TFTP, or HTTP service status and ports that were established during installation, enter the port
number (or port number and root, where required) that you want to modify, then click Enable or Disable.
The Global Idle Timeout is enabled by default and is set to 10 minutes. The Global Idle Timeout setting overrides the
User Idle Timeout setting in the My Preferences page. Only users with administrative privileges can disable the Global
Idle Timeout value or change its time limit.
Step 1 Choose Administration > Settings > System Settings, then choose Mail and Notification > Mail Server Configuration.
Step 2 Under Primary SMTP Server, complete the Hostname/IP, User Name, Password, and Confirm Password fields as
appropriate for the email server you want Prime Infrastructure to use. Enter the IP address of the physical server. and the
Enter the hostname of the primary SMTP server.
Note You cannot enter a virtual IP address in the Hostname/IP field, and the IP address cannot be behind a load
balancer.
Step 3 (Optional) Complete the same fields under Secondary SMTP Server. SMTP server username and password.
Step 4 Under Sender and Receivers, enter a legitimate email address for Prime Infrastructure.
Step 5 When you are finished, click Save.
Step 1 Configure Prime Infrastructure to use the FTP, TFTP, or SFTP server.
a) Choose Administration > Servers > TFTP/FTP/SFTP Servers.
b) From the Select a command drop-down list, choose Add TFTP/FTP/SFTP Server, then click Go.
• From the Server Type drop-down list, choose FTP, TFTP, SFTP, or All.
• Enter a user-defined name for the server.
• Enter the IP address of the server.
c) Click Save.
Step 2 If you want to use FTP or TFTP, enable it on the Prime Infrastructure server.
a) Choose Administration > Settings > System Settings, then choose General > Server.
b) Go to the FTP or TFTP area.
c) Click Enable.
d) Click Save.
Step 3 Restart Prime Infrastructure to apply your changes. See Stop and Restart Prime Infrastructure, on page 93.
To download the updates and open/review a support case, you are required to enter a password.
If these settings are not configured, Prime Infrastructure will prompt users for their credentials when they
perform these tasks. To configure a global Cisco.com user name and password:
Step 1 Choose Administration > Settings > System Settings, then choose General > Account Settings.
Step 2 Under the Cisco.com Credentials tab, enter a user name and password, and click Save.
Step 1 Choose Administration > Settings > System Settings, then choose General > Login Disclaimer.
Step 2 Enter (or edit) the login disclaimer text.
Note Carriage returns are ignored.
Your changes will take effect immediately.
To start or restart the server, open a CLI session with the server and enter:
ncs start
Note The default network address is 0.0.0.0, which indicates the entire network. An SNMP credential is defined
per network, so only network addresses are allowed. 0.0.0.0 is the SNMP credential default and is used when
no specific SNMP credential is defined. You should update the prepopulated SNMP credential with your own
SNMP information.
Step 1 Choose Administration > Settings > System Settings, then choose Network and Device > SNMP.
Step 2 (Optional) Select the Trace Display Values check box to display mediation trace-level logging data values that are
fetched using SNMP.
Step 3 Choose an algorithm from the Backoff Algorithm drop-down list.
• Exponential—Each SNMP try will wait twice as long as the previous try, starting with the specified timeout for
the first try.
• Constant—Each SNMP try will wait the same length of time (timeout). This is useful on unreliable networks where
the desired number of retries is large. Because it does not double the timeout per try, it does not take as long to
timeout with a high number of retries.
Step 4 If you do not want to use the timeout and retries specified by the device, configure the following parameters.
Note If switch port tracing is taking a long time to complete, reduce the Reachability Retries value.
• Reachability Retries—Enter the number of global retries.
• Reachability Timeout—Enter a global timeout.
Step 5 In the Maximum VarBinds per Get PDU and Maximum VarBinds per Set PDU fields, enter a number to indicate the
largest number of SNMP variable bindings allowed in a request or response PDU. These fields enable you to make
necessary changes when you have any failures associated to SNMP. For customers who have issues with PDU fragmentation
in their network, the number can be reduced to 50, which typically eliminates the fragmentation.
Step 6 Optionally adjust the Maximum Rows per Table.
Step 7 Click Save.
The default network address is 0.0.0.0, which indicates the entire network. SNMP credentials are defined
per-network so only network addresses are allowed. 0.0.0.0 is the SNMP credential default and is used when
no specific SNMP credential is defined. You should update the pre-populated SNMP credential with your
own SNMP information.
Step 1 Choose Administration > Settings > System Settings > Network and Device > SNMP.
Step 2 (Optional) Select the Trace Display Values check box to display mediation trace-level logging data values fetched from
the controller using SNMP. If unselected, these values do not appear.
Step 3 From the Backoff Algorithm list, choose Exponential or Constant Timeout. If you choose Exponential, each SNMP
try waits twice as long as the previous try, starting with the specified timeout for the first try. If you choose Constant
Timeout, each SNMP try waits the same, specified amount of time.
Constant Timeout is useful on unreliable networks (such as satellite networks) where the desired number of retries is
large. Because it does not double the timeout per try, it does not take as long to timeout with a high number of retries.
Step 4 Determine if you want to use reachability parameters. If selected, Prime Infrastructure defaults to the global Reachability
Retries and Timeout that you configure. If unselected, Prime Infrastructure always uses the timeout and retries specified
per controller or per IOS access point.
Adjust this setting downward if switch port tracing is taking a long time to complete.
Step 5 In Reachability Retries, enter the number of global retries used for determining device reachability. This field is only
available if the Use Reachability Parameters check box is selected.
Adjust this setting downward if switch port tracing is taking a long time to complete.
Note You cannot edit the value of Reachability Timeout. The default value is 2 seconds.
Step 6 In the Maximum VarBinds per PDU field, enter a number to indicate the largest number of SNMP variable bindings
allowed in a request or response PDU.
This Maximum VarBinds per PDU field enables you to make necessary changes with when you have any failures associated
to SNMP.
For customers who have issues with PDU fragmentation in their network, this number can be reduced to 50, which
typically eliminates the fragmentation.
The maximum rows per table field is configurable. The configured value is retained even if you upgrade Prime Infrastructure
to a newer version.
Related Topics
View SNMP Credential Details, on page 95
Add SNMP Credentials, on page 96
Import SNMP Credentials, on page 97
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Manual
SPT.
Step 2 Click the Network Address link to display the SNMP Credential Details page. The page displays the following information:
• General Parameters
• Add Format Type—Display only. For details, see “Add SNMP Credentials” in Related Topics.
• Network Address
• Network Mask
• SNMP Parameters—Choose the applicable versions for SNMP parameters. The SNMP credentials are validated
according to which SNMP versions are selected.
• Enter SNMP parameters for write access, if available. With display-only access parameters, the switch is added but
you cannot modify its configuration in Prime Infrastructure. Device connectivity tests use the SNMP retries and
timeout parameters.
• Retries—The number of times that attempts are made to discover the switch.
• Timeout—The session timeout value in seconds, which specifies the maximum amount of time allowed for a client
before it is forced to reauthenticate.
• SNMP v1 Parameters or v2 Parameters—If selected, enter the applicable community in the available text box.
• SNMP v3 Parameters—If selected, configure the following parameters:
• Username
• Auth. Type
• Auth. Password
• Privacy Type
• Privacy Password
If SNMP v1 or v2 with default community is configured, the network is open to easy attacks because default communities
are well known. SNMP v1 or v2 with a non default community is more secure than a default community, but SNMP v3
with Auth and Privacy type and no default user is the most secure SNMP connection.
Related Topics
Configure Global SNMP Settings, on page 94
Add SNMP Credentials, on page 96
Import SNMP Credentials, on page 97
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Manual
SPT.
Step 2 Choose Select a command > Add SNMP Entries > Go.
Step 3 In the Add Format Type drop-down list, choose SNMP Credential Info.
Step 4 Enter the IP address of the switch you want to add. If you want to add multiple switches, use a comma between each IP
address.
Step 5 In the Retries field, enter the number of times that attempts are made to discover the switch.
Step 6 Provide the session timeout value in seconds. This determines the maximum amount of time allowed for a client before
it is forced to reauthenticate.
Step 7 Choose the applicable versions for the SNMP parameters. The SNMP credentials are validated according to which SNMP
versions are selected.
• If SNMP v1 Parameters or v2 Parameters is selected, enter the applicable community in the available text box.
• If SNMP v3 Parameters is selected, configure the following parameters:
• Username
• Auth. Type
• Auth. Password
• Privacy Type
• Privacy Password
If SNMP v1 or v2 with default community is configured, the network is open to easy attacks because default communities
are well known. SNMP v1 or v2 with a non-default community is more secure than a default community, but SNMP v3
with Auth and Privacy type and no default user is the most secure SNMP connection.
Related Topics
Configure Global SNMP Settings, on page 94
View SNMP Credential Details, on page 95
Import SNMP Credentials, on page 97
ip_address,snmp_version,snmp_community,snmpv3_user_name,snmpv3_auth_type,snmpv3_auth_password,
snmpv3_privacy_type,snmpv3_privacy_password,network_mask 1.1.1.0,v2,private,user1,HMAC-MD5,
12345,DES,12345,255.255.255.0 2.2.2.0,v2,private,user1,HMAC-MD5,password3,DES,password4,
255.255.255.0 10.77.246.0,v2,private,user1,HMAC-MD5,12345,DES,12345,255.255.255.0
The first row of the file is mandatory, as it describes the column arrangement. The IP Address column is also
mandatory. The CSV file can contain the following fields:
• ip_address:IP address
• snmp_version:SNMP version
• network_mask:Network mask
• snmp_community:SNMP V1/V2 community
• snmpv3_user_name:SNMP V3 username
• snmpv3_auth_type:SNMP V3 authorization type. Can be None or HMAC-MD5 or HMAC-SHA
• snmpv3_auth_password:SNMP V3 authorization password
• snmpv3_privacy_type:SNMP V3 privacy type. Can be None or DES or CFB-AES-128
• snmpv3_privacy_password:SNMP V3 privacy password
• snmp_retries:SNMP retries
• snmp_timeout:SNMP timeout
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Manual
SPT.
Step 2 Choose Select a command > Add SNMP Entries > Go.
Step 3 In the Add Format Type drop-down list, choose File.
Step 4 Click Browse to navigate to the CSV file you want to import and select it.
Step 5 Click OK to import the file.
If Prime Infrastructure can use the SNMP credential listed to access the switch, the switch is added for later use and
appears in the Network Devices page accessible via Configuration > Network > Network Devices. If you manually
add switches through the Network Devices page, switch port tracing uses the credentials from that page, not the ones
listed in the SNMP Credentials page. If the manually added switch credentials have changed, you need to update them
using the Network Devices pages.
Related Topics
Configure Global SNMP Settings, on page 94
View SNMP Credential Details, on page 95
Add SNMP Credentials, on page 96
Do not attempt to enable Compliance Services on Express, Express-Plus. If you do, the feature itself will not
work. In addition, if you enable it and then try to migrate your data to a newly installed Professional or Gen
2 UCS appliance, the settings in the migrated data from the source Express or Express-Plus will prevent
Compliance Services from working on the target appliance. You can avoid all this by simply leaving the
Compliance Services feature disabled on the Express or Express-Plus, and then migrating your data to the
Professional or Gen2 UCS appliance.
Step 1 Choose Administration > Settings > System Settings > General > Server.
Step 2 Next to Compliance Services, click Enable.
Step 3 Click Save.
Step 4 Re-synchronize Prime Infrastructure’s device inventory: Choose Inventory > Network Devices, select All Devices, then
click the Sync icon.
Step 5 Ask any users who are currently logged in to Prime Infrastructure to log out. They will be able to see the new Configuration
> Compliance menu option when they log in again.
For details, see Virtual Appliance Options and Physical Appliance Options.
Step 1 Click Administration > Servers > Software Image Management Servers.
Step 2 Click the add icon and complete the following fields:
• Server Name
• IP Address
• Sites Served
• Description
Step 1 Choose Administration > Settings > System Settings > Inventory > User Defined Field.
Step 2 Click Add Row to add a UDF.
Step 3 Enter the field label and description in the corresponding fields.
Step 4 Click Save to add a UDF.
Manage OUIs
Prime Infrastructure relies on the IEEE Organizational Unique Identifier (OUI) database to identify the client
vendor name mapping. Prime Infrastructure stores vendor OUI mappings in an XML file named
vendorMacs.xml. This file is updated for each release of Prime Infrastructure. With the OUI update, you can
change the vendor display name for an existing OUI, add new OUIs to Prime Infrastructure and refresh the
vendorMacs.xml file with new vendor OUI mappings and upload it to Prime Infrastructure.
Related Topics
Add a New Vendor OUI Mapping, on page 101
Upload an Updated Vendor OUI Mapping File, on page 101
Step 1 Choose Administration > Settings > System Settings > Client and User > User Defined OUI. The User Defined OUI
page appears.
Step 2 Choose Add OUI Entries from the Select a Command drop-down list, then click Go.
Step 3 In the OUI field, enter a valid OUI. The format is aa:bb:cc.
Step 4 Click Check to verify if the OUI exists in the vendor OUI mapping.
Step 5 In the Name field, enter the display name of the vendor for the OUI.
Step 6 Select the Change Vendor Name check box to update the display name of the vendor, if the OUI exists in the vendor
OUI mapping, then click OK.
Step 1 Choose Administration > Settings > System Settings > Client and User > Upload OUI. The Upload OUI From File
page appears.
Step 2 Click Update online from IEEE to get OUI updates from the IEEE Registration Authority database (see the link to the
RA database in Related Topics). If Prime Infrastructure is unable to reach the IEEE database, a message appears instruction
you to save and upload the file.
Step 3 Click OK after the update completes successfully.
After you upload the vendorMacs.xml file in the Administration > Settings > System Settings > Upload OUI page: If
the vendor name is not reflected for existing unknown vendor clients in the Unique Clients and Users Summary report,
run the updateUnknownClient.sh script. This script is located in the /opt/CSCOlumos/bin folder.
For more information, see IEEE Registration Authority database.
Note Prime Infrastructure does not send SNMPv2 Inform or SNMPv3 notifications.
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > System Event Configuration.
Step 2 For each SNMP event you want to configure:
a) Click on the row for that event.
b) Set the Event Severity to Critical, Major, or Minor, as needed.
c) For the CPU, disk, memory utilization, and other hardware traps, Enter the Threshold percentage (from 1–99). These
events will send the associated SNMP traps when the utilization exceeds the threshold limit. (You cannot set thresholds
for events for which the threshold setting is shown as NA.) These events send traps whenever the associated failure
is detected.
d) For backup threshold and certificate expiry (critical), enter the Threshold in days (from x–y, where x is the minimum
number of days and y is the maximum number of days).
e) To control whether a trap is to generated or not, set the Event Status.
Step 3 In the Other Settings, enter the desired value for Create and Clear Alarm Iteration.
Step 4 To save all of your trap changes, click Save (below the table).
Step 5 If you want to configure receivers for the server internal SNMP traps, refer to the procedures in the following topics,
depending on whether you want to send the information as an email or trap notification.
Step 1 Ping the notification destination from the Prime Infrastructure server to ensure that there is connectivity between Prime
Infrastructure and your management application.
Step 2 Check if any firewall ACL settings are blocking port 162, and open communications on that port if needed.
Step 3 Log in to Prime Infrastructure with a user ID that has Administrator privileges. Select Administration > Logging and
download the log files. Then compare the activity recorded in these log files with the activity you are seeing in your
management application:
• ncs_nbi.log: This is the log of all the northbound SNMP trap messages Prime Infrastructure has sent. Check for
messages you have not received.
• ncs-# -# .log: This is the log of most other recent Prime Infrastructure activity. Check for hardware trap messages
you have not received.
• hm-# -# .log: This is the log of all Health Monitor activity. Check for recent messages about High Availability
state-changes and application-process failures that you have not received.
The messages you see in these logs should match the activity you see in your management application. If you find major
differences, open a support case with Cisco Technical Assistance Center (TAC) and attach the suspect log files with your
case. See Open a Cisco Support Case, on page 251.
Step 1 Choose Administration > Settings > System Settings, then choose General > Account Settings.
Step 2 Click the Support Request tab.
Step 3 Select the type of interaction you prefer:
• Enable interactions directly from the server—Specify this option to create the support case directly from the Prime
Infrastructure server. E-Mails to the support provider are sent from the e-mail address associated with the Prime
Infrastructure server or the e-mail address you specify.
• Interactions via client system only—Specify this option to download the information required for your support case
to a client machine. You must then e-mail the downloaded support case details and information to the support
provider.
This feature is enabled by default. Data is collected on a daily, weekly, and monthly basis and is posted to a
REST URL in the Cisco cloud using HTTPS. Choose Administration > Settings > System Settings, then
choose General > Help Us Improve, and:
• To view the types of data Cisco collects, click What data is Cisco collecting?
• To disable this feature, select Not at this time, thank you, then click Save.
Note If you have upgraded from a previous version of Prime Infrastructure, the product
feedback data collection option you specified in the earlier version is retained
after the upgrade for the upgraded server and the restored server. If you had not
selected any option for product feedback data collection in the previous version,
it will be enabled by default in the upgraded version and the backup and restore
server.
If you have configured high availability, the data will be collected and sent either
from the primary or secondary HA server instance (it is not sent from both the
server).
1.2.1 Supported
1.2.2 Supported
1.2.3 Supported
1.2.4 Supported
1.2.5 Supported
1.2.6 Supported
1.2.8 Supported
1.2.10 Supported
1.2.10.4 Supported
1.2.11 Supported
1.2.12 Supported
1.3.0 Supported
1.3.0.1 Supported
1.3.0.2 Supported
1.3.0.3 Supported
1.3.0.4 Supported
1.3.1 Supported
You use a single session of the migration at a time for the same Prime Infrastructure Cisco DNA Center server
pair.
Step 1 Click Cisco DNA Center coexistence in the Mega Menu page.
You can also launch Cisco DNA Center coexistence from the Getting Started page. Choose Settings > Getting Started
> Cisco DNA Center coexistence, and then click Launch Cisco DNA Center coexistence to open Prime Infrastructure
- Cisco DNA Center Coexistence page.
b) Select the Enables automatic synchronization of data integrated with Cisco DNA Center checkbox to synchronize
already migrated data set for the groups and devices from Prime Infrastructure to Cisco DNA Center automatically
post modification.
c) Select the Include newly added data during dynamic synchronization checkbox to move newly created groups
and newly added devices during dynamic synchronization if any, from Prime Infrastructure to Cisco DNA Center
automatically post addition.
Note • This checkbox is enabled only if you select the Enables automatic synchronization of data
integrated with Cisco DNA Center checkbox.
• During force synchronization, if the Enables automatic synchronization of data integrated with
Cisco DNA Center checkbox is enabled, any modifications made through force synchronization to
the Location Group and Devices entities will be dynamically synced in Cisco DNA Center.
• If the Enables automatic synchronization of data integrated with Cisco DNA Center checkbox
is selected, CMX will be dynamically assigned to Cisco DNA Center floor groups, when Cisco
Prime Infrastructure imports maps to CMX. (Pre Req.: CMX dynamic sync will work only on already
migrated floor groups and CMX should exist in Cisco DNA Center server for CMX dynamic sync.)
d) If the Enable CMX settings checkbox is selected, CMX will be pushed with floor groups. If the Enable CMX
settings check is not selected, CMX data will not be pushed to the Cisco DNA Center server.
e) Select the Migrate User Defined CLI Templates checkbox to migrate the user defined CLI and/or Composite
Templates to Cisco DNA Center.
Step 7 Click Next to go to the Select Groups page.
Step 8 In the Select Groups window:
a) Select the location groups from the Cisco Prime Infrastructure Location Groups Selector pane. Upon selecting Site
Groups, by default the buildings, floors and associated maps also get selected.
Before adding Cisco Prime Infrastructure location groups to Cisco DNA Center, you can check the limitation status
bar for the selected/maximum devices and site groups of Cisco DNA Center.
The Cisco Prime Infrastructure Location groups selector pane lists all the Prime Infrastructure groups irrespective
of any virtual domain.
Note • Cisco Prime Infrastructure does not migrate devices assigned in a "Campus" to the Cisco DNA Center,
when the co-existence tool is used.
• As a workaround, you can assign your devices to a "Building" or "Floor" type location group before
using the co-existence tool.
• Civic location is mandatory for Location Groups / Site groups migration especially for Cisco DNA
Center 2.2.1.0 version.
• Enabling the proxy setting is mandatory for migrating country code along with location groups.
• Access Points positioned in the maps in Cisco Prime Infrastructure will migrate to Cisco DNA Center,
only if we manage its WLC devices with CLI Credentials.
• Devices assigned in the Location groups with 'Default' Group type will not migrate to DNAC
a) You can view the list of associated CMX for selected groups with the following details:
• Credential Status
• Server IP address
• Server Name
• Username
• Owner
• SSH Username
• SSH Password
b) You must update the SSH Username and SSH Password, if it is not available for the respective CMX.
c) If the associated CMX is not found, then click Next.
Note When the Cisco Prime Infrastructure – Cisco DNA Center migration tool is active and auto sync is enabled,
then CMX will be dynamically pushed to Cisco DNA Center floor groups. Cisco DNA Center will there by
track the location data for assigned groups.
Step 11 If "Migrate User Defined CLI Templates" checkbox is selected in 'Sync settings' page, then a new page "Select CLI
Templates" will be seen after CMX page.
Step 12 In the Select CLI Templates window:
a) Non-Migrated Templates will list all the applicable user defined CLI and/or Composite templates for the device
types in the selected groups for migration to Cisco DNA Center.
b) Migrated templates will list all the migrated templates available in Cisco DNA Center. You can either update or
delete these templates.
Note By default all the rows will be selected. Selected templates from the list will be updated and the deselected
templates will be deleted from Cisco DNA Center.
Overview Dashboard
The following table describes the information displayed on the Administration > Dashboards > System
Monitoring Dashboard > Overview dashboard.
Status of the data cleanup jobs over the selected period. Data Cleanup
Status of backup jobs, local and remote server backups and alarms on server backup over the selected Backup Information
period.
Physical memory and swap memory utilization displaying the set threshold limit. Also provides information Memory Utilization
on threads utilizing the memory when the threshold is breached.
CPU utilization and the set threshold limit. Also provides information on the processes and the jobs CPU Utilization
running in Prime Infrastructure that consumes more CPU when the threshold is breached.
Disk utilization and the set threshold limit. Also provides information on the files and the tablespaces Disk Utilization
using the disk when the threshold is breached.
Virtual Domain Summary - Click on the summary icon to view the association between virtuals domains Virtual Domain
and the users. Also the members without virtual domain association. It allows you export the list of Summary
respective associations.
The successful restore information over the selected period, the backup name and the restoration time. Restore Information
Choose Administration > System Settings > System Event Configuration to set the threshold limit for
CPU/Disk/Memory utilization and to configure the alarm generation and clearance monitor settings.
The Memory Utilization, Disk Utilization and CPU Utilization dashlets have threshold markers indicated in
red color, and a time slider provided at the bottom to zoom-in to a particular time period. You can click the
pin icon in the tool-tip to extend the tool-tip display duration.
Related Topics
Performance Dashboard, on page 112
Admin Dashboard, on page 113
Performance Dashboard
The following table describes the information displayed on the Administration > Dashboards > System
Monitoring Dashboard > Performance Performance dashboard.
Disk read and write over the set collection time frame. System Disk Throughput
Number of read/write requests that were issued to the server per second. System Disk IOPS
Number of requests waiting in the server queue. System Disk Outstanding I/O
The speed at which data is currently being transferred based on the traffic flowing through available Network Interface Traffic
network interfaces such as eth0, eth1, and I/O interfaces.
Collective information on the CPU usage, disk usage, and memory usage. Composite View
Admin Dashboard
The following table describes the information displayed on the Administration > Dashboards > System
Monitoring Dashboard > Admin dashboard.
Alarms and events issued against the Prime Infrastructure server itself, including a Health System Alarms
list of events, times events occurred, and their severities.
General health statistics for the Prime Infrastructure server, such as the number of System Information
jobs scheduled and running, the number of supported MIB variables, how much
polling the server is doing, and the number of users logged in.
The relative proportion of the Prime Infrastructure server database taken up by data DB Usage Distribution
on discovered device inventory (“Lifecycle Clients”), their current status and
performance data (“Lifecycle Statistics”), and the server’s own system data
(“Infrastructure” and “DB-Index”)
How quickly the Prime Infrastructure server is responding to user service requests API Health API Response Time Summary
for information, such device reachability, alarms and events, and so on. Shows the
maximum, minimum, and average response times for each API underlying a client
service.
The trend over time in how quickly the Prime Infrastructure server is responding to Service API Response Time Trend
user service requests. Details
The activity level for each of the logged-in Prime Infrastructure users, measured by API Calls Per Client Chart
the number of service requests each is generating.
The trend over time in the total number of service requests logged-in clients are API Request Count Trend
generating,
As your network grows, you will approach the maximum device/interface/flow rating for your OVA. You
will want to check on this from time to time. You can do so using the information available to you on the
Admin dashboards, as explained in “Monitoring Prime Infrastructure Health”.
If you find Prime Infrastructure is using 80 percent or more of your system resources or the device/interface/flow
counts recommended for the size of OVA you have installed, we recommend that you address this using one
or more of the following approaches, as appropriate for your needs:
• Recover as much existing disk space as you can, following the instructions in “Compacting the Prime
Infrastructure Database”.
• Add more disk space—VMware OVA technology enables you to easily add disk space to an existing
server. You will need to shut down the Prime Infrastructure server and then follow the instructions
provided by VMware to expand the physical disk space (see “VMware vSphere Documentation” in
Related Topics). Once you restart the virtual appliance, Prime Infrastructure automatically makes use of
the additional disk space.
• Limit collection—Not all data that Prime Infrastructure is capable of collecting will be of interest to you.
For example, if you are not using the system to report on wireless radio performance statistics, you need
not collect or retain that data, and can disable the Radio Performance collection task. Alternatively, you
may decide that you need only the aggregated Radio Performance data, and can disable retention of raw
performance data. For details on how to do this, see “Specifying Data Retention by Category”.
• Shorten retention—Prime Infrastructure defaults set generous retention periods for all of the data it
persists and for the reports it generates. You may find that some of these periods exceed your needs, and
that you can reduce them without negative effects. For details on this approach, see “Controlling Report
Storage and Retention”, “Specifying Data Retention by Category”, and “Specifying Data Retention By
Database Table.”
• Off load backups and reports—You can save space on the Prime Infrastructure server by saving reports
and backups to a remote server. For details, see “Using Remote Backup Repositories”.
• Migrate to a new server—Set up a new server that meets at least the minimum RAM, disk space, and
processor requirements of the next higher level of physical or virtual appliance. Back up your existing
system, then restore it to a virtual machine on the higher-rated server. For details, see “Migrating to
Another OVA Using Backup and Restore”.
For more details, see "System Requirements", "Cisco Prime Infrastructure Quick Start Guide" and, "VMware
vSphere Documentation".
Related Topics
Overview Dashboard, on page 111
Compact the Prime Infrastructure Database, on page 116
How Data Retention Settings Affect Web GUI Data, on page 145
Specify Data Retention By Database Table, on page 149
Control Report Storage and Retention, on page 151
Use a Remote Backup Repository, on page 51
Migrate to Another Virtual Appliance Using Backup and Restore, on page 62
Related Topics
How to Evaluate OVA Size and System Resources, on page 113
How to Improve the Performance of Prime Infrastructure, on page 115
Tip For better performance: If you are changing RAM and CPU resource allocations for the virtual machine on
which you run Prime Infrastructure, and you have more than one virtual machine running on the same hardware,
you may also want to change your RAM and CPU resource reservations using the vSphere Client’s Resource
Allocation tab. For details, see “VMware vSphere documentation” in Related Topics.
Step 1 Open a CLI session with the Prime Infrastructure server (see “Connecting Via CLI”).
Step 2 Stop Prime Infrastructure using the ncs stop command (see “Stopping Prime Infrastructure”).
Step 3 Halt the VMware virtual appliance:
PIServer/admin# halt
Step 4 Launch the vSphere Client, right-click the virtual appliance, then click Edit Settings.
Step 5 To change the RAM allocation, select Memory and change the Memory Size as needed. Then click OK.
Step 6 To change the CPU allocation, select CPUs and select the Number of Virtual Processors from the drop-down list. Then
click OK.
Step 7 To add a new disk (you cannot expand the space of the existing disk):
a) Click Add.
b) Select Hard Disk, then click Next.
c) Check Create a new virtual disk, then click Next.
d) Enter the desired Disk Size and specify a Location for the new virtual disk, then click Next.
e) With the Advanced Options displayed, click Next, then click Finish.
Step 8 Power on the virtual appliance (see “Restarting Prime Infrastructure”)
For more details, see "Backing Up and Restoring Prime Infrastructure" and VMware vSphere Documentation.
Note Cisco Prime Infrastructure is installed only using the 1 Gbps ports. To disable the 10 Gbps ports and use the 1
Gbps ports to install Prime Infrastructure, perform the following steps.
a. Login to CIMC Console.
b. Navigate to Compute > BIOS > Configure BIOS > Advanced > LOM and PCle Slots Configuration.
c. Choose the Disabled option from the PCIe Slot:MLOM OptionROM and PCIe Slot:MLOM Link Speed
drop-down lists.
d. Click the Save button.
e. Navigate to Host Power, Power Cycle the machine and then Power ON.
Related Topics
How to Connect Via CLI, on page 125
Stop Prime Infrastructure, on page 127
Restart Prime Infrastructure Using CLI, on page 127
How to Improve the Performance of Prime Infrastructure, on page 115
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI” in related topics).
Step 2 Enter the following command to compact the application database:
Related Topics
How to Connect Via CLI, on page 125
How to Improve the Performance of Prime Infrastructure, on page 115
Step 1 Choose Administration > Settings > System Settings > Client and User > Client. The Client page appears.
Step 2 In the Process Diagnostic Trap area, select the Automatically troubleshoot client on diagnostic channel check box, then
click Save. For more details, see Cisco Compatible Extensions Client Devices page.
Related Topics
Configure Client Performance Settings, on page 117
How to Improve the Performance of Prime Infrastructure, on page 115
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Select the Lookup client host names from DNS server check box.
Step 3 Enter the number of days that you want the hostname to remain in the cache, then click Save.
Related Topics
Configure Client Performance Settings, on page 117
How to Improve the Performance of Prime Infrastructure, on page 115
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Under Data Retention, change the following parameters as needed:
• Dissociated Clients —Enter the number of days that you want Prime Infrastructure to retain the data. The valid
range is 1 to 30 days.
• Client session history—Enter the number of days that you want Prime Infrastructure to retain the data. The valid
range is 7 to 365 days.
• Number of Rows To Keep—Enter the maximum number of client session records to maintain. The default is
8,000,000.
Related Topics
Configure Client Performance Settings, on page 117
How to Improve the Performance of Prime Infrastructure, on page 115
roaming and associating/disassociating often. In this case, polling clients every time you receive a trap or
syslog may be an unnecessary processing burden.
If you enable the Wireless Polling Clients when Receiving Client Traps/Syslogs option, Prime Infrastructure
enables Client Authentication, Client Deauthentication, and Client Disassociate Traps on the WLC even if
you previously disabled the traps on the WLC. Prime Infrastructure triggers the WLC Sync operation, which
enables the client traps on WLC.
Step 1 Choose Administration > Settings > System Settings > Client.
Step 2 Select the Poll clients when client traps/syslogs received check box. Prime Infrastructure will poll clients as soon as a
trap or syslog is received, to identify client sessions.
Step 3 Click Save.
Related Topics
Configure Client Performance Settings, on page 117
How to Improve the Performance of Prime Infrastructure, on page 115
Step 1 Choose Administration > Settings > System Settings > Client.
Step 2 Unselect the Save client association and disassociation traps as events check box.
Step 3 Click Save to confirm this configuration change. This option is disabled by default.
Related Topics
Configure Client Performance Settings, on page 117
How to Improve the Performance of Prime Infrastructure, on page 115
Step 1 Choose Administration > Settings > System Settings > Client.
Step 2 Select the Save 802.1x and 802.11 client authentication fail traps as events check box.
Step 3 Click Save to confirm this configuration change.
Related Topics
Configure Client Performance Settings, on page 117
How to Improve the Performance of Prime Infrastructure, on page 115
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Select the Discover Clients from enhanced client traps check box.
Step 3 Make sure that the Prime Infrastructure server is registered as a Trap receiver on Cisco WLC for receiving Client traps.
The following trap flags need to be enabled on the devices for enhanced client trap to work:
• config trapflags client enhanced-802.11-associate enable
• config trapflags client enhanced-802.11-deauthenticate enable
• config trapflags client enhanced-authentication enable
• config trapflags client enhanced-802.11-stats enable
Step 4 To log the incoming enhanced client traps on the Prime Infrastructure side, you can enable client trap logging via ssh to
root shell. This generates clientTraps.log file under the /opt/CSCOlumos/logs file.
• /opt/CSCOlumos/bin/setLogLevel.sh com.cisco.client.traps TRACE
Note Enhanced clients traps from Prime Infrastructure is supported from WLC version 8.0 onwards.
You can increase the Assurance memory pool without balancing Assurance memory allocations, and vice
versa. But using these two optimization options together is the best way to improve Prime Infrastructure
performance when Assurance features are used.
Related Topics
Monitor Assurance Memory Allocation and Demand, on page 121
Increase the Assurance Memory Pool Via CLI, on page 121
How to Balance the Assurance Memory Allocation, on page 122
Reset Assurance Memory Allocation, on page 122
Reset the Assurance Memory Pool, on page 122
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the text link Assurance Memory Statistics (in the upper right corner of the page). Prime Infrastructure displays:
• The current memory allocation in megabytes for each of the main Assurance feature categories, including Traffic,
Performance Routing, Applications, Voice-Video data, Device Health, Lync and other data.
• The usage of each area’s memory allocation over the last 24 hours. The percentage represents the peak memory
usage over that period (that is, if 100 percent of the memory allocation is used at any point in the past 24 hours, the
usage percentage shown will be 100 percent).
Related Topics
Optimize Memory for Assurance Processing, on page 120
Increase the Assurance Memory Pool Via CLI, on page 121
How to Balance the Assurance Memory Allocation, on page 122
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command:
PIServer/admin# ncs tune-resources assurance
Step 3 Restart the Prime Infrastructure server (see “Restart Prime Infrastructure”).
Related Topics
How to Connect Via CLI, on page 125
Restart Prime Infrastructure Using CLI, on page 127
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the text link Assurance Memory Statistics (in the upper right corner of the Data Sources page).
Step 3 Click Rebalance.
Prime Infrastructure will change Assurance memory allocations to individual features as needed, reducing allocations
for less-used features and increasing allocations for features where usage over the past 24 hours was at or near 100 percent.
Related Topics
Optimize Memory for Assurance Processing, on page 120
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the text link Assurance Memory Statistics (in the upper right corner of the Data Sources page).
Step 3 Click Reset.
Related Topics
Optimize Memory for Assurance Processing, on page 120
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command:
PIServer/admin# ncs tune-resources default
Step 3 Restart the Prime Infrastructure server (see “Restart Prime Infrastructure”).
Related Topics
Increase the Assurance Memory Pool Via CLI, on page 121
How to Connect Via CLI, on page 125
Restart Prime Infrastructure Using CLI, on page 127
Optimize Memory for Assurance Processing, on page 120
Select Services > Application Visibility & Control > Data Sources. Prime Infrastructure displays a summary page that
lists each device data source’s:
• Device Name–The host name of the data source
• Data Source–The IP address of the data source.
• Type–The type of data the source is sending to Prime Infrastructure (e.g., “Netflow”).
• Exporting Device–The IP address of the device exporting the data to Prime Infrastructure.
• Last 5 min Flow Read Rate–The amount of data Prime Infrastructure has received from this source during the last
five minutes.
• Last Active Time–The latest date and time that Prime Infrastructure received data from this source.
For each Cisco NAM data collector sources, the page lists:
• Name–The host name of the NAM.
• Type–The type of data the NAM is collecting and sending to Prime Infrastructure (e.g., “Cisco Branch Routers
Series Network Analysis Module”).
• Host IP Address–The IP address of the NAM.
• Data Usage in System–Whether the data forwarded by this NAM is enabled for use in Prime Infrastructure.
• Last Active Time–The latest date and time that Prime Infrastructure received data from this NAM.
Related Topics
Special Administrative Tasks, on page 124
Delete Data Sources, on page 124
Step 1 Select Services > Application Visibility & Control > Data Sources.
Step 2 Select the checkbox next to the inactive data source you want to delete.
Step 3 Click Delete.
Step 4 Click OK to confirm the deletion.
Related Topics
Special Administrative Tasks, on page 124
View Current Data Sources, on page 123
Note Disabling the SSH legacy ciphers may impact associating with the Prime Infrastructure that utilizes the legacy
SSH client.
Step 1 Start up your SSH client, start an SSH session via your local machine’s command line, or connect to the dedicated console
on the Prime Infrastructure physical or virtual appliance.
Step 2 Log in as appropriate: If you are using a GUI client: Enter the ID of an active administrator with CLI access and the IP
address or host name of the Prime Infrastructure server. Then initiate the connection. If you are using a command-line
client or session: Log in with a command like the following:[localhost]# ssh username@IPHost -Whereusername is the
user ID of a Prime Infrastructure administrator with CLI access to the server.IPHost is the IP address or host name of the
Prime Infrastructure server or appliance. If you are using the console: A prompt is shown for the administrator user name.
Enter the user name.
Prime Infrastructure will then prompt you for the password for the administrator ID you entered.
Step 3 Enter the administrative ID password. Prime Infrastructure will present a command prompt like the following:
PIServer/admin#.
Step 4 If the command you need to enter requires that you enter “configure terminal” mode, enter the following command at
the prompt:
PIServer/admin# configure terminal
The prompt will change from PIServer/admin# to PIServer/admin/conf#.
Related Topics
Special Administrative Tasks, on page 124
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command to start the Prime Infrastructure server or appliance:
PIServer/admin# ncs start
Related Topics
How to Connect Via CLI, on page 125
Stop Prime Infrastructure, on page 127
Restart Prime Infrastructure Using CLI, on page 127
Special Administrative Tasks, on page 124
Step 1 Open a CLI session with the Prime Infrastructure server (see “Connecting Via CLI”).
Step 2 Enter the following command to display the current status of Prime Infrastructure processes and services:
PIServer/admin# ncs status
Related Topics
How to Connect Via CLI, on page 125
Overview Dashboard, on page 111
Special Administrative Tasks, on page 124
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect via CLI”).
Step 2 Enter the following command to display the current status of Prime Infrastructure processes and services:
PIServer/admin# show version
Related Topics
How to Connect Via CLI, on page 125
Special Administrative Tasks, on page 124
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to connect via CLI”).
Step 2 Enter the following command to stop the Prime Infrastructure server or appliance:
PIServer/admin# ncs stop
Related Topics
How to Connect Via CLI, on page 125
Special Administrative Tasks, on page 124
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect via CLI”).
Step 2 Enter the following command to stop the Prime Infrastructure server or appliance:
PIServer/admin# ncs stop
Step 4 Enter the following command to restart the Prime Infrastructure server or appliance:
PIServer/admin# ncs start
Related Topics
How to Connect Via CLI, on page 125
Special Administrative Tasks, on page 124
Restart Prime Infrastructure Using GUI, on page 128
Related Topics
Restart Prime Infrastructure Using CLI, on page 127
Related Topics
Stop Prime Infrastructure, on page 127
Special Administrative Tasks, on page 124
Related Topics
Stop Prime Infrastructure, on page 127
How to Get the Installation ISO Image, on page 136
Special Administrative Tasks, on page 124
Note Setting the hostname using hostnamectl changes the uppercase letters to lowercase. Although Redhat 7 and
CentOS 7 provide hostnamectl to set the hostname permanently, the real hostname will only be lowercase
even if the users specify any uppercase letters.
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”). Be sure to enter “configure
terminal” mode.
Step 2 Enter the following command:
PIServer/admin(config)# hostname newHostName
Where newHostName is the new host name you want to assign to the Prime Infrastructure server.
Step 3 Restart the Prime Infrastructure server using the ncs stop and ncs start commands, as explained in "Restart Prime
Infrastructure" .
Related Topics
How to Connect Via CLI, on page 125
Restart Prime Infrastructure Using CLI, on page 127
Special Administrative Tasks, on page 124
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”).
Step 2 Enter the following command:
PIServer/admin#ncs password ftpuser ftp-user password password
Where:
• ftp-user is the username for FTP operation.
• password is the login password for ftp-user.
Note The username for FTP must be ftp-user.
For example:
pi-system-999/admin# ncs password ftpuser root password MyPassword
Updating FTP password.
Saving FTP account password in credential store
Syncing FTP account password to database store - location-ftp-user
Syncing FTP account password to system store
Completed FTP password update
pi-system-999/admin#
Related Topics
How to Connect Via CLI, on page 125
Special Administrative Tasks, on page 124
Step 1 Open a CLI session with the Prime Infrastructure server (see “How to Connect Via CLI”) in Related Topics.
Step 2 Enter the following command:
PIServer/admin# ncs password root password password
Where password is the root user login password. You can enter a password not exceeding 80 characters.
For example:
Related Topics
How to Connect Via CLI, on page 125
Special Administrative Tasks, on page 124
Step 1 Launch your VMware vSphere Client and connect to the ESXi host or vCenter server.
Step 2 Upload the installation ISO image to the data store on the OVA virtual machine, as follows:
a) In the vSphere Server, click Inventory > Summary > Datastores.
b) On the Objects tab, select the datastore to which you will upload the file.
c) Click the Navigate to the datastore file browser icon.
d) If needed, click the Create a new folder icon and create a new folder.
e) Select the folder that you created or select an existing folder, and click the Upload a File icon.
If the Client Integration Access Control dialog box appears, click Allow to allow the plug-in to access your operating
system and proceed with the file upload.
f) On the local computer, find the ISO file and upload it.
g) Refresh the datastore file browser to see the uploaded file in the list.
Step 3 With the ISO image uploaded to a datastore, make it the default boot image, as follows:
a) Using the VMware vSphere client, right-click the deployed OVA and choose Power > Power Off.
b) Select Edit Settings > Hardware, then select CD/DVD drive 1.
c) Under Device Type, select Datastore ISO File, then use the Browse button to select the ISO image file you uploaded
to the datastore.
d) Under Device Status, select Connect at power on.
e) Click the Options tab and select Boot Options. Under Force BIOS Setup, select Next time VM boots, force entry
into BIOS setup Screen. This will force a boot from the virtual machine BIOS when you restart the virtual machine.
f) Click OK.
g) In the VMware vSphere client, right-click the deployed OVA and choose Power > Power On.
h) In the BIOS setup menu, find the option that controls the boot order of devices and move DVD/CDROM to the top.
Step 4 Follow the steps below to reset a server administrator password:
a) Save your BIOS settings and exit the BIOS setup menu. The virtual machine will boot from the ISO image and display
a list of boot options.
b) Enter 3 if you are using the keyboard and monitor to access the OVA, or 4 if you are accessing via command line or
console. The vSphere client displays a list of administrator user names.
c) Enter the number shown next to the administrator username for which you want to reset the password.
d) Enter the new password and verify it with a second entry.
e) Make sure to disconnect ISO image before confirming the changes using the vSphere client.
f) Click the CD icon and select Disconnect ISO image.
g) Enter Y to save your changes and reboot.
Related Topics
How to Get the Installation ISO Image, on page 136
Special Administrative Tasks, on page 124
Step 11 Select the desired DVD mount option and in this case, you must select Cisco vKVM-Mapped vDVD1.22.
Step 12 The vSphere client displays a list of boot options. Enter 3 to select the Recover administrator password
(Keyboard/Monitor) boot option.
Note If you are using Serial Console to recover password, then you must enter 4 to select the Recover administrator
password (Serial Console) boot option.
Step 13 The vSphere client displays a list of administrator user names. Enter the number shown next to the administrator user
name for which you want to recover (reset) the password and press Enter.
Step 14 Enter the new password and verify it with a second entry.
Step 15 Enter Y to save your changes and reboot the system.
Step 16 Login to the admin CLI with the new administrator password.
Note You can follow the same steps to recover password using VGA console and Serial console.
To recover the password using Serial Console/Serial Over Lan-SOL, follow these steps:
# scope chasis
# power off
This operation will change the server's power state.
Do you want to continue?[y|N]y
#
#
# power on
This operation will change the server's power state.
Do you want to continue?[y|N]y
# exit
# scope sol
# show detail
Serial Over LAN:
Enabled: yes
Baud Rate(bps): 9600
Step 5 The machine reboots and prompts to enter F6 for boot option. Press the function-key F6.
You may need to press F6 multiple times to see Enter boot selection menu... in the screen. You must wait for a few
minutes to get the boot device option.
Step 6 Select the desired DVD mount option and in this case, you must select Cisco CIMC-Mapped vDVD1.22.
Step 7 The vSphere client displays a list of boot options. Enter 4 to select the Recover administrator password (Serial
Console) boot option.
Note To recover administrator password for Gen 3 appliances, it is recommended to use Serial Over Lan
(Serial console)
Step 8 The vSphere client displays a list of administrator user names. Enter the number shown next to the administrator user
name for which you want to recover (reset) the password and press Enter.
Step 9 Enter the new password and verify it with a second entry.
Step 10 Enter Y to save your changes and reboot the system.
Step 11 Login to the admin CLI with the new administrator password.
Step 1 Launch your Hyper-V Machine and make sure ISO image available in your Hyper-V Machine.
Step 2 Connect to the Hyper-V Manager.
a) Right-click the virtual machine for which you want to reset the password and select Connect.
The Virtual Machine Connection window opens.
b) Choose Media > DVD Drive > Insert Disk.
c) Browse and select the ISO image.
d) Turn Off and Start the virtual machine as follows:
• Choose Action > Turn Off.
• Click Turn Off in the Turn Off Machine pop-up.
Step 3 The virtual machine will boot from the ISO image and will display a list of boot options.
a) Enter 3 (The option for recovering Administrator password)
b) Enter the number shown for the administrator username for which you want to reset the password.
c) Enter the new password and verify it with a second entry.
d) Enter Y to save your changes and reboot.
e) Wait until the machine gets rebooted.
Step 4 Log in with the new administrator password.
Step 1 On a browser with internet access, link to the Cisco Software Download Navigator (see Related Topics).
Step 2 Use the Find box to search for “Cisco Prime Infrastructure”.
Step 3 From the results list, select the software version you are using.
Step 4 Select Prime Infrastructure Software to display the list of ISOs and other downloadable image files for that software
version.
Step 5 Download the ISO image from the page.
Step 6 When the download is complete, check that the MD5 checksum of the downloaded file matches the checksum shown for
the file on its Cisco.com download page. If the checksums do not match, the file is corrupt, and you will need to download
it from Cisco.com again.
Step 7 If you need the ISO image on disk: Burn the ISO image to a Dual Layer DVD using DVD authoring software. For reliable
results, we recommend that you conduct the burn at single (1X) speed and with the “Verify” option turned on.
For more details, see https://software.cisco.com/download/navigator.html and Cisco Prime Infrastructure 3.9 Appliance
Hardware Installation Guide
Related Topics
Special Administrative Tasks, on page 124
Step 1 Choose Administration > Settings > System settings > Account Settings.
Step 2 Enter a valid Cisco.com user name and password.
Step 3 Click Save.
Step 4 Choose Administration > Settings > System Settings > General > Software Update.
Step 5 Under Notification Settings, select the categories for which you want updates displayed on the Administration > Software
Update page.
Step 6 Click Save.
To see notifications: Click on the notifications icon at the top right, next to the alarms icon.
Related Topics
Configure Software Update Notifications, on page 138
View Installed and Available Software Updates, on page 137
How to Use Your Cisco.com Account Credentials with Prime Infrastructure, on page 141
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Choose Administration > Settings > System Settings > General > Software Update.
Step 2 Under Notification Settings, select the categories for which you want updates displayed on the Administration > Software
Update page.
Step 3 Click Save.
Related Topics
View Installed and Available Software Updates, on page 137
How to Get Software Update Notifications, on page 138
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Choose Administration Settings > Licenses and Software Updates > Software Update.
Step 2 Click the Updates tab to see the Name, Type, Version, Status and Date of each installed software update.
To filter this list, click the Filter icon at the right side of the Updates tab and select the categories of installed updates you
want to see.
Step 3 Click the Files tab to see the list of installed UBF files and downloaded UBF files which have yet to be installed.
To delete a software update file that has not yet been installed, select the file and click Delete.
Related Topics
View Installed and Available Software Updates, on page 137
View Installed Updates From the Login Page, on page 139
View Installed Updates From the About Page, on page 139
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Launch or log out of Prime Infrastructure. The login page displays.
Step 2 Click View installed updates. Prime Infrastructure displays a popup list of the names and versions of all installed software
updates.
Step 3 Click the Close button to close the popup list.
Related Topics
View Installed Updates From the About Page, on page 139
View Installed and Available Software Updates, on page 137
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Click the settings icon at the upper right corner of any Prime Infrastructure page.
Step 2 Click About Prime infrastructure. The About page appears, listing the version of the product and other details.
Step 3 Click View installed updates. Prime Infrastructure displays a popup list of the names and versions of all installed software
updates.
Step 4 Click the Close button to close the popup list.
Related Topics
View Installed Updates From the Login Page, on page 139
View Installed and Available Software Updates, on page 137
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Choose Administration > Licenses and Software Updates > Software Update.
Step 2 Click the download link at the top of the page to get the latest updates from Cisco.com.
Step 3 Enter your Cisco.com login credentials. Prime Infrastructure lists the available updates.
If you receive an error indicating there was a problem connecting to cisco.com, verify your proxy settings by choosing
Administration > Settings > System Settings > General > Account Settings > Proxy. If your proxy settings are not
working, deselect Enable Proxy, then click Save.
Step 4 Click Show Details to see the details about the updates.
Step 5 Click Download next to the update you want to install.
Step 6 After the update has been downloaded, click Install.
Step 7 Click Yes in the pop-up message. The server will restart automatically.
Step 8 When the restart is complete, choose Administration > Licenses and Software Updates > Software Update. The
Updates table should show the update as “Installed”.
Related Topics
Install Software Updates, on page 139
Restart Prime Infrastructure Using CLI, on page 127
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Choose Administration > Licenses and Software Updates > Software Update.
Step 2 Click the upload link at the top of the page.
Step 3 On the Upload Update window, click Cisco Download, which displays Cisco.com’s “Download Software” page.
Step 4 Select Products > Cloud and Systems Management > Routing and Switch Management > Network Management
Solutions > Prime Infrastructure.
Step 8 With the update file downloaded to your client machine, return to the Prime Infrastructure tab and choose Administration
> Licenses and Software Updates > Software Update.
Step 9 Click Upload and browse to locate and select the update file you downloaded.
Step 10 Click Install.
Step 11 Click Yes in the pop-up message. The server will restart automatically.
Step 12 When the restart is complete, choose Administration > Licenses and Software Updates > Software Update. The
Updates table should show the update as “Installed”.
Related Topics
Install Software Updates, on page 139
Save Cisco.com Account Credentials in Prime Infrastructure, on page 141
Restart Prime Infrastructure Using CLI, on page 127
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Choose Administration > Settings > System settings > Account Settings
Step 2 Enter a valid Cisco.com user name and password.
Related Topics
Install Software Updates from Cisco.com, on page 140
Restart Prime Infrastructure Using CLI, on page 127
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Choose Administration > Settings > System settings > Account Settings.
Step 2 Click Delete.
Step 3 Click Yes to confirm the deletion.
Related Topics
Install Software Updates, on page 139
Restart Prime Infrastructure Using CLI, on page 127
How to Update Prime Infrastructure With Latest Software Updates, on page 137
Step 1 Choose Administration > Settings > System Settings > Support Request. The Support Request Settings page appears.
Step 2 Configure the following parameters:
• General Support Settings:
• Enable interactions directly from the server—Select this check box to allow interactions for support requests
directly from the server.
• Sender E mail Address—Enter the email address of the support request sender.
• Interactions via client system only—Select this check box to allow interactions for support requests only through
client system.
Related Topics
Open a Cisco Support Case, on page 251
Join the Cisco Support Community, on page 252
How Data Retention Settings Affect Web GUI Data, on page 145
Specify Data Retention By Database Table, on page 149
Enable DNS Hostname Lookup, on page 118
Modify VM Resource Allocation Using VMware vSphere Client, on page 115
Migrate to Another Virtual Appliance Using Backup and Restore, on page 62
Migrate to Another Physical Appliance Using Backup and Restore, on page 62
If you specify these settings, all data displayed in performance reports and on performance dashboards will
be for the previous 7 days only. When you generate a performance report, even if you select a reporting period
longer than the last 7 days, the report will contain data from the last 7 days only (because that is all of the data
you selected to retain).
Similarly, if you view a performance dashboard and select a time frame longer than one week, the dashboard
will contain date from the last 7 days only.
When you create the monitoring policy for interfaces, you can define the polling interval for every 15 minutes
or every 5 minutes or every 1 minute. According to the selected polling interval, the device data is polled and
stored in Oracle Database. The data is aggregated every 1 hour into the AHxxx table; once a day into the
ADxxx table irrespective of the polling interval is set to1/5/15 minutes.
In the Interface Health Policy tab, if the frequency is set at 5 mins, you can view 12 samples for each hour.
Every hour the data moves to the aggregated table and an average or mean interface statistics is calculated ,
and there will be one entry in the hourly aggregated table. The aggregation is the same for all the policies no
matter what the polling interval is.
You can view data retention details and the age of the data storage, the event time in milliseconds and for
each database the entity ID and the event time.View the performance data and aggregate data in the Performance
Dashlet, > Interfaces > Traffic Utilization tab.
Note Cisco recommends you do not change the retention periods for trend, device health, system health, and
performance data because the default settings are optimized to get the most helpful information from interactive
graphs.
The following table describes the information shown on the Data Retention page.
Trend Data Device-related historical information. Trend Hourly data retain period: 15 Hourly data:
Retain data is gathered as a whole and summarized (days) 1 to 31
Periods as minimums, maximums, or averages. (days)
Daily data retain period: 90
(days) Daily data: 7
to 365 (days)
Weekly data retain period: 54
(weeks) Weekly data:
2 to 108
(weeks)
Device SNMP-polled device data such as device Hourly data retain period: 15 Hourly data:
Health Data reachability, and utilization for CPU, (days) 1 to 31
Retain memory, and interfaces. (days)
Daily data retain period: 90
Periods
(days) Daily data: 7
to 365 (days)
Weekly data retain period: 54
(weeks) Weekly data:
2 to 108
(weeks)
Performance Assurance data such as traffic statistics. Short term data retain period: 7 Short term
Data Retain (days) range: 1 to
• Short-term data is aggregated every 5
Periods 31 (days)
minutes. Medium term data retain period:
31 (days) Medium term
• Medium-term data is aggregated every range: 7 to
hour. Long term data retain period:
365 (days)
378 (days)
• Long-term is aggregated daily. Long term
range: 2 to
Note You can click Advanced Settings 756 (days)
to configure the Age (In days)
and Max Records of the available
attributes.
Network Audit records for configurations triggered by Audit data retain period: 90 7 to 365
Audit Data users, and so on. (days) (days)
Retain Period
User Job Data All records for the user jobs in the completed User job data retain period: 7 2 to 365
Retain Period state. (days) (days)
System Includes most data shown on the Admin Hourly data retain period: 1 Hourly data
Health Data dashboards (days) range: 1 to
Retain 31 (days)
Daily data retain period: 7
Periods
(days) Daily data
range: 7 to
Weekly data retain period: 54
365 (days)
(weeks)
Weekly data
range: 2 to
108 (weeks)
Step 1 Choose Administration > Settings > System Settings > General > Data Retention.
Step 2 Expand the Other Data Retention Criteria section.
Step 3 Expand the database table subsection for which you want to specify Age and Max Records values.
Step 4 Click on the database table listing and enter the new values as needed.
Step 5 Click Save.
Step 1 Choose Administration > Settings > System Settings > Client and User > Client.
Step 2 Under Data Retention, modify the values as required.
Step 3 Click Save.
Step 1 Choose Services > Application Visibility & Control > Data Deduplication.
Step 2 Select the Enable Data Deduplication checkbox and click Apply. The Data Deduplication page displays the list of your
defined location groups.
Step 3 To automatically detect authoritative sources at all locations, click Auto-Detect. If it can identify them, Prime Infrastructure
will fill in the address of an authoritative source in the list box under the column listing sources for each of the classes
of application data.
Step 4 To specify authoritative sources for a class of application data at a specific location:
a) Click the location group name.
b) Click the drop-down list box under the class of application data for which you want to specify an authoritative source
(for example: click in the list box under “Application Response Time”).
c) From the drop-down list, select the data sources you want to specify as authoritative for that location and application
data type. Then click OK.
d) Click Save to save your selections.
Repeat this step as needed for each location and application data type for which you want to specify authoritative
data source.
Step 5 When you are finished, click Apply to save your changes.
Step 1 Choose Administration > Settings > System Settings > General > Report . The Report page appears.
Step 2 In Repository Path, specify the report repository path on the Prime Infrastructure server.
Step 3 In File Retain Period, specify the maximum number of days reports should be retained.
Step 4 In the External Server Settings section, provide SFTP details such as Server Host, Server Port, User Name, Password,
and the Repository Path (where the reports need to be stored in the external server).
Step 5 Click Save.
Step 1 Choose Administration > Settings > System Settings > Inventory . The Inventory page appears.
Step 2 Select the Enable event based inventory collection check box to allow Prime Infrastructure to collect inventory when
it receives a syslog event for a device.
Step 3 Select the Enable Syslog and Traps on device check box to allow Prime Infrastructure to enable syslog and trap
notifications on newly added devices.
Note This feature is not supported on the Cisco Nexus devices.
Step 1 Choose Administration > Settings > System Settings > Inventory > Configuration.
Step 2 Select the Backup Device Configuration check box.
Step 3 Click Save.
Related Topics
Roll Back Device Configurations on Template Deployment Failure, on page 152
Step 1 Choose Administration > Settings > System Settings > Configuration.
Step 2 Select the Rollback Configuration check box.
Step 3 Click Save.
• The maximum time to to wait before updating the Cisco WLC configuration archive summary information.
• Whether or not to archive configurations at initial inventory collection, after each inventory
synchronization, and on receipt of configuration change events.
• Whether or not to mask security information when exporting archived configurations to files.
• The maximum number of archived configurations for each device and the maximum number of days to
retain them.
• The maximum number of thread pools to devote to the archive operation. Increasing the default can be
helpful with Prime Infrastructure performance during archiving of changes involving more than 1,000
devices.
You can also tell Prime Infrastructure to ignore for archive purposes any change that involves specified
commands on devices of a given family, type, or model. This is useful when you want to ignore insignificant
or routine changes in a few parameters on one or many devices.
Step 1 Choose Administration > Settings > System Settings > Configuration Archive.
Step 2 On the Basic tab, change the basic archive parameters as needed.
Note The option of masking the security content while exporting is included in the Inventory > Device Management
> Configuration Archive page. See Download Configuration Files for more information.
Step 3 To specify devices and configuration commands to exclude from archived configurations:
a) Click the Advanced tab.
b) In the Product Family list, choose the device(s) for which you want to specify configuration commands to exclude.
Use the List/Tree View dropdown, or click the > icons to drill down to individual product types and models for which
you want to specify exclude commands.
c) In the Command Exclude List, enter (separated by commas) the configuration commands you want to exclude for
the currently selected device family, type, or model.
If the device(s) you select has configuration changes and Prime Infrastructure detects that the change is one of the
specified commands in the Exclude List, Prime Infrastructure will not create an archived version of the configuration
with this change.
d) Click Save.
e) To remove a specified set of command exclusions for a device family, type or model, select the device(s) in the
Product Family list and click Reset.
Note These default purging settings are provided to ensure optimal performance. Use care when adjusting these
settings, especially if Prime Infrastructure is managing a very large network (where increasing these settings
may have an adverse impact).
Prime Infrastructure stores a maximum of 8000000 events and 2000000 syslogs in the database.
To protect system performance, Prime Infrastructure purges alarms, events, and syslogs according to the
settings in the following table. All of these settings are enabled by default. Data is deleted on a daily basis.
Alarm tables are checked hourly, and if the alarm table exceeds the 300,000 limit, Prime Infrastructure deletes
the oldest cleared alarms until the alarms table size is within the limit.
To change the settings, choose Administration > Settings > System Settings, then choose Alarms and
Events > Alarms and Events and modify the settings in the Alarm and Event Cleanup Options area.
Log Purging
You can adjust the purging settings for logs by choosing Administration > Settings > Logging . Logs are
saved until the reach the maximum size. At that point, a number is appended to the log file and a new log is
started. When the number of logs exceeds the maximum, the oldest log is deleted.
The following table lists the default purging values for General and SNMP logs.
Log Type Size of Logs Number of Logs To change the setting, see:
Report Purging
By default, reports are stored in a repository named /localdisk/ftp/reports and are deleted after 31 days from
that directory. Reports filters that you set from the filters page are saved in the database and are not purged.
Step 1 Choose Administration > Settings > System Settings, then choose General > Reports.
Step 2 If required, adjust the location for the reports repository on the server. The repository must reside under the FTP root
partition.
Step 3 If you want to change the default purging age, enter a new value in the File Retain Period field
Step 4 Click Save.
Backup Purging
By default, 2 backups are saved for backups in local repositories. If you are using remote repositories, there
is no automatic backup purging mechanism; you must manually delete old backups. See Change the Number
of Automatic Application Backups That Are Saved, on page 57.
Step 1 Choose Administration > Dashboards > Job Dashboard > System Jobs.
Step 2 Select the category of data collection job you want to re-schedule (e.g., APIC-EM Integration, Assurance and Health
Summary, Infrastructure, Inventory and Discovery, or Status and Wireless Monitoring).
Step 3 Click the check box next to the system job you want to re-schedule.
Step 4 Click Edit Schedule and specify the schedule you want the job to run on.
You can select the date and time the job is executed. You can choose to have the job recur on a minute, hourly, daily,
weekly, monthly or annual basis. No end time has been specified by default.
Step 1 Choose Administration > Dashboards > Job Dashboard > System Jobs.
Step 2 Select the category of data collection job you want to pause or resume (e.g., APIC-EM Integration, Assurance and
Health Summary, Infrastructure, Inventory and Discovery, or Status and Wireless Monitoring).
Step 3 Click the check box next to the system job you want.
Step 4 Click Pause Series to stop the job from executing.
If the job is already paused, click Resume Series to resume execution on the current schedule.
Step 1 Choose Administration > Dashboards > Job Dashboard > System Jobs.
Step 2 Select the category of data collection job you want to run (e.g., APIC-EM Integration, Assurance and Health Summary,
Infrastructure, Inventory and Discovery, or Status and Wireless Monitoring).
Step 3 Click the check box to select the system job you want to run immediately.
Step 4 Click Run.
Note You must increase the frequency of the Infrastructure and Inventory jobs with caution as it impacts the
performance of Prime Infrastructure over a while as these jobs are high I/O intensive operations.
APIC-EM Site Sync 6 hours Schedules synchronization of Select Edit Schedule >
sites and devices between Recurrence and select the
APIC-EM and Prime appropriate settings to schedule
Infrastructure. the job.
APIC Server Status Periodic 5 minutes Schedules checks on APIC-EM Select Edit Schedule >
server reachability. Recurrence and select the
appropriate settings to schedule
the job.
Ping Network Devices 5 minutes Schedules ICMP Ping Select Edit Schedule >
reachability and updates the Recurrence and select the
device reachability status and appropriate settings to schedule
latency time. the job.
PnP Bulk Import 5 minutes Schedules bulk import of Select Edit Schedule >
device profiles from APIC-EM Recurrence and select the
to Prime Infrastructure. appropriate settings to schedule
the job.
PnP Status Polling 5 minutes Tracks the status of the PnP Select Edit Schedule >
devices created on APIC-EM Recurrence and select the
and adds them to Prime appropriate settings to schedule
Inventory when successful. the job.
Assurance DataSource Update Disabled Synchronizes the list of data Non Editable
sources between two different
processes in PI.
Assurance License Update Disabled Fetches the devices and AP Non Editable
which netflow associated with
it every 12 hours.
Assurance Lync Aggregation Disabled Computes the Lync call Non Editable
statistics.
Infrastructure jobs
Bulk Recompute RF Prediction 15 days Schedules status polling of Select Edit Schedule >
Bulk Recompute RF Prediction. Recurrence and select the
appropriate settings to schedule
the job.
Connected Mobility Reachability 5 minutes Schedules stauts polling of Select Edit Schedule >
Status Connected Mobility Recurrence and select the
Reachability appropriate settings to schedule
the job.
Controller Configuration Backup 1 day Displays the controller Select Edit Schedule >
configuration backup activities. Recurrence and select the
appropriate settings to schedule
the job.
Data Cleanup 2 hours Schedules daily data file Select Edit Schedule >
cleanup. Recurrence and select the
appropriate settings to schedule
the job.
Device Config Backup-External 15 minutes Transfers device configuration Select Edit Schedule >
periodically to external Recurrence and select the
repository.You can configure appropriate settings to schedule
or create the repository using the job.
CLI commands and the
Click the edit icon, and check the
supported repositories are FTP,
Export only Latest
SSH FTP (SFTP) and Network
Configuration check box, to
File System (NFS).
transfer only the latest
configuration.
You can edit the job properties
based on the user permission set
in Role Based Access Control
(RBAC).
Guest Accounts Sync 1 day Schedules guest account polling Select Edit Schedule >
and synchronization. Recurrence and select the
appropriate settings to schedule
the job.
Index serach Entities 3 hours Schedules the Index Search Select Edit Schedule >
Entities job. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Service Backup 7 days Schedules automatic mobility Select Edit Schedule >
services backups. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Service Status 5 minutes Schedules mobility services Select Edit Schedule >
status polling. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Service Synchronization 1 hour Schedules mobility services Select Edit Schedule >
synchronization. Recurrence and select the
appropriate settings to schedule
the job.
On Demand Reports Cleanup 6 hours Schedules reports cleanup. Select Edit Schedule >
Recurrence and select the
appropriate settings to schedule
the job.
Server Backup 1 day Schedules automatic Prime Select Edit Schedule >
Infrastructure server backups. Recurrence and select the
The backups created are appropriate settings to schedule
application backups. the job.
Smart License Compliance Status Disabled Runs for Smart License for the Non Editable.
default schedule.
wIPS Alarm Sync 2 hours Schedules wIPS alarm Select Edit Schedule >
synchronization. Recurrence and select the
appropriate settings to schedule
the job.
Autonomous AP Inventory 1 day Collects inventory information Select Edit Schedule >
for autonomous APs. Recurrence and select the
appropriate settings to schedule
the job.
Switch Inventory 1 day Collects inventory information Select Edit Schedule >
for Switches. Recurrence and select the
appropriate settings to schedule
the job.
Wireless Controller Inventory 1 day Collects inventory information Select Edit Schedule >
for Wireless Controllers. Recurrence and select the
appropriate settings to schedule
the job.
Status Jobs
Appliance Status 5 minutes Schedules appliance polling. Select Edit Schedule >
This task populates the Recurrence and select the
appliance polling details from appropriate settings to schedule
the Administration > Appliance the job.
> Appliance Status page. It also
populates information like the
performance and fault checking
capabilities of the appliance.
Autonomous Client Status 5 minutes Lets you schedule status polling Select Edit Schedule >
of autonomous AP clients. Recurrence and select the
appropriate settings to schedule
the job.
Autonomous AP Operational 5 minutes Schedules status polling of Select Edit Schedule >
Status autonomous wireless access Recurrence and select the
points. appropriate settings to schedule
the job.
Controller Operational Status 5 minutes Schedules controller Select Edit Schedule >
operational status polling. Recurrence and select the
appropriate settings to schedule
the job.
Device Data Collector 30 minutes Schedules data collection based Select Edit Schedule >
on specified command-line Recurrence and select the
interface (CLI) commands at a appropriate settings to schedule
configured time interval. the job.
Identity Services Engine Status 15 minutes Schedules Identity Services Select Edit Schedule >
Engine polling. Recurrence and select the
appropriate settings to schedule
the job.
Learn Unified AP Ping Capability This Job remains suspended Schedules Unified AP Ping Non-Editable.
and runs on-demand. Capability information
collection.
License Status 4 hours Schedules the license-status Select Edit Schedule >
information collection. Recurrence and select the
appropriate settings to schedule
the job.
Lightweight AP Ethernet Interface 1 minute Schedules Lightweight AP Select Edit Schedule >
Status Ethernet Interface Status Recurrence and select the
information collection. appropriate settings to schedule
the job.
Lightweight AP Operational Status 5 minutes Schedules Lightweight AP Select Edit Schedule >
Operational Status information Recurrence and select the
collection. appropriate settings to schedule
the job.
Lightweight Client Status 5 minutes Schedules information Select Edit Schedule >
collection for Lightweight AP Recurrence and select the
Clients from Network. appropriate settings to schedule
the job.
Mobility Service Performance 15 minutes Schedules status polling of Select Edit Schedule >
mobility services performance. Recurrence and select the
appropriate settings to schedule
the job.
Mobility Status Task 15 minutes Schedules status polling of Select Edit Schedule >
mobility services engines. Recurrence and select the
appropriate settings to schedule
the job.
OSS Server Status 5 minutes Schedules status polling of OSS Select Edit Schedule >
Servers. Recurrence and select the
appropriate settings to schedule
the job.
Redundancy Status 1 hour Schedules redundancy status Select Edit Schedule >
polling of primary and Recurrence and select the
secondary controllers. appropriate settings to schedule
the job.
Switch NMSP and Location Status 4 hours Schedules Switch Network Select Edit Schedule >
Mobility Services Protocol Recurrence and select the
(NMSP) and Civic Location appropriate settings to schedule
status polling. the job.
Switch Operational Status 5 minutes Schedules switch operational Select Edit Schedule >
status polling. Recurrence and select the
appropriate settings to schedule
the job.
Third Party Access Point 3 hours Schedules operational status Select Edit Schedule >
Operational Status polling of third party APs. Recurrence and select the
appropriate settings to schedule
the job.
Third Party Controller Operational 3 hours Schedules operational status Select Edit Schedule >
Status polling of third party Recurrence and select the
Controllers. appropriate settings to schedule
the job.
Unmanaged APs 15 minutes Collects poll information for Select Edit Schedule >
unmanaged access points. Recurrence and select the
appropriate settings to schedule
the job.
Wired Client Status 2 hours Schedules Wireless Client Select Edit Schedule >
status polling Recurrence and select the
appropriate settings to schedule
the job.
Wireless Configuration Audit 1 day Schedules Wireless Select Edit Schedule >
Configuration Agent audit Recurrence and select the
collection. appropriate settings to schedule
the job.
AP Image Pre-Download Status 15 minutes Allows you to see the Image Select Edit Schedule >
Predownload status of the Recurrence and select the
associated APs in the appropriate settings to schedule
controllers. To see the status of the job.
the access points, the
“Pre-download software to
APs” checkbox should be
selected while downloading
software to the controller.
Autonomous AP CPU and 15 minutes Schedules collection of Select Edit Schedule >
Memory Utilization information on memory and Recurrence and select the
CPU utilization of Autonomous appropriate settings to schedule
APs. the job.
Autonomous AP Tx Power and 15 minutes Schedules collection of Select Edit Schedule >
Channel Utilization information about radio Recurrence and select the
performance of Autonomous appropriate settings to schedule
APs. the job.
CCX Client Statistics 1 hour Schedules collection of the Select Edit Schedule >
Dot11 and security statistics for Recurrence and select the
CCX Version 5 and Version 6 appropriate settings to schedule
clients. the job.
CleanAir Air Quality 15 minutes Schedules collection of Select Edit Schedule >
information about CleanAir air Recurrence and select the
quality. appropriate settings to schedule
the job.
Client Statistics 15 minutes Schedules retrieval of statistical Select Edit Schedule >
information for autonomous Recurrence and select the
and lightweight clients. appropriate settings to schedule
the job.
Media Stream Clients 15 minutes Schedules collection of Select Edit Schedule >
information about media stream Recurrence and select the
clients. appropriate settings to schedule
the job.
Mesh Link Status 5 minutes Schedules collection of status Select Edit Schedule >
of mesh links. Recurrence and select the
appropriate settings to schedule
the job.
Mesh link Performance 10 minutes Schedules collection of Select Edit Schedule >
information about the Recurrence and select the
performance of mesh links. appropriate settings to schedule
the job.
Radio Voice Performance 15 minutes Schedules collection of voice Select Edit Schedule >
statistics from wireless radios. Recurrence and select the
appropriate settings to schedule
the job.
Switch CPU and Memory Poll 30 minutes Schedules polling of switch Select Edit Schedule >
CPU and memory information. Recurrence and select the
appropriate settings to schedule
the job.
Traffic Stream Metrics 8 minutes Retrieves traffic stream metrics Select Edit Schedule >
for the clients. Recurrence and select the
appropriate settings to schedule
the job.
Wireless Controller Performance 30 minutes Schedules collection of Select Edit Schedule >
performance statistics for Recurrence and select the
wireless controllers. appropriate settings to schedule
the job.
Wireless QoS Statistics 15 minutes Schedules collection of Select Edit Schedule >
information QoS Statistics for Recurrence and select the
Wireless Controllers. appropriate settings to schedule
the job.
Step 4 Import the LMS backup into Prime Infrastructure using the following command:
admin# lms migrate repository carsapps
Step 5 Exit your CLI session, log back in to the Prime Infrastructure user interface, and verify that your LMS data was imported
properly. The following table shows where to look in Prime Infrastructure for the imported LMS data.
Static Group Inventory > Network Devices > User Defined Group
Dynamic Group Inventory > Network Devices > User Defined Group
User Defined Templates (Netconfig) Configuration > Templates > Features & Technologies
LMS Local Users Administration > Users, Roles & AAA > Users
MIBs Monitor > Monitoring Policies. In the menu, click Add, then select
Policy Types > Custom MIB Polling.
Prime Infrastructure Web interface that facilitates day-to-day Prime Infrastructure web GUI everyday users—Created by
web GUI and administration operations using the web GUI root user . These users have varying degrees of
web GUI. These users can have varying privileges and are classified into role-based access control
degrees of privileges and are classified (RBAC) classes and subclasses called user groups (Admin, Super
into role-based access control (RBAC) Users, Config Managers, and so forth). For information on the
classes and subclasses. user groups, see Types of User Groups, on page 173.
This interface provides a subset of Prime Infrastructure web GUI root user—Created at
operations that are provided by the Prime installation and intended for first-time login to the web GUI, and
Infrastructure CLI admin and CLI config for creating other user accounts. This account should be disabled
users. after creating at least one web GUI user that has Admin
privileges—that is, a web GUI user that belongs to the Admin
or Super Users user group. See Disable and Enable the Web GUI
root User, on page 172.
Note The Prime Infrastructure web GUI root user is not
the same as the Linux CLI root user, nor is it the same
as the Prime Infrastructure CLI admin user.
.
Prime Infrastructure Cisco proprietary shell which provides Prime Infrastructure CLI Admin user—Created at installation
Admin CLI secure and restricted access to the system time and used for administration operations such as stopping
(as compared with the Linux shell). This and restarting the application and creating remote backup
Admin shell and CLI provide commands repositories. (A subset of these administration operations are
for advanced Prime Infrastructure available from the web GUI).
administration tasks. These commands are
To display a list of operations this user can perform, enter ? at
explained throughout this guide. To use
the prompt.
this CLI, you must have Prime
Infrastructure CLI admin user access. You Some tasks must be performed in config mode. To transition to
can access this shell from a remote config mode, use the procedure in Transition Between the Prime
computer using SSH. Infrastructure admin CLI and Prime Infrastructure config CLI,
on page 170.
Prime Infrastructure Cisco proprietary shell which is restricted
Config CLI and more secure than the Linux shell. This The admin CLI user can create other CLI users for a variety of
Config shell and CLI provide commands reasons, using the following command:
for Prime Infrastructure system (config) username username password role {admin|user}
configuration tasks. These commands are password
explained throughout this guide. To use
this CLI, you must have admin-level user
access (see the information in the User
Types column of this table). You can
access this shell from the Admin CLI
shell.
Linux CLI Linux shell which provides all Linux Linux CLI admin user—Created at installation time and used
commands. The Linux shell should only for Linux-level administration purposes.
be used by Cisco technical support
This admin user can get root-level privileges by following the
representatives. Regular system
procedure in Log In and Out as the Linux CLI root User, on page
administrators should not use the Linux
171. Tasks that require root-level permissions should only be
shell. You cannot reach this shell from a
performed by Cisco Support teams to debug product-related
remote computer using SSH; you can only
operational issues. For security purposes, the Linux CLI admin
reach it through the Prime Infrastructure
and root users should be disabled; see Disable and Enable the
admin shell and CLI.
Linux CLI Users in Prime Infrastructure, on page 172.
Transition Between the Prime Infrastructure admin CLI and Prime Infrastructure config CLI
To move from the Prime Infrastructure admin CLI to the Prime Infrastructure config CLI, enter config at the
admin prompt.
(admin)# config
(config)#
To move from the config CLI back to the admin CLI, enter exit or end at the config prompt:
(config)# exit
(admin)#
By default, the Linux CLI shell prompt is the same for the Linux CLI admin and root user. You can use the whoami
command to check the current user.
Step 2 To exit:
a) Log out as the Linux CLI root user.
exit
You are now logged in as the Prime Infrastructure CLI admin user.
What to do next
For security purposes, disable the Linux CLI root user. See Disable and Enable the Linux CLI Users in Prime
Infrastructure, on page 172.
Enable and Disable root Access for the Linux CLI and the Prime
Infrastructure Web GUI
As described in How to Transition Between the CLI User Interfaces in Prime Infrastructure, on page 169, after
installation, you should disable the Prime Infrastructure web GUI root user after creating at least one other
web GUI user that has Admin or Super Users privileges. See Disable and Enable the Web GUI root User, on
page 172.
The Linux CLI root user is disabled after installation time. If you need to re-enable it, follow the procedure
in Disable and Enable the Linux CLI Users in Prime Infrastructure, on page 172.
Step 1 Log in to Prime Infrastructure as the Prime Infrastructure CLI admin user. See Establish an SSH Session With the Prime
Infrastructure Server, on page 89.
Step 2 Disable the Linux CLI admin shell (which disables the Linux CLI admin and root users):
shell disable
Enter shell access password: passwd
shell access is disabled
Step 3 To re-enable the Linux CLI admin shell (you must run this command as the Prime Infrastructure CLI admin user):
shell
Shell access password is not set
Configure password for shell access
Password: passwd
Password again: passwd
Step 1 Log into the Prime Infrastructure web GUI as root, and create another web GUI user that has root privileges—that is, a
web GUI user that belongs to the Admin or Super Users user group. See Add Users and Manage User Accounts, on page
198. Once this is done, you can disable the web GUI root account.
Step 2 Disable the Prime Infrastructure web GUI root user account. (The web GUI admin account, which remains active, can
perform all required CLI functions.)
ncs webroot disable
User Groups—Web UI
Prime Infrastructure provides the default web GUI user groups listed in the following table. You can assign
users to multiple groups, except for users that belong to the Monitor Lite user group (because Monitor Lite
is meant for users who should have very limited permissions).
See View and Change the Tasks a Group Can Perform, on page 196 for information on the tasks that pertain
to each user group and the default settings.
Root All operations. The group permissions are not editable. The root web UI user is available
after installation and is described in User Interfaces and User Types, on page 167. A best
practice is to create other users with Admin or Super Users privileges, and then disable
the root web UI user as described in Disable and Enable the Web GUI root User, on
page 172.
Super Users All operations (similar to root). The group permissions are editable.
Admin Administer the system and server. Can also perform monitoring and configuration
operations. The group permissions are editable.
Config Managers Configure and monitor the network (no administration tasks). The permissions assigned
to this group are editable.
System Monitoring Monitor the network (no configuration tasks). The group permissions are editable.
Help Desk Admin Only has access to the help desk and user preferences related pages. Members of this
user group cannot be members of any other user group. This is a special group which
lacks access to the user interface.
Lobby User administration for Guest users only. Members of this user group cannot be members
Ambassador of any other user group.
User–Defined 1–4 these are blank groups and can be edited and customized as needed.
Monitor Lite View network topology and use tags. The group permissions are not editable. Members
of this user group cannot be members of any other user group.
User Assistant Local Net user administration only. Members of this user group cannot be members of
any other user group.
User Groups—NBI
Prime Infrastructure Cisco Prime Infrastructure provides the default NBI user groups listed in the following
table. The permissions in these groups are not editable.
See View and Change the Tasks a Group Can Perform, on page 196 for information on the tasks that pertain
to each user group and the default settings.
Note If you want to check the devices a user can access, see Assign Virtual Domains to Users, on page 217.
Step 1 Choose Administration > Users > Users, Roles & AAA and locate the user name.
Step 2 Locate the user name and check the Member of column to find out which user groups the user belongs to.
Step 3 Click a user group hyperlink. The Group Detail window lists the tasks that group members can and cannot perform.
• A checked check box means group members have permission to perform that task. If a checked box is greyed-out,
it means you cannot disable the task. For example, Prime Infrastructure does not allow you to remove the "View
tags" task for the Monitor Lite user group because it is an integral task for that user group.
• A blank check box means group members cannot perform that task. If a blank check box is greyed out, it means you
cannot enable the task for the user group.
The web GUI root and Monitor Lite groups, and the NBI groups, are not editable.
• Change permissions for all user group members. See View and Change the Tasks a Group Can Perform, on page
196.
• Add the user to a different user group. The predefined user groups are described in User Groups—Web UI, on page
173 and User Groups—NBI, on page 174. Those topics also describe any group restrictions; for example, if a user
belongs to the predefined Monitor Lite user group, the user cannot belong to any other groups.
• Remove the user from this group. See View and Change the Groups a User Belongs To, on page 176.
• Use a customized user group and add the user to that group. To find out which customized groups already exist, see
View and Change the Tasks a Group Can Perform, on page 196. To create a new customized group, see Create a
Customized User Group, on page 194.
Step 1 Choose > Administration > Users, Roles & AAA Users, then choose Users.
Step 2 In the User Name, column, locate and click the user name hyperlink to open the User Details window. All user groups
are listed under the General tab.
• A checked check box means the user belongs to that group. If a checked box is greyed-out, it means you cannot
remove the user from that group. For example, Prime Infrastructure will not allow you to remove the user named
root from the root user group.
• A blank check box means the user does not belong to that group. If a blank check box is greyed-out, it means you
cannot add the user to that group.
(To check the tasks that a group can perform, choose User Groups from the left sidebar menu and click a group name.)
Step 3 To change the groups the user belongs to, select and unselect the appropriate groups in the User Details window, then
click Save.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose User Groups.
The User Groups page lists all existing user groups and a short list of their members. For a description of these groups,
see Types of User Groups, on page 173.
Step 2 To view all members of a group, click a group hyperlink to open the Group Details window, then click the Members
tab.
Step 3 If you want to make changes to these groups, see:
• View and Change the Tasks a Group Can Perform, on page 196
• View and Change the Groups a User Belongs To, on page 176
APIC-EM Controller Apic Controller Read Access Allows user to read APIC-EM
controller details.
Apic Global PnP Read Access Allows user to read the Apic
Global PnP/Ztd settings.
Apic Global PnP Write Access Allows user to create or update the
Apic Global PnP/Ztd settings.
Active Sessions Force Logout Access Allows user to force logout other
user active sessions.
Data Migration
Alerts and Events Ack and Unack Alerts Allows user to acknowledge or
unacknowledge existing alarms.
Configuration Archive Configuration Archive Read-Only Task Allows user to view the archived
configurations and schedule
configuration archive collection
jobs.
Groups Management Add Group Members Allows user to add an entity, such
as a device or port, to groups.
Device Config Backup Job Edit Access Allows user to change the external
backup settings such as repository
and file encrytion password.
Mobility Services Mobility Service Management Allows user to edit properties and
parameters, view session and Trap
destinations,manage user and group
accoounts,and monitor status
information for mobility services
engine.
Network Configuration Add Device Access Allows user to add devices to Prime
Infrastructure.
Compliance Audit Profile Edit Access Allows user to create, modify and
delete compliance profiles view
and schedule export compliance
audit job or report view and
download violations summary.
WIPS Service
Network Monitoring Ack and Unack Security Index Issues Allows users to Acknowledge or
Unacknowledge Security Index
Violations.
Operations Center Tasks Administrative privileges under Manage Allows for administrative tasks
and Monitor Servers page such as Add/Delete/Edit/Activate
and deactivate of servers under
M&M page.
Allow report/dashlet use for users with Enable this option for users with
only NBI Read access NBI Read access so they can
generate reports and populate all
dashlets.
Manage and Monitor Servers Page Access Allows access to the Manage &
Monitor Servers Page.
Plug n Play Configuration PnP Deploy History Read Access Allows user to read provisioned
devices status.
PnP Deploy History Read-Write Access Allows user to read and delete
operations on provisioned devices.
PnP Preferences Read Access Allows user to view Plug and Play
preferences.
PnP Preferences Read-Write Access Allows user to edit Plug and Play
preferences.
PnP Profile Deploy Read Access Allows user to view Plug and Play
provisioning profiles.
PnP Profile Deploy Read-Write Access Allow user to create, modify, and
delete Plug and Play provisioning
profiles.
PnP Profile Read Access Allow user to view Plug and Play
profiles.
Product Usage Product Feedback Allows the user to access the Help
Us Improve page.
Network Summary Reports Read Only Allows user to view all Summary
reports.
Raw NetFlow Reports Read Only Allows user to view Raw NetFlow
reports.
Saved Reports List Read Only Allows user to view saved reports.
Software Image Add Software Image Management Servers Allows user to add software
Management imagemanagement servers.
Software Image Info Update Allows the user to edit and save
image properties such as minimum
RAM, minimum FLASH and
minimum boot ROM version.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose User Groups.
Step 2 Locate a User Defined group that has no members, then click its group name hyperlink.
Step 3 Customize the group permissions by checking and unchecking tasks in the Group Detail window. If a task is greyed-out,
it means you cannot adjust its setting. You cannot change the group name.
Step 4 Click Save to save your group settings.
Step 5 If you want to add a new User Defined group Click Add Groups. Enter the Group Name, select the required task
permissions and click Save.
Step 6 If you want to delete any User defined group select the group and click Delete Groups. A warning message appears to
check whether you want to delete the group. Click Ok .
Note You can not delete any predefined groups and groups associated to any user.
Step 7 Add members to your group by editing the relevant user accounts and adding the user to your new group. See Add and
Delete Users, on page 200 for information on adjusting user accounts.
Note You cannot add AAA user or remote user with wireless persona.
Note The following user groups do not support the wireless persona-based menu:
1. Root
2. Lobby Ambassador
3. Lobby Ambassador + NBI Credential
4. Lobby Ambassador + NBI Read
5. Lobby Ambassador + NBI Write
6. Lobby Ambassador + (NBI Credential + NBI Read)
7. Lobby Ambassador + (NBI Read + NBI Write)
8. Lobby Ambassador + (NBI Credential + NBI Write)
9. Lobby Ambassador + (NBI Credential + NBI Read +NBI Write)
10. Help Desk Admin
11. Help Desk Admin + NBI Credential
12. Help Desk Admin + NBI Read
13. Help Desk Admin + NBI Writer
14. Help Desk Admin + (NBI Credential + NBI Read)
15. Help Desk Admin + (NBI Read + NBI Write)
16. Help Desk Admin + (NBI Credential + NBI Write)
17. Help Desk Admin + (NBI Credential + NBI Read +NBI Write)
18. mDNS Policy Admin
Note If you want to change device access, see Assign Virtual Domains to Users, on page 217.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose User Groups.
The User Groups page lists all existing user groups.
Step 2 Click a user group hyperlink. The Group Detail window lists the group permissions.
• A checked task means group members have permission to perform that task. If a checked box is greyed-out, it means
you cannot disable the task.
• A blank check box means group members cannot perform that task. If a blank check box is greyed out, it means you
cannot enable the task for the user group.
The web GUI root and Monitor Lite groups, and the NBI groups, are not editable.
Step 3 If you want to change the group permissions—which will affect all group members—check and uncheck tasks, then click
Save.
Note Selecting and deselecting the tasks will affect only that group and not all groups.
Note From Prime Infrastructure Release 3.2, Role based based TACACS+ authentication is enabled by default, so
it is sufficient to add user roles and virtual domains alone. Tasks will be retrieved from Prime Infrastructure
based on the roles given in the ISE/ACS profile.
If you want to use the task based TACACS authentication, you must set the value of the tacsacsServerTaskPref
property in the file /opt/CSCOlumos/conf/usermgmt.properties to true and click Save in Administration >
Users > Users, Roles & AAA > AAA Mode Settings Page . When you are copying the custom attributes
(role, task and virtual domain) of users belonging to multiple user groups from the Administration > Users
> Users, Roles & AAA > User Groups page in Prime Infrastructure, and pasting them in ACS, make sure
that the custom attributes remain unique in order to avoid duplicate attributes. Also ensure that you paste the
currently supported tasks in the ACS and add the Home Menu Access task. It is mandatory.
Export the Prime Infrastructure User Group and Role Attributes for RADIUS and TACACS+
If you are using RADIUS or TACACS+, you must copy all Prime Infrastructure user group and role information
into your Cisco Access Control Server (ACS) or Cisco Identity Services Engine (ISE) server. You can do this
using the Task List dialog box provided in the Prime Infrastructure web GUI. If you do not export the data
into your Cisco ACS or Cisco ISE server, Prime Infrastructure will not allow users to perform their assigned
tasks.
The following information must be exported:
• TACACS+—Requires virtual domain and role information (tasks are automatically added).
• RADIUS—Requires virtual domain and role information (tasks are automatically added).
Information in the Task List dialog is preformatted for use with the Cisco ACS server.
Note When you add tasks to the external server, be sure to add the Home Menu Access task. It is mandatory for
all users.
Step 2 Paste the information into your Cisco ACS or Cisco ISE server. These steps show how to add the information to an
existing user group in Cisco ACS. If you have not yet added this information to Cisco ACS or Cisco ISE, see:
• Use Cisco ACS With RADIUS or TACACS+ for External Authentication
• Use Cisco ISE With RADIUS or TACACS+ for External Authentication , on page 222
Prime Infrastructure will not permit certain combinations of user group membership. For example, a user
cannot be a member of the “Root” and “Lobby Ambassador” user groups at the same time (for details, see
the table in “Control the Tasks Users Can Perform (User Groups) ”, in Related Topics). If you are using
RADIUS to authenticate Prime Infrastructure users, make sure that you do not insert invalid user-group
membership combinations into the RADIUS user attribute/value pairs.
Related Topics
Control the Tasks Web Interface Users Can Perform (User Groups), on page 173
View and Change the Tasks a Group Can Perform, on page 196
Create Virtual Domains to Control User Access to Devices, on page 211
You should not use the web GUI root account for normal operations. For security purposes, create a new web
GUI user with Administrator privileges (and access to all devices), and then disable the web GUI root account.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose Users.
Step 2 Click Add User.
Step 3 Enter the username in the Username text box.
Step 4 Enter a password. The new password must satisfy the conditions specified in the password policy. Click the ? icon to
view the password policy.
(Optional) Click the Generate New Password button to set a secured system-generated password. On clicking this button,
a new password will be displayed in the adjacent text box. The same is also displayed in the New Password and Confirm
Password text boxes. Click the eye icon in the text box to view or hide the password. You can also copy the password
to clipboard by clicking the Copy button.
Click the Reset button to clear the values in the text box.
Step 5 (Optional) Enter the First Name, Last Name, and Description for the user.
Step 6 Enter the email address in the Email Address text box.
Step 7 In the General tab under Groups Assigned to This User, click Admin.
Step 8 Click the Virtual Domains tab to specify which devices the user can access. You should have at least one Admin web
GUI user that has access to all devices (ROOT-DOMAIN). For more information on virtual domains, see Create Virtual
Domains to Control User Access to Devices, on page 211.
Note If you select a parent virtual domain the child (subordinate) virtual domains under it will also get selected.
What to do next
If you have not done so already, for security purposes, disable the web GUI root account as described in
Disable and Enable the Web GUI root User, on page 172.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose Users.
Step 2 Click Add User.
Step 3 Configure the user account.
a) Enter a username and password.
b) Enter the first name, last name, and a description for the user.
c) Control the actions the user can perform by selecting one or more user groups. For descriptions of user groups, see
View User Groups and Their Members, on page 176.
d) Control the devices a user can access by clicking the Virtual Domains tab and assigning domains to the user. (see
Create Virtual Domains to Control User Access to Devices, on page 211).
Step 4 Click Save.
Step 5 To delete user accounts, select a users, Click Delete User.
When you are deleting a stale local user, a popup window opens. Do one of the following:
• Click Delete/Pause Job(s), if you want to delete or pause the jobs associated with the deleted user. The jobs will
be displayed in the same page. Select the job(s), click Pause Job(s) or Delete Job(s) and click Proceed.
• Click Skip in the popup, if you want to delete the user without deleting or pausing the associated job(s).
• Click Cancel, if you do not want to delete the user.
Step 1 Choose Administration > Users > Users, Roles & AAA, then click Users.
Step 2 Select the user whose access you want to disable or enable.
Step 3 Click Lock User(s) (or Unlock User(s)).
Step 1 Choose Administration > Users > Users, Roles & AAA, then click Users.
Step 2 Click the username hyperlink.
Step 3 Enter the new password in the password fields, then click Save.
Both of these options impose restrictions on the latitude lobby ambassadors have to manage these temporary
guest accounts. For details on using lobby ambassador accounts, see "Using Lobby Ambassadors to Manage
Guest User Accounts" in Related Topics.
• Select Automatically remove expired guest accounts to have guest accounts whose lifetimes have ended moved
to the Expired state. Guest accounts in the Expired state are deleted from Prime Infrastructure automatically.
• Select Search and List only guest accounts created by this lobby ambassador to restrict Lobby Ambassadors to
modifying only the guest accounts that they have created. By default, any Lobby Ambassador can modify or delete
any guest account, irrespective of who created that account.
Related Topics
Use Lobby Ambassadors to Manage Guest User Accounts, on page 202
Control the Tasks Web Interface Users Can Perform (User Groups), on page 173
Create Virtual Domains to Control User Access to Devices, on page 211
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Edit Guest User Credentials, on page 206
2. Schedule guest user accounts—While logged in as a lobby ambassador, schedule automatic creation of
guest user accounts.
3. Print or email guest user details—While logged in as a Lobby Ambassador, print or email the guest user
account details to the host or person who will be welcoming the guests.
Prime Infrastructure administrators with full access can manage lobby ambassadors and their work using this
workflow:
1. Create lobby ambassador accounts—While logged in as a Prime Infrastructure administrator, create lobby
ambassador accounts as needed.
2. View lobby ambassador activities—While logged in as a Prime Infrastructure administrator, supervise
the lobby ambassador’s activities using the log.
Create Lobby Ambassador Accounts, on page 203
Create Guest User Accounts as a Lobby Ambassador, on page 204
Schedule Guest User Accounts, on page 204
Print or Email Guest User Details, on page 204
View Lobby Ambassador Activities, on page 205
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Edit Guest User Credentials, on page 206
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Edit Guest User Credentials, on page 206
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Edit Guest User Credentials, on page 206
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Edit Guest User Credentials, on page 206
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Edit Guest User Credentials, on page 206
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Edit Guest User Credentials, on page 206
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Edit Guest User Credentials, on page 206
Related Topics
Manage Guest User Accounts: Workflows, on page 202
Save Guest Accounts on a Device, on page 206
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose Active Sessions. Prime Infrastructure lists all
users that are currently logged in to the Prime Infrastructure server, including their client machine IP address. If the user
performed any actions on managed devices (for example, the user added new devices to Prime Infrastructure), the device
IP addresses are listed in the Device IP Address column.
Step 2 To view a historical list of all actions performed by this user, click the Audit Trail icon that corresponds to the user name.
Step 3 If you do not want any particular user to be logged in, select the user and click Force Log Out in the upper rigt corner.
Note Force Log Out is not applicable for SSO users.
Step 1 Choose Administration > Users > Users, Roles & AAA.
Step 2 To view the tasks performed by a specific user:
a. Choose Users.
b. Locate the user name, then click the Audit Trail icon corresponding to that user.
Step 3 To view a historical list of the tasks performed by all members of a user group:
a. Choose User Groups.
b. Locate the user group name, then click the Audit Trail icon corresponding to that group.
filter the devices to be deployed based on the device IP and device name attributes by selecting either quick
filter or advanced filter options. You can also view the following information by the clicking the i icon.
• For a rollback job, it displays the running configuration and start-up configuration details.
• For an overwrite job, it explains the operation to be performed.
The Discovery and Config Archive options are removed from the Job Approval page from Cisco Prime
Infrastructure 3.2. If you have chosen the Discovery and Config Archive options in the previous versions of
Cisco Prime Infrastructure, the options will be available in higher versions of Cisco Prime Infrastructure, until
you deselect them.
Note Job approval is applicable only for scheduled jobs. When immediate jobs are triggered, the job will be expired
on approval.
To enable job approval and configure the jobs that require approval before running:
Step 1 Choose Administration > Settings > System Settings, then choose General > Job Approval.
Step 2 Check the Enable Job Approval check box.
Step 3 Find the jobs you want to configure for approval, and move them from the left field to the right field.
Step 4 Check the Enable Mail for Job Approval check box. By default this checkbox is unchecked.
Step 5 Enter the email addresses of the job approvers. By default the email address configured in the Mail Server Configuration
settings or the pre-configured email addresses will appear in the Approve Email ID textbox.
Step 6 Click Save.
Step 1 Select Administration > Settings > System Settings, then choose Mail and Notification > Job Notification Mail.
Step 2 Check the Enable Job Notification Mail check box to enable notifications.
Step 3 Enter the email addresses in the To text box. By default, the email address configured in the Mail Server Configuration
settings or the pre-configured email addresses appear in the To text box. You can configure an email server by performing
the steps explained in Configure Email Server Settings , on page 391
Step 4 Enter the subject of the job notification mail in the Subject text box. The subject is automatically appended by the job
name.
Step 5 Select the Job Status. You can select either Success, Partial Success, or Failure status options or both the options and
provide the recipient address.
Note Select the desired job type and click the checkbox under Job Success/Job Partial and/or Job Failure. The job
notification mails are triggered for the selected job status option(s).
Step 6 Select the Compliance Audit Job and Compliance Fix Job check boxes. The job notification mails are triggered for
the selected jobs.
Step 7 Click Save. The job notification mail is triggered only for the job status that you select and is sent only after the job
completion. You will not receive a job notification mail if the file size exceeds the size specified in the configured mail
server.
Note You must select the Change password on the first login check box to prompt the new users to change the
default password on their initial login to Prime Infrastructure. De-selecting this check box will launch the
Home Dashboard page on logging in.
By default, client sessions are disabled and users are automatically logged out after 15 minutes of inactivity.
This is a global setting that applies to all users. For security purposes, you should not disable this mechanism,
but you can adjust the timeout value using the following procedure. To disable/change the timeout for an idle
user, see Disable Idle User Timeout, on page 210
Step 1 Choose Administration > Settings > System Settings, then choose General > Server.
Step 2 In the Global Idle Timeout area, make sure the Logout all idle users check box is selected (this means the mechanism
is enabled).
Step 3 Configure the timeout by choosing a value from the Logout all idle users after drop-down list.
Step 4 Click Save. You will need to log out and log back in for this change to take effect.
Note The Global Idle Timeout setting overrides the User Idle Timeout setting. To configure Global Idle Timeout
settings, see CiscoPrime Infrastructure Administrator Guide.
Irrespective of the customer disabling the "Logout all idle users" in system settings and / Or disabling the
"Logout idle user" in the Root user my preference setting, the session will ultimately be timed out once the
web-server's session time out is reached. This is essentially to maintain the security posture. For more guidelines
on increasing/decreasing the session time out, see https://owasp.org/www-community/Session_Timeout
Note Session will be timed out only if it is inactive whereas active user sessions are not timed
Step 1 Choose Administration > Settings > System Settings, then choose General > Server.
Step 2 In the Global Idle Timeout area, uncheck the Logout all idle users check box and click Save.
Step 3 Click at the top right of web GUI window and choose My Preferences.
Step 4 In the User Idle Timeout area, uncheck the Logout idle user check box and click Save.
If you need to change the idle timeout value, then select Logout idle user check box and from the Logout idle user after
drop-down list, choose one of the idle timeout limits. (But this cannot exceed the value set in the Global Idle Timeout
settings.)
Step 5 Click Save. You will need to log out and log back in for this change to take effect.
Step 1 Choose Administration > Settings > System Settings > General > Server.
Step 2 To set the maximum sessions per user, enter the value in the Max Sessions text box. You can enter any value from 1 to
50 and the default value is 5.
Step 3 When you are finished, click Save.
Step 4 Restart the Cisco Prime Infrastructure server to apply the changes.
Note The session limit is applicable only for Local, RADIUS, and TACACS+ servers. The session limit is not
applicable for HA and SSO modes.
Because network elements are managed hierarchically, user views of devices—as well as some associated
features and components—are affected by the user's virtual domain. The following topics describe the effects
of virtual domains on these features.
• Reports and Virtual Domains, on page 212
• Search and Virtual Domains, on page 212
• Alarms and Virtual Domains, on page 212
• Maps and Virtual Domains, on page 212
• Configuration Templates and Virtual Domains, on page 212
• Config Groups and Virtual Domains, on page 213
• Email Notifications and Virtual Domains, on page 213
Note For alarm email notifications, only the ROOT-DOMAIN virtual domain can enable Location Notifications,
Location Servers, and Prime Infrastructure email notifications.
Note If you create a child domain and then apply a configuration template to both network elements in the virtual
domain, Prime Infrastructure might incorrectly reflect the number of partitions to which the template was
applied.
(etc.)
What to do next
Add devices to the virtual domain as described in Add Network Devices to Virtual Domains, on page 215.
Step 4 (Optional) Enter the new domain's time zone, email address and description.
Step 5 Click Submit and confirm the creation of the new child domain. To revert back to the hierarchical view, click the view
toggle button at the top of the navigation pane.
What to do next
Add devices to the virtual domain as described in Add Network Devices to Virtual Domains, on page 215.
What to do next
Add devices to the virtual domains as explained in Add Network Devices to Virtual Domains, on page 215.
Step 2 From the Virtual Domains sidebar menu, click the virtual domain to which you want to add network devices.
Step 3 Click Network Devices tab. You can either add network devices by group or add a network device to a specific location
group.
Step 4 To add devices from groups, in the Selected Network Devices by Group section, click Add, and the Add Group pop-up
appears, which lists the applicable location and user-defined groups. Select the group to which you need to add the device
and click Select to add the groups to the Selected Network Devices by Group table. These groups will not have create,
read, update and delete privileges.
Step 5 In the Selected Network Devices section, click Add and the Select Network Devices pop-up appears. Here, a Filter By
drop-down list is available to filter the network devices based on functionality.
Step 6 From the Filter By drop-down list, choose a network device. Select the required devices from the Available Network
Devices table and click Select to add the devices to the Selected Network Devices table. These devices will not have
create, read, update and delete privileges.
Step 7 Click Submit to view the summary of the virtual domain contents.
Step 8 Click Save to confirm your changes.
What to do next
Give users access to the virtual domain as described in Assign Virtual Domains to Users, on page 217.
Step 5 The Add Group window lists only those groups that are applicable to you, which can be added to the virtual domains.
Select the required group check box under All Locations, and click Select to add the devices to the Selected Groups table.
Note If the selected group is a parent group, all of its child groups gets automatically added to the virtual domain.
Note When using external AAA, be sure to add the custom attributes for virtual domains to the appropriate user or
group configuration on the external AAA server. See Use Prime Infrastructure Virtual Domains with RADIUS
and TACACS+, on page 218.
Step 1 Choose Administration > Users > Users, Roles & AAA > Users.
Step 2 Select the user to whom you want to grant device access.
Step 3 Click the Virtual Domains tab.
Step 4 Use the Add and Remove buttons to make your assignment changes, then click Save.
• It is not the only domain a user can access. In other words, if a Prime Infrastructure user has access to
only that domain, you cannot delete it.
• No users are logged into the domain.
Export the Prime Infrastructure Virtual Domain Attributes for RADIUS and TACACS+
If you are using RADIUS or TACACS+, you must copy all Prime Infrastructure virtual domain information
into your Cisco ACS or Cisco ISE server. You can do this using the Prime Infrastructure Virtual Domains
Custom Attributes dialog box provided in the web GUI. If you do not export the data into your Cisco ACS
or Cisco ISE server, Prime Infrastructure will not allow users to log in.
The following information must be exported, depending on the protocol you are using:
• TACACS+—Requires virtual domain, role, and task information.
• RADIUS—Requires virtual domain and role information (tasks are automatically added).
When you create a child domain for an existing virtual domain, the sequence numbers for the
RADIUS/TACACS+ custom attributes are also updated in the parent virtual domain. These sequence numbers
are for representation only and do not impact AAA integration.
Information in the Virtual Domains Custom Attributes dialog is preformatted for use with Cisco ACS server.
Note When you add tasks to the external server, be sure to add the Home Menu Access task. It is mandatory for
all users.
Step 2 Paste the information into your Cisco ACS or Cisco ISE server. If you have not yet added this information to Cisco ACS
or Cisco ISE, see:
• Use Cisco ACS With RADIUS or TACACS+ for External Authentication
• Use Cisco ISE With RADIUS or TACACS+ for External Authentication
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose RADIUS Servers.
Step 2 Select the type of server you want to add.
• For RADIUS, choose RADIUS Servers > click Add RADIUS Server.
• For TACACS+, choose TACACS+ Servers > click Add TACACS+ Server.
Note You can use Move Up and Move Down arrow to reorder the available IP address.
Step 3 Enter the required information—IP address, DNS Name, and so forth. For Prime Infrastructure to communicate with the
external authentication server, the shared secret you enter on this page must match the shared secret configured on the
RADIUS or TACACS+ server. You can use alphabets, numbers, and special characters except ‘ (single quote) and “
(double quote) while entering the shared secret key for a third-party TACACS+ or RADIUS server.
Step 4 Select the authentication type.
• PAP—Password-based authentication is the protocol where two entities share a password in advance and use the
password as the basis of authentication.
• CHAP—Challenge-Handshake Authentication Protocol requires that both the client and server know the plain text
of the secret, although it is never sent over the network. CHAP provides greater security than Password Authentication
Protocol (PAP).
Step 5 If you have enabled the High Availability feature and configured a virtual IP address for the Local Interface IP, choose
either the virtual IP address or the physical IP address of the primary server. See Cisco Prime Infrastructure Quick Start
Guide.
Note The IP address configured in the external authentication server must match the Local Interface IP.
Step 6 Click Test to check the connectivity of the AAA server. The connectivity test will pass only if the port, authentication
type and shared key you have entered matches with the TACACS or RADIUS server.
Note Only server reachability is tested for RADIUS server.
Step 4 Check the Enable Fallback to Local check box to enable the use of the local database when the external AAA server is
down.
Step 5 If you want to revert to local authentication if the external RADIUS or TACACS+ server goes down, perform the following
steps:
a) Select Enable Fallback to Local. If you disable this option Prime Infrastructure will read only the first server and
the users added in the first server will be authenticated.
b) Specify the conditions under which the fallback to local Prime Infrastructure user account authentication occurs:
• ONLY on no server response: Only when the external server is unreachable or has network problems. If you
select this option, you will be able to login as AAA user only.
• on authentication failure or no server response : Either w hen the external server is unreachable or has network
problems or the external AAA server cannot authenticate the user. If you select this option, you will be able to
login as both local user and AAA user.
Note Cisco Prime Infrastructure supports only Cisco ACS and ISE servers in the AAA mode.
Tasks to be completed to use Cisco ISE for external authentication For information, see:
Make sure you are using a supported version of Cisco ISE Supported Versions of Cisco ISE
in Prime Infrastructure, on page 223
Add Prime Infrastructure as an AAA client in Cisco ISE Add Prime Infrastructure as a
Client in Cisco ISE, on page 224
Create a user group in Cisco ISE Create a User Group in Cisco ISE,
on page 224
Create a user in Cisco ISE and add the user to the user group that is Create a User and Add the User to
created in Cisco ISE a User Group in Cisco ISE, on page
224
(If using RADIUS) Create an authorization profile for network access Create an Authorization Profile for
in Cisco ISE, and add the RADIUS custom attributes with user roles RADIUS in Cisco ISE, on page 224
and virtual domains created in Prime Infrastructure
Note For RADIUS, you do not need to add the attributes for user
tasks. They are automatically added based on the user roles.
(If using TACACS+) Create an authorization profile for network access Create an Authorization Profile for
in Cisco ISE, and add the TACACS+ custom attributes with user roles TACACS+ in Cisco ISE, on page
and virtual domains created in Prime Infrastructure 225
Note For TACACS+, you need not add the attributes for user tasks.
They are automatically added based on the user roles.
Create an authorization policy in Cisco ISE and associate the policy Configure an Authorization Policy
with the user groups and authorization profile created in Cisco ISE for RADIUS in Cisco ISE, on page
227Configure an Authorization
Policy for TACACS in Cisco ISE,
on page 227
Create an authentication policy to define the protocols that Cisco ISE Create an Authentication Policy in
must use to communicate with Prime Infrastructure, and the identity Cisco ISE, on page 228
sources that it uses for authenticating users to Prime Infrastructure
Add Cisco ISE as a RADIUS or TACACS+ server in Prime Add a RADIUS or TACACS+
Infrastructure Server to Prime Infrastructure
Configure the RADIUS or TACACS+ mode on the Prime Infrastructure Configure RADIUS or TACACS+
server Mode on the Prime Infrastructure
Server, on page 221
Create a User and Add the User to a User Group in Cisco ISE
Note For RADIUS, you can add the user role attributes without adding the task attributes. The tasks are automatically
added with the user roles.
For more information about Cisco ISE authorization profiles, see the information on managing authorization
policies and profiles in the Cisco Identity Services Engine Administrator Guide.
To create an authorization profile for RADIUS in Cisco ISE:
Note If you do add user tasks, be sure to add the Home Menu Access task. It is mandatory.
Note For Operations Center, you must export NBI Read and NBI Write attributes.
Note • For TACACS+, you need not add the attributes for user tasks. They are automatically added based on
the user roles.
• In Release 8.5.135.0, the creation of Authorization server is deprecated. To create an Authorization
server, you must create an Authentication server and duplicate it as an Authorization server. Due to this
change in functionality, an alarm is generated in Cisco Prime Infrastructure 3.2 as follows:
1.Successfully created Authentication server. 2.Failed to create
authorization server:SNMP operation to Device failed: Set Operation
not allowed for TACACS authorization server.1.Successfully created
Accounting server.
The workaround on Cisco Prime Infrastructure is to uncheck the Authorization server on the template.
For more information, see CSCvm01415.
For more information about Cisco ISE authorization profiles, see the information on managing authorization
policies and profiles in the Cisco Identity Services Engine Administrator Guide.
To create an authorization profile for TACACS+ in Cisco ISE:
Note For Operations Center, you must export NBI Read and NBI Write attributes.
For more information about authorization policies, see the “Manage Authorization Policies and Profiles”
chapter in the Cisco Identity Services Engine Administrator Guide.
To create an authorization policy in Cisco ISE:
you have defined a rule where all users belonging to the Prime Infrastructure System Monitoring identity group receive
an appropriate authorization policy with system monitoring custom attributes defined.
For more information about authentication policies, see the "Manage Authentication Policies" chapter in the
Cisco Identity Services Engine Administrator Guide.
To create an authentication policy in Cisco ISE:
Step 1 Log in to Cisco ISE as the Super Admin or System Admin user.
Step 2 Choose Policy > Authentication.
Step 3 Choose the Policy Type as Simple or Rule-Based to create the required authentication policy.
Step 4 Enter the required details based on the policy type selected.
Step 5 Click Save.
Tasks to be completed to use Cisco ACS for external authentication For information, see:
Make sure you are using a supported version of Cisco ACS Supported Versions of Cisco ACS
in Prime Infrastructure
Add Prime Infrastructure as an AAA client in Cisco ACS Add Prime Infrastructure as a
Client in Cisco ACS
Create a user group in Cisco ACS Create a User Group in Cisco ACS
Create a user in Cisco ACS and add the user to the Cisco ACS user Create a User and Add the User to
group a User Group in Cisco ACS
(If using RADIUS) Create an authorization profile for network access Create an Authorization Profile for
in Cisco ACS, and add the RADIUS custom attributes for user roles and RADIUS in Cisco ACS
virtual domains created in Prime Infrastructure.
Note For RADIUS, you do not need to add the attributes for user
tasks. They are automatically added based on the user roles.
(If using TACACS+) Create an authorization profile for device Create an Authorization Profile for
administration in Cisco ACS, and add the TACACS+ custom attributes TACACS+ in Cisco ACS
with user roles and virtual domains created in Prime Infrastructure.
Note For TACACS+, you need not add the attributes for user tasks.
They are automatically added based on the user roles.
Create an access service in Cisco ACS and define a policy structure for Create an Access Service for Prime
the access service. Infrastructure in Cisco ACS
Create an authorization policy rule in Cisco ACS, and map the Create an Authorization Policy
authorization or shell profile based on the access type (network access Rule in Cisco ACS
or device administration).
Configure a service selection policy in Cisco ACS and assign an access Configure a Service Selection
service to an incoming request. Policy in Cisco ACS
Add Cisco ACS as a RADIUS or TACACS+ server in Prime Add a RADIUS or TACACS+
Infrastructure. Server to Prime Infrastructure
Configure the RADIUS or TACACS+ mode on the Prime Infrastructure Configure RADIUS or TACACS+
server. Mode on the Prime Infrastructure
Server
Create a User and Add the User to a User Group in Cisco ACS
Note For RADIUS, you can add the user role attributes without adding the task attributes. The tasks are automatically
added with the user roles.
For more information about Cisco ACS authorization profiles and policies, see chapters on managing policy
elements and access policies in the User Guide for Cisco Secure Access Control System.
To create an authorization profile for RADIUS in Cisco ACS:
Note For TACACS+, you need not add the attributes for user tasks. They are automatically added based on the user
roles.
For more information about Cisco ACS authorization profiles and policies, see chapters on managing policy
elements and access policies in the User Guide for Cisco Secure Access Control System.
To create an authorization profile for TACACS+ in Cisco ACS:
Note You must create access services before you define service selection rules, although you do not need to define
the policies in the services.
Step 6 If you are creating an authorization policy rule for network access (RADIUS), choose the required authorization profile(s)
to map to the authorization policy rule.
Alternatively, if you are creating an authorization policy rule for device administration (TACACS+), choose the required
shell profile(s) to map to the authorization policy rule.
Note If you are using multiple authorization profiles or shell profiles, make sure you order them in priority.
Step 4 Enter the name of the rule and then choose the rule status.
Step 5 Choose either RADIUS or TACACS+ as the protocol for the service selection policy.
Step 6 Configure the required compound condition, and then choose an access service to apply to an incoming request.
Step 7 Click OK, and then click Save Changes.
Prime Infrastructure does not support localization on the SSO sign-in page.
Step 1 Choose Administration > Users > Users, Roles & AAA, then choose SSO Servers.
Step 2 Click Add SSO Servers.
Step 3 Enter the SSO information.
The maximum number of server retries for an SSO server authentication request is 3.
Note If you are using this procedure to configure SSO but are using local authentication, choose Local in Step 2.
Step 1 Choose Administration > Users > Users, Roles & AAA > SSO Server Settings.
Step 2 Select the SSO Server AAA Mode you want to use. The options are: Local, RADIUS, or TACACS+.
Step 3 Click Save.
UserRolesandAccessPermissionsforConfiguringAlarmNotificationSettings
This table describes the user roles and access permissions for configuring notification destination and creating
customized notification policies.
Note Ensure that you enable the following Task Permissions for any user roles to view, create, and edit notification
destination and notification policy:
• Notification Policies Read-Write Access under Alerts and Events
• Virtual Domains List (under Reports)
For more information, see View and Change the Tasks a User Can Perform, on page 175.
Root user with root domain View, create, delete and edit notification destination
and notification policy.
Root user with non-root domain View, create, edit and delete notification destination
and notification policy created under their respective
virtual domain.
Admin user with root domain View, create, delete and edit notification destination
and notification policy.
Super user with root domain View, create, delete and edit notification destination
and alarm notification policy.
System monitoring user with root domain View notification destination and notification policy.
Config manager with root domain View notification destination and notification policy.
Admin user with non-root domain View, create, edit and delete notification destination
and notification policy created under their respective
virtual domain.
Super user with non-root domain View, create, edit and delete notification destination
and notification policy created under their respective
virtual domain.
System monitoring user with non-root domain View notification destination and notification policy
created under their respective virtual domain.
Config manager with non-root domain View notification destination and notification policy
created under their respective virtual domain.
Step 1 Choose Administration > Settings > System Settings > Mail and Notification > Notification Destination.
Step 2 Click the Add icon to create a new notification destination.
Step 3 To configure Email Destination, do the following:
a) From the Select Contact Type drop-down list, choose Email.
b) Enter the Contact Name in the text box.
c) Enter a valid email ID in the Email To text box.
The email is sent to the email ID entered in the Email To field.
d) Enter the Contact Full Name.
e) Choose the virtual domain from the Virtual Domain drop-down list.
f) Enter the Telephone Number, Mobile Number, and Postal Address.
g) Click Save.
Step 4 To configure a Northbound trap receiver using IP Address, do the following:
a) From the Select Contact Type, choose Northbound Trap Receiver.
b) Select the IP Address radio button and enter the IP Address and Server Name.
c) Choose the required Receiver Type and Notification Type.
d) Enter the Port Number, and choose the SNMP Version.
e) If you choose the SNMP Version as v2c, enter the Community settings as required.
f) If you choose the SNMP Version as v3, enter the Username, Mode, Auth.Type, Auth.Password, Confirm
Auth.Password, Privacy Type, Privacy Password and Confirm Privacy Password.
g) Click Save.
Step 5 To configure a Northbound trap receiver using DNS, do the following:
a) From the Select Contact Type, choose Northbound Trap Receiver.
b) Select the DNS radio button and enter the DNS Name.
c) Choose the required Receiver Type and Notification Type.
d) Enter the Port Number, and choose the SNMP Version.
e) If you choose the SNMP Version as v2c, enter the Community settings as required.
f) If you choose the SNMP Version as v3, enter the Username, Mode, Auth.Type, Auth.Password, Confirm
Auth.Password, Privacy Type, Privacy Password and Confirm Privacy Password.
g) Click Save.
Note • If you choose the Receiver Type as Guest Access, Prime Infrastructure will not forward the alarms to
the Northbound trap receiver using the notification policy. The Guest Access receiver receives only
guest-client related events. The notification policy uses only Northbound trap receivers. Make sure that
you use the same Engine ID and same auth and priv passwords when configuring the external SNMPv3
trap receiver.
• While updating the Notification Destination Trap Receiver, the operational status shows the previous
Trap Receiver status until the status is updated by the next polling.
• You can also navigate to Notification Policies page by choosing Monitor > Monitoring Tools > Alarm
Notification Policies.
• If recipient email id is configured in multiple Notification policies, alarm will be forwarded only once
to the email id, when condition matches.
• You will not be allowed to delete Notification Destinations which are associated with Notification Policies.
Step 1 Choose Administration > Settings > System Settings > Alarms and Events> Alarm Notification Policies. To add a
new alarm notification policy, do the following:
a) Click the Add icon and choose the required virtual domain in the Select a Virtual Domain pop-up window.
Cisco Prime Infrastructure matches the alarms that are received from devices from a virtual domain against the
notification policies for the same virtual domain. The system category alarms generated by Prime Infrastructure can
be matched against all the alarm notification policies.
Note For a non-root domain, the alarms from a device will be forwarded only if the device or device group(s)
containing the device was added or selected under Network Devices tab in virtual domain page.
b) Click OK.
The Notification Policies wizard appears.
c) Choose the severity, category, and event condition for which the notifications must be triggered. By default all the
severity types, categories, and conditions are selected.
d) Click Next and choose the device groups for which you want the alarm notifications to be triggered.
The alarm notifications are triggered only for the device groups that you select.
For instance, if you select the User Defined device group type, then the alarm notification is triggered for all the
configured user defined device groups. Similarly, if you select both the User Defined and Locations device group
types, then the alarm notifications are triggered for all the configured user defined and location device groups.
Select the desired device group type to abstain from receiving insignificant alarm notifications from other device
groups.
If you choose only system category alarms in the previous step, a message "Device Groups are not applicable when
only 'System' based alarms are selected" is displayed under the Device Group tab. However, if you choose a non-system
category alarm, you must select at least one device group.
e) Click Next and choose the required destination in the Notification Destination page.
If you choose root-domain in Step 1-a, all the Email and Northbound trap receiver destinations created in Prime
Infrastructure will be listed in the Notification Destination page. If you choose, non-root domain, the Email destinations
created under that particular domain will be listed in the Notification Destination page. See Configure Alarms
Notification Destination, on page 239
f) Alternately, choose the Email or Northbound Trap Receiver option from the Add icon drop-down list and complete
the required fields.
g) Choose the notification destination and click Change Duration.
h) Choose the From and To timings in the Set Duration pop-up window and click OK.
The alarms generated in the specified duration alone are sent to the notification destination.
i) Click Next and enter the Name and Description for the alarm notification policy in the Summary page.
j) Click Save.
Note "Interface" is a reserved word and hence don't use it as the name for Alarm Notification Policy.
Note Notifications will not be sent to email recipient for North Bound trap receiver, if you change the severity of
an alarm type from Monitor > Monitoring Tools > Alarm Policies.
Related Topics
Configure Alarms Notification Destination, on page 239
Convert Old Email and Trap Notification Data to New Alarm Notification Policy
The email and trap notification data created in previous Prime Infrastructure releases is converted in to new
alarm notification policies while upgrading or migrating Prime Infrastructure from previous release to the
latest version.
The migrated alarm notification policies can be viewed in the Alarms and Events Notification Policies pages.
The following Alarm categories are supported in Prime Infrastructure Release 3.7:
• Change Audit
• Generic
• System
• Application Performance
• Compute Servers
• Nexus VPC switch
• Switches and Routers
• AP
• Adhoc Rogue
• Clients
• Context Aware Notifications
• Controller
• Coverage Hole
• Mesh Links
• Mobility Service
• Performance
• RRM
• Rogue AP
• SE Detected Interferers
• Security
• Third Party AP
• Third Party Controller
The following Alarm categories are not supported in Prime Infrastructure Release 3.6:
• Autonomous AP
• Cisco UCS Series
• Routers
• Switches and Hubs
• Wireless Controller
To edit the migrated alarm notification polices, see Customize Alarm Notification Policies.
To enable, disable, or adjust these settings, choose Administration > Settings > System Settings, then
Alarms and Events > Alarms and Events. Make your changes in the Alarm Email Options area.
Step 1 Choose Administration > Settings > System Settings > Alarms and Events > Alarms and Events.
Step 2 Modify the Alarm and Event Cleanup Options:
• Delete active and cleared alarms after—Enter the number of days after which active and cleared alarms are deleted.
• Delete cleared security alarms after—Enter the number of days after which Security, Rogue AP, and Adhoc Rogue
alarms are deleted.
• Delete cleared non-security alarms after—Enter the number of days after which non-security alarms are deleted.
Non-security alarms include all alarms that do not fall under the Security, Rogue AP, or Adhoc Rogue categories.
• Delete all events after—Enter the number of days after which all the events are deleted.
• Max Number of Events to Keep—Enter the number of events that needs to be maintained in the database.
Cisco Prime Infrastructure deletes old alarms and events, as part of normal data cleanup tasks, and checks the storage
size of the database alarm table once in every 2 hours, by default. When the alarm table exceeds the 300,000 limit, Prime
Infrastructure deletes the oldest cleared alarms until the alarm table size is within the limit. If you want to keep cleared
alarms for more than seven days, then you can specify a value more than seven days in the Delete cleared non-security
alarms after text box, until the alarm table size reaches the limit.
• Include alarm severity in the email subject line—Select the check box to include alarm severity in the email subject
line. This option is enabled by default.
• Include alarm Category in the email subject line—Select the check box to include alarm category in the email subject
line. This option is enabled by default.
• Include prior alarm severity in the email subject line—Select the check box to include prior alarm severity in the
email subject line.
• Include custom text in the email subject line—Select the check box to add custom text in the email subject line. You
can also replace the email subject line with custom text by selecting the Replace the email subject line with custom
text check box.
• Include custom text in body of email—Select the check box to add custom text in the body of email.
• Include alarm condition in body of email—Select the check box to include alarm condition in the body of email.
• Include alarm application category data in body of email—Select the check box to include alarm category in the
body of email.
• Add link to Alarm detail page in body of email—Select the check box to add a link to the Alarm detail page in the
body of email.
• Enable Secure Message Mode—Select the check box to enable a secure message mode. If you select the Mask IP
Address and Mask Controller Name check boxes, the alarm emails are sent in secure mode where all the IP addresses
and controller names are masked.
• Email Send Interval—Specify the time interval in which the email has to be sent.
Note Prime Infrastructure sends alarm notification email for the first instance of an alarm and the subsequent
notification is sent only if the alarm severity is changed.
• Skip to send first alarm separately as email notification-The first alarm will be sent in as a seperate email notification.
Note Disabling this option, an email notification will be sent immediately after the first alarm of the specified
Email Send Interval duration. The remaining alarms will be grouped in the second email. Enabling this
option will send only one email notification on the specified Email Send Interval duration. The first email
alert will be grouped into the existing list.
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > Alarms and Events.
Step 2 Under the Alarm Display Options area, enable or disable these settings, as desired:
Hide acknowledged Do not display Acknowledged alarms in the Alarms list or include them Yes
alarms in search results
Hide assigned alarms Do not display assigned alarms in the Alarms list or in search results Yes
Hide cleared alarms in Do not display cleared alarms in the Alarms list or in search results No
alarm browser
Step 3 To apply your changes, click Save at the bottom of the Alarms and Events window.
Note For alarms that are related to Prime Infrastructure system administration, such as high availability, refer to
Customize Server Internal SNMP Traps and Forward the Traps, on page 103.
Step 1 Choose Administration > System Settings, then choose Alarms and Events > Alarm Severity and Auto Clear.
Step 2 Expand the categories available under the Alarm Condition column, or search for the Alarm Condition you want by
entering all or part of the event text in the Alarm Condition search field just below the column heading.
Step 3 Change the alarm severity by performing one of the following tasks:
• Click the Severity field and select a severity level from the drop-down list.
• Select the check box of the alarm condition whose severity level you want to change, click Severity Configuration,
and choose a severity level from the Configure Severity Level drop-down list, ans click OK.
Note When you change the severity of an alarm condition, the Notification Policy associated with that alarm condition
will remain unchecked in the Notification Policy Page, and the alarm will not be forwarded.
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > Alarm Severity and Auto
Clear.
Step 2 Expand the categories available under the Event Types column, or search for the event type you want by entering all or
part of the event text in the Event Types search field just below the column heading.
Step 3 To change the auto-clear duration for an event or group of events:
• For a single event, check the event's check box, click in the Auto Clear Duration field, enter the new duration, then
click Save.
• For multiple events, select the events, then click Alarm Auto Clear, enter the new duration in the dialog box, then
click OK.
Step 4 Change the Auto Clear Interval by performing one of the following tasks:
• Click on the Auto Clear Duration field, enter the new interval, and click Save.
• Select the check box of the event type, click Alarm Auto Clear, enter the new interval, and click OK.
Step 1 Choose Administration > Settings > System Settings, then choose Alarms and Events > Alarms and Events.
Step 2 In the Failure Source Pattern area, select the alarm category you want to customize.
Step 3 Adjust the failure source format as follows:
• To customize the properties that are displayed, click Edit, select the properties, then click OK. If a property is
greyed-out, you cannot remove it.
• To customize the separators that are displayed between the properties, click Edit Separator.
Step 4 To apply your changes, click Save at the bottom of the Alarms and Events settings window.
Link LINK-3-UPDOWN
VLAN PORT_SECURITY-6-VLAN_REMOVED
PORT_SECURITY-6-VLAN_FULL
ICCP SM L2-L2VPN_ICCP_SM-4-REMOTE_CORE_ISOLATION
L2-L2VPN_ICCP_SM-4-REMOTE_CORE_ISOLATION_CLEAR
L2-L2VPN_ICCP_SM-3-CONFIG_LOCAL_ERROR
L2-L2VPN_ICCP_SM-3-CONFIG_REMOTE_ERROR
L2-L2VPN_ICCP_SM-4-LOCAL_CORE_ISOLATION
L2-L2VPN_ICCP_SM-4-LOCAL_CORE_ISOLATION_CLEAR
L2-L2VPN_ICCP_SM-4-PEER_REACHABILITY_FAILURE
L2-L2VPN_ICCP_SM-4-PEER_REACHABILITY_CLEAR
L2-L2VPN_ICCP_SM-4-REMOTE_ACCESS_MAIN_PORT_FAILURE
L2-L2VPN_ICCP_SM-4-REMOTE_ACCESS_MAIN_PORT_FAILURE_CLEAR
INFRA-ICCP-5-ISOLATION
INFRA-ICCP-5-ISOLATION_CLR
INFRA-ICCP-5-NEIGHBOR_STATE_UP
INFRA-ICCP-5-NEIGHBOR_STATE_DOWN
INFRA-ICCP-6-BACKBONE_INTERFACE_STATE_UP
INFRA-ICCP-6-BACKBONE_INTERFACE_STATE_DOWN
L2-BM-6-ACTIVE_CLEAR
L2-BM-6-ACTIVE_PROBLEM
L2-L2VPN_ICCP_SM-3-CONFIG_INVALID_NODEID
L2-L2VPN_ICCP_SM-3-CONFIG_INVALID_NODEID_CLEAR
Satellite PKT_INFRA-ICPE_GCO-5-SATELLITE_STATUS_PROBLEM
PKT_INFRA-ICPE_GCO-5-SATELLITE_STATUS_CLEAR
Cluster PLATFORM-REDDRV-7-ROLE_CHANGE
PLATFORM-CE_SWITCH-6-UPDN
PLATFORM-CLUSTER_CLM-6-UPDN
LINK_UP
LINK_DOWN
However, in case of the following critical events, Prime Infrastructure performs a full discovery of the device
immediately when the event occurs:
SYS-5-RELOAD
SYS-5-RESTART
OIR-6-INSCARD
OIR-SP-6-INSCARD
SWT_CEFC_STATUS_CHANGE
cefcFRURemoved
cefcFRUInserted
All of these events are assigned the MINOR severity, regardless of the trap contents, and fall under the alarm
category Generic.
Step 1 Select Monitor > Monitoring Tools > Alarms and Events.
Step 2 Click the Events tab.
Step 3 Click Custom Trap Events and then click Upload New Mibs.
Step 4 In the Upload Mib window, click Upload New MIB to upload a MIB file.
Step 5 If you upload a new MIB file, wait until the file upload is complete, and then click Refresh MIBs to have the newly
added MIB included in the MIB drop-down list.
Step 6 Click OK.
Prime Infrastructure creates a new event type and alarm condition for the specified trap.
Step 1 Log in to Prime Infrastructure with a user ID that has Administrator privileges.
Step 2 Select Administration > Settings > Logging, then choose the Global Settings tab.
Step 3 Click Download to download all the server log files.
Step 4 Compare the activity recorded in these log files with the activity you are seeing in your management application:
console.log
ncs-x-x.log
decap.core.java.log
xmp_correlation.log
decap.processor.log
What to do next
You can also get help from the Cisco support community. If you do need to open a support case, attach the
suspect log files with your case. See Get Help from the Cisco Support Community and Technical Assistance
Center (TAC), on page 251.
Step 2 In the Cisco Support Community Forum page, enter your search parameters to find what you need.
Feature Examples
Feature Examples
You can schedule a Change Audit report to run on a regular basis and, if desired, Prime Infrastructure can
e-mail the results to you. You can also forward this information in a Change Audit notification (see Enable
Change Audit Notifications and Configure Syslog Receivers, on page 254).
Step 1 Choose Reports > Report Launch Pad, then choose Compliance > Change Audit.
Step 2 Click New to configure a new report.
Step 3 In the Settings area, enter the report criteria (time frame, when to start the report, and so forth).
Step 4 If you want to schedule the report to run at a later time, enter your settings in the Schedule area. You can also specify an
e-mail address that the report should be sent to.
Step 5 If you want to run the report immediately, click Run at the bottom of the window.
The Report Run Result lists all users and the changes they made during the specified time period.
For example, when a config archive is collected, Prime Infrastructure receives the syslog, generates trap and
sends email to the configured notification destination.
If you configure syslog receivers but do not receive syslogs, you may need to change the anti-virus or firewall
settings on the destination syslog receiver to permit reception of syslog messages.
Step 1 Select Administration > Settings > System Settings, then choose Mail and Notification > Change Audit Notification.
Step 2 Select the Enable Change Audit Notification check box to enable notifications.
Step 3 If you want to send the messages to specific syslog receivers:
a) Click the Add button (+) to specify a syslog receiver.
b) In the Syslog Receivers area, enter the IP address, protocol (TCP/UDP/TLS), and port number of the syslog receiver.
You can repeat these steps as needed to specify additional syslog receivers.
You can click the export icon to download the audit details as CSV or PDF file.
Note Prime Infrastructure sends all change audit notifications in XML format to the topic ChangeAudit.All. You
must be subscribed to ChangeAudit.All to receive the notifications.
The System Audit window lists all Prime Infrastructure GUI pages that users have accessed. To view a System
Audit, choose Administration > Settings > System Audit.
The following table shows some of the information you can find from the System Audit page using the quick
filter. To enable the quick filter, choose Quick Filter from the Show drop-down list.
By a specific user Enter the username in the Username quick filter field
By all users in a user group Enter the group name in the User Group quick filter field
On devices in a specific virtual Enter the virtual domain name in the Active Virtual Domain quick
domain filter field
By the web GUI root user Select Root User Logs from the Show drop-down list
On a specific device Enter the IP address in the IP Address quick filter field
On a specific day Enter the day in the Audit Time quick filter filed (in the format
yyyy–mmm–dd)
System Logs
Prime Infrastructure provides three classes of logs which are controlled by choosing Administration >
Settings > Logging.
General Captures information about actions in the system. View and Manage General System
Logs, on page 256
SNMP Captures interactions with managed devices. Enable SNMP Traces and Adjust
SNMP Log Settings (Levels, Size), on
page 267
Syslog Forwards Prime Infrastructure audit logs (as syslogs) Forward System Audit Logs As
to another recipient. Syslogs, on page 266
Note You can download the logs for Configuration Archive Software, Configuration Rollback, Configuration
Overwrite, and Configuration Deploy job types.
Change the logging level for In the General Log Settings, select the files and the desired level, and click
specific modules Save. For example, from the Message Level drop-down list, choose one of
the following as current logging level:
• Error—Captures error logs on the system.
• Information—Captures informational logs on the system.
• Trace—Reproduces problems of managed devices on the system so the
details can be captured in the logs.
• Debug—Captures debugging logs on the system.
You will have to restart Prime Infrastructure for the changes to take effect.
Download log files for In the Global Settings tab, click Download.
troubleshooting purposes
E-mail log files (for Enter a comma-separated list of e-mail IDs and click Send.
example, to the Cisco
Technical Center)
Note This procedure sets and log message levels to Trace. Be sure to return the log message levels to their original
setting so system performance is not impacted.
Step 1 Choose Administration > Settings > Logging, then choose Log File Settings.
Step 2 Note the setting in the Message Level drop-down list because you will need to reset it later.
Step 3 In the Enable Log Modules area, select the desired Log Modules.
Log Modules Description
Access Work Flow This log module enables the ifm_access_workflow.log file.
admin This log module enables the admin.log file which then
captures the file size, message level, and so on.
Apic This log module enables the ifm_apic.log file which captures
the log that occurs when a PNP profile gets synced against
APIC.
AppNav This log module enables the appNav.log file to capture the
logs when saving the ACL configuration in a template,
deleting ACL from a template, creating and updating WAAS
interface, and when creating, updating, and deleting the
service node group and controller group.
Assurance Netflow This log module enables the assurance_netflow.log file that
captures information pertaining to the processing of
incoming Netflow data being sent from various Netflow
devices to Prime Infrastructure. It logs information related
to netflow processing performed on flow exports received
on UDP port 9991.
Assurance PfR This log module enables the assurance_pfr.log file that
captures information related to the PfRMonitoring process.
AVC Utilities This log module enables the aems_avc_utils.log file. The
AVC configuration feature-specific utility flow logs are
generated as a part of this component.
CIDS Device Logs This log module captures information related to device pack
operation of few devices that are not migrated to XDE.
Collection This log module captures the information of the dashlet that
is launched to check the readiness of a device.
Common Helper This log module captures the XMP common related
information.
Configuration This log module enables the ifm_config.log file when the
templates such as CLI, Composite, and MBC are deployed
to the devices. The service business logic execution debug
logs are captured.
Container Management This log module enables the logs for ifm_container.log file.
This file is logged when the container management performs
the life cycle operations (Install, Activate, Uninstall, and
Deactivate) of the virtual appliances.
Credential Management This log module enables the logs from NMS_SysOut.log
file.
Device Credential Verification This log module enables the XDE.log file.
epnm_lcm This log module enables the epnm-lcm.log file used by the
Life Cycle Manager (LCM) component.
epnm_mcn This log module enables the epnm-mcn.log file used by the
Model Changes Notifier (MCN) component.
Firewall and AVC Configuration This log module enables the aems_config.log file that
captures the AVC, ZBFW, QoS, and NAT configuration
details.
Firewall and AVC REST API This module enables the aems_config_access_layer.log file
that captures the REST API call details for AVC, ZBFW,
QoS, NAT, and PPM features.
Firewall and AVC Utilities This log module enables the aems_utils.log file that captures
the common utility calls in AVC/ZBFW/QoS, NAT and
PPM features.
Firewall Utilities This log module enables the aems_zbfw_utils.log file that
captures the ZBFW utility calls.
Key Certificate Management This log module enables the key_admin_web.log files.
Monitor This log module captures the information related to the APIs
that appears while launching the monitor dashlets such as
Top N Memory and Top N CPU.
MSAP This log module enables the ncs.log file. It captures the data
related to MSE High Avaliabilty actions such as Proxy
configuration and BBX configuration.
MSE This log module enables the ncs.log file. It captures the data
related to Mobility Service Engine actvities such as adding,
editing, and deleting MSE and Controller and SiteMap
synchronization with MSE.
NBIFW This log module allows you to change the logging level of
the NBI API framework. You can view the information in
the xmpNbiFw.log file.
ncs_nbi This log module allows you to change the logging level of
the Statistics NBI Services. You can view the information
in the ncs_nbi.log file.
Network Technology Overlay This log module enables the technology-overlay.log and
synce-technology-overlay.log files.
Network Technology Overlay Provider This log module enables the technology-overlay.log file.
NFVOS This log module is used for tracking esa dna integration
process.
NMS Assurance Persistence Logger This log module enables the nms-assurance-persistence.log
file.
Nms Common Trace This log module enables the nms-common.log file.
Plug and Play You can enable this module to capture the information
related to PNP profile creation and provisioning, bootstrap
initial configuration, APIC EM sync timeframe. The logs
are captured in the ifm_pnp.log and ifm_apic.log files.
QoS This log module enables the qos_config.log file when QoS
policies such as class maps or policy maps are created,
deployed to the devices and associate or disassociate with
the interfaces.
Reports You can enable this module to view the report related
queries, memory consumption, and time frame of report
generation.
Service Impact Analysis This log module enables the sia.log file used by the Service
Impacting Analysis feature in fault.
SWIM You can enable this module to log the Software Image
Management module logs in the ifm_swim.log file. The
logs will be captured as per the selected log level in GUI.
It logs the information related to the Software Image
Management operations like Software Image
Recommendation, Software Image Upgrade Analysis,
Software Image Import, Software Image Distribution,
Software Image Activation, and Software Image Commit.
System Monitoring This log module enables the ifm_sysmon.log file. This logs
information pertaining to the rule start time and end time
as well as the operations performed in between.
Threshold You can enable this module to view the details of the events
processed by the Threshold Monitor.
Wlan AVC Configuration This log module enables the aems_config_wlan.log file to
view the WLAN configuration work flow related
information.
XMLMED You can enable this module to capture the SOAP requests
and responses. You can also view these logs in the ncs.log
files.
The ifm_da.log file logs the information related to the Netflow devices and their respective pcaps, post device inclusion
on Prime Infrastructure. The assurance_wirelessuser.log file logs the information that is captured when the WirelessUser
job runs to read the user data and populate in the memory caches that are added by WIRELESS_ASSURANCE. The
assurance_pfr.log file stores the PfR monitoring related information. The assurance_netflow.log file logs the processing
of incoming Netflow data being sent from various Netflow devices to Prime Infrastructure. The assurance_appclassifier.log
file stores the logs for NBAR classification on incoming AVC/Wireless Netflow data.
Step 7 In the E-Mail Log File area, enter a comma-separated list of e-mail IDs.
Step 8 Revert to the original setting in the Message Level drop-down list.
Step 1 Choose Administration > Settings > Logging, then choose Syslog tab to view Syslog Logging Options.
Step 2 Select the Enable Syslog check box to enable collecting and processing system logs.
Step 3 In the Syslog Host field, enter the IP address of the destination server to which the message is to be transmitted.
Step 4 From the Syslog Facility drop-down list, choose any of the eight local use facilities for sending syslog messages. The
local use facilities are not reserved and are available for general use.
Step 5 Click Save.
Note If you enable system logs forwarding to remote server through an admin CLI, logs will not be registered to
ade.log file.
Enable SNMP Traces and Adjust SNMP Log Settings (Levels, Size)
Enable SNMP tracing to access more detailed information about the packets sent and received through SNMP.
You may want to do this when troubleshooting, such as when a trap is dropped.
To make the following changes, choose Administration > Settings > Logging, then select the SNMP Log
tab.
Step 1 Choose Administration > Settings > System Settings > Network and Device > CLI Session.
Step 2 Select the Controller Session Protocol (you can choose SSH or Telnet; SSH is the default).
Step 3 Select the Autonomous AP Session Protocol (you can choose SSH or Telnet; SSH is the default).
Step 4 The Run Autonomous AP Migration Analysis on discovery radio button is set to No by default. Choose Yes if you
want to discover the autonomous APs as well as perform migration analysis
Step 5 Click Save.
• If the Unified AP is disassociated and is in FlexConnect mode, then the Prime Infrastructure checks if
the AP is reachable or not. If the AP is ping capable and ping reachable, then it raises a low severity
alarm. If the AP is not ping capable or reachable, then it raises a high severity alarm.
• If the Unified AP is disassociated and is not in FlexConnect mode, then the Prime Infrastructure raises
a high severity alarm.
By default, the Unified AP ping reachability feature is enabled in Prime Infrastructure versions 3.3 onwards.
However, it is disabled in verions 3.2 and earlier. To enable, follow these steps:
Step 1 Choose Administration > Settings > System Settings > Network and Device > Unified AP Ping Reachability.
Step 2 Select the Allow Prime to learn about AP Reachability radio button to allow Cisco Prime Infrastructure to learn if the
AP is reachable or not. A background task is triggered which pings each access point and stores the result in the Prime
Infrastructure database.
Step 3 You are prompted with an alert saying that the background job is triggered to learn about ping reachability. Click OK to
continue.
A background job is triggered and is run against all the associated APs in the Prime Infrastructure to learn about the AP
capabilities. A new job is created in the Job Dashboard with this information.
Step 4 If you select All access points are ping reachable from Prime radio button, then the Administrator marks all the Unified
APs as ping capable.
Step 5 Choose Administration > Dashboards > Job Dashboard > System Jobs > Status to view job status.
Step 6 To search job details, use Quick filter option and enter Learn Unified AP Ping Capability in the Name search field.
The result is displayed in the Status table. The table contains the following information:
• Job Type
• Status
• Last Run Status
• Last Start Time
• Duration
• Next Start Time
• Click the Learn AP Ping Reachability link to view more details. The Learn AP Ping Reachability page displays
the following information. Click Show All to view details about all job instances.
• Recurrence
• Interval
• Run ID
• Status
• Duration
• Start Time
• Completion Time
Step 1 Choose Administration > Settings > System Settings > Network and Device > Controller Upgrade .
Step 2 Select the Auto refresh After Upgrade check box to automatically restore the configuration whenever there is a change
in the controller image.
Step 3 Select the Sync on Save Config Trap check box to trigger a Sync on the controller when the Prime Infrastructure receives
a Save Config trap. When this check box is selected, you can choose either of the following options:
• Retain the configuration in the Prime Infrastructure database
• Use the configuration on the controller currently
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Auto
SPT. The Auto SPT page appears.
Step 2 Select the Enable Auto Switch Port Tracing check box to allow Prime Infrastructure to automatically trace the switch
ports to which rogue access points are connected. Then specify the parameters for auto port tracing, including:
• How long to wait between rogue AP-to-port traces (in minutes)
• Whether to trace Found On Wire rogue APs
• Which severities to include (Critical, Major, or Minor)
Step 3 Select the Enable Auto Containment check box to allow Prime Infrastructure to automatically contain rogue APs by
severity. Then specify the parameters for auto containment, including:
• Whether to exclude Found On Wire rogue APs detected by port tracing
• Which severities to include in the containment (Critical, Major)
• The containment level (up to 4 APs)
Note For effective use of Vendor OUI match to eliminate false positive matches, the switch ports must have their
location information configured. The switch ports that are not configured will remain for OUI match after
elimination by location.
Related Topics
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > SPT
Configuration.
Step 2 Configure the following basic settings:
• MAC address +1/-1 search—Select the check box to enable.
This search involves the MAC address +1/-1 convention where the wired-side MAC address of the rogue access point is
obtained by adding or subtracting the radio MAC address by one.
• Rogue client MAC address search—Select the check box to enable.
When a rogue access point client exists, the MAC address of the client is added to the searchable MAC address list.
• Vendor (OUI) search— Select the check box to enable. OUI refers to Organizational Unique Identifier search which
searches the first three bytes in a MAC address.
• Exclude switch trunk ports— Select the check box to exclude switch trunk ports from the switch port trace.
Note When more than one port is traced for a given MAC address, additional checks are performed to improve
accuracy. These checks include the: trunk port, non-AP CDP neighbors present on the port, and whether or not
the MAC address is the only one on this port.
• Exclude device list— Select the check box to exclude additional devices from the trace. Enter into the device list
text box each device that you want to exclude from the switch port trace. Separate device names with a comma.
• Max hop count— Enter the maximum number of hops for this trace. Keep in mind that the greater the hop count,
the longer the switch port trace takes to perform.
Note This hop count value is not applicable for Auto SPT.
• Exclude vendor list— Enter in the vendor list text box any vendors that you want to exclude from the switch port
trace. Separate vendor names with commas. The vendor list is not case sensitive.
The default value for these parameters should be good for normal operations. These parameters directly impact the
performance of switch port tracing and Prime Infrastructure. Unless required, we do not recommend that you alter these
parameters.
• Select CDP device capabilities— Select the check box to enable.
Prime Infrastructure uses CDP to discover neighbors during tracing. When the neighbors are verified, Prime Infrastructure
uses the CDP capabilities field to determine whether or not the neighbor device is a valid switch. If the neighbor device
is not a valid switch, it is not traced.
Step 4 Click Save to confirm changes made. Click Reset to return the page to the original settings. Click Factory Reset to return
settings to the factory defaults.
Step 1 Add switches with full licenses using the Configuration > Network > Network Devices page.
Step 2 Enable Auto switch port tracing in Administration > Settings > System Settings > Network and Device > Switch Port
Trace (SPT) > Auto SPT page.
Step 3 Schedule to run wired client status Major Polling background task in Administration > Dashboards > Job Dashboard
page.
Step 4 Click the Trace switch port icon in Rogue AP detail page. New pop up will show details of switch port traced. Click the
detail status to check trace status such as started/Found, and so on.
Note Manual SPT will work, even if you do not add any switch to Prime Infrastructure. But you should configure
the SNMP credentials correctly in Administration > Settings > System Settings > Network and Device >
Switch Port Trace (SPT) > Manual SPT page. “Private” is the default credential, and will be used during
manual Switch Port Tracing if you do not configure it.
• If a switch is added to Prime Infrastructure by selecting Configuration > Network > Network Devices,
the SNMP credentials entered for the switch will override any switch SNMP credentials entered here,
and will be used for switch port tracing. You can change the switch SNMP credentials in the
Configuration > Network > Network Devices page. Prime Infrastructure will not require any license
for adding switch with SPT and will not display wired clients connected to the switches. The Monitor
> Managed Elements > Network Devices > Device Groups > Device Type > Switches and Hubs
page will not display the switch details added with SPT.
• Prime Infrastructure requires full license for adding switch. The Monitor > Managed Elements >
Network Devices > Device Groups > Device Type > Switches and Hubs page will display the switch
details added with full license. Prime Infrastructure will also display wired clients connected to switches.
Location of switches is tracked with MSE.
Step 1 ChooseAdministration > Settings > System Settings, then choose Network and Device > Switch Port Trace (SPT) >
Manual SPT . The Manual SPT page appears.
Step 2 View or edit the details for a current SNMP credential entry by clicking the Network Address link for that entry.
For details on this task, see “Configure Global SNMP Settings” and “View SNMP Credential Details” in related topics.
Note that the default entry is for network 0.0.0.0, which indicates the entire network. SNMP credentials are defined per
network, so only network addresses are allowed. The SNMP credentials defined for network 0.0.0.0 is the SNMP credential
default. It is used when no specific SNMP credential is defined. You should update the pre-populated SNMP credential
with your own SNMP information.
Step 3 To add a new SNMP entry, choose Select a command > Add SNMP Entries > Go (see “Add SNMP Credentials”).
Related Topics
Configure Global SNMP Settings, on page 94
View SNMP Credential Details, on page 95
Add SNMP Credentials, on page 96
For more information on Switch Port Tracing, see the following related topics:
In the Switch Port tracing Details dialog box, do one of the following:
• Click Enable/Disable Switch Port(s)— Enables or disables any selected ports.
• Click Trace Switch Port(s)— Runs another switch port trace.
• Click Show Detail Status— Displays details regarding the switch port traces for this access point.
• Click Close.
Related Topics
Configure Switch Port Tracing, on page 272
Configure SNMP Credentials for Rogue AP Tracing, on page 275
Related Topics
How Do You Configure Auto SPT?, on page 277
How Does Auto SPT Differ From Manual SPT?, on page 277
Where Can I See SPT Results (Manual and Auto)?, on page 278
How Can I Ensure Auto SPT Runs Smoothly
Why Does Auto SPT Take Longer to Find Wired Rogues?, on page 278
How Can I Detect Wired Rogues on Trunk Ports?, on page 279
How Can I Use the Auto SPT “Eliminate By Location” Feature? , on page 280
What is the Difference Between “Major Polling” and “Minor Polling”?, on page 280
Step 1 Use Configuration > Network > Network Devices > Add Device to add switches with a License Level of Full.
Step 2 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > Auto SPT
and select Enable Auto Switch Port Tracing. Click OK.
Step 3 Select Administration > Settings > Background Tasks > Wired Client Status. Make sure this task is enabled and that
it is scheduled to run at least twice a day.
Related Topics
Where Can I See SPT Results (Manual and Auto)?, on page 278
How Can I Ensure Auto SPT Runs Smoothly?
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Port Trace Only license level, the SNMP credentials you enter when adding the switch will override
the SNMP credentials entered using Administration > Settings > System Settings > Network and
Device > Switch Port Trace (SPT) > Manual SPT. The entered credentials will be used for switch port
tracing. This is the main difference between not adding switches and adding switches with a license level
of “Switch Port Tracing Only”. Prime Infrastructure will not consume any licenses for switches with an
SPT-only license level, will not show these switches under Monitor > Managed Elements > Network
Devices > Device Type > Switches and Hubs, and will not show wired clients connected to these
switches.
For more information, See WCS Switch Port Trace Demonstration.
Related Topics
What is the Difference Between “Major Polling” and “Minor Polling”?, on page 280
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Step 1 Display details for the Rogue AP alarm in which you are interested. For example:
a) Click the Alarm Summary icon at the top of any Prime Infrastructure page. A list of alarm categories appears.
b) Click the Rogue AP link in the list. Prime Infrastructure displays the list of rogue AP alarms.
c) Expand the rogue AP alarm you want. The details page for that alarm appears.
Step 2 In the Switch Port Tracing pane, click the Trace Switch Port icon. The Switch Port Trace window shows the details
of the traced switch port.
If no SPT has been performed, click Trace Switch Port(s) to start tracing. Click the Show Detail Status button to get
details on the status of the trace as it progresses.
Related Topics
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Step 1 Choose Administration > Settings > System Settings > Network and Device > Switch Port Trace (SPT) > SPT
Configuration.
Step 2 Uncheck the Exclude switch trunk ports check box, then click Save.
Step 3 Choose Administration > Settings > System Settings > Client and User > Client.
Step 4 Check the Discover wired clients on trunk ports check box, then click Save.
Switches will start detecting wired clients on trunk ports starting with the next execution of a major poll by the Wired
Client Status background task.
Related Topics
How Do You Configure Auto SPT?, on page 277
What is the Difference Between “Major Polling” and “Minor Polling”?, on page 280
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Step 1 Use Configuration > Network > Network Devices > Switches and Hubs.
Step 2 Click a Device Name. By default, Configuration tab opens.
Step 3 Click Switch Port Location in the top right corner.
Step 4 Select the check box(es) of one or more ports to configure location, and from choose Configure Location from the
drop-down list, then click Go.
Step 5 In the Map Location group, you can configure the following:
• From the Campus/Site drop-down list, choose the campus map for the switch or switch port.
• From the Building drop-down list, choose the building map location for the switch or switch port.
• From the Floor drop-down list, choose the floor map.
• If you have already saved a file with the Campus/Site, Building, and Floor details, click Import Civic. This imports
civic information for the MSE using Prime Infrastructure. Enter the name of the text file or browse for the filename,
and click Import.
Step 6 In the ELIN and Civic Location group box, you can configure the following:
• Enter the Emergency Location Identifier Number (ELIN) in the ELIN text box. ELIN is a number that can be used
by the local public safety answering point (PSAP) to look up the geographic location of the caller in a master database
known as the automatic location information (ALI) database. The ELIN also allows the PSAP to contact the emergency
caller directly in the event the phone call is disconnected.
• Complete the required fields on the Civic Address and Advanced tabs.
• If you have the ELIN and Civic location information saved in a file, you can import it by clicking Import Switch
Location.
Related Topics
How Can I Ensure Auto SPT Runs Smoothly?
How Do You Configure Auto SPT?, on page 277
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Step 1 Integrate Cisco Mobility Service Engine (MSE) with Prime Infrastructure.
Step 2 Ensure that MSE is in sync with the defined floor area where the detecting APs are placed. MSE should be able to track
the rogues.
Step 3 Add all switches to Prime Infrastructure.
Step 4 After all switches are added to PI and are in the managed state, all switch ports need to be configured for the algorithm
to work. If all switches are not configured with switch ports, then the false positive results occur. You can configure from
the Configuration > Network > Network Devices > Switches and Hubs > click on a Device Name > click Switch Port
Location in the top right corner.
Step 5 Place the detecting access points on the map and make sure that the Cisco MSE is synchronized and rogues APs are
detected on the floor.
Eliminate By Location algorithm takes the floor ID of detecting APs and eliminates all others. If some switch ports are
not configured, then the value of those ports will be set to Zero and will be considered. Hence the results may contain
false positives, which contains the exact floor ID and floor ID which has the value zero.
Step 6 Configure switch port locations to ensure that all ports are assigned to the correct floor area.
Related Topics
How Do You Configure Switch Port Location?, on page 279
How Do You Configure Auto SPT?, on page 277
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Major Polling: During a major poll, Prime Infrastructure triggers client discovery on all wired device ports
by syncing all of the essential client information with the database. In Prime Infrastructure 2.2, the frequency
of this poll was reduced from twice a day. It is now fully configurable.
Minor Polling: During a minor poll, Prime Infrastructure triggers client discovery only on device interfaces
and ports which became active recently. Prime Infrastructure uses interface uptime data to detect when a port
or interface is recently added or removed by any client.
Related Topics
How Does Auto SPT Differ From Manual SPT?, on page 277
Why Does Auto SPT Take Longer to Find Wired Rogues?, on page 278
Frequently Asked Questions on Rogues and Switch Port Tracing, on page 276
Figure 1: HA Deployment
An HA deployment consists of two Prime Infrastructure servers: a primary and a secondary. Each of these
servers has an active database and a standby backup copy of the active database. Under normal circumstances,
the primary server is active: It is connected to its active database while it manages the network. The secondary
server is passive, connected only to its standby database, but in constant communication with the primary
server.
The Health Monitor processes running on both servers monitor the status of its opposite server. Oracle Recovery
Manager (RMAN) running on both servers creates the active and standby databases and synchronizes the
databases when there are changes, with the help of Oracle Data Guard Broker running on the primary server.
When the primary server fails, the secondary takes over, connecting to its active database, which is in sync
with the active primary database. You can trigger this switch, called a “failover”, either manually, which is
recommended, or have it triggered automatically, You then use the secondary server to manage the network
while working to restore access to the primary server. When the primary is available again, you can initiate
a switch (called a “failback”) back to the primary server and resume network management using the primary.
If you choose to deploy the primary and secondary servers on the same IP subnet, you can configure your
devices to send a notifications to Prime Infrastructure at a single virtual IP address. If you choose to disperse
the two servers geographically, such as to facilitate disaster recovery, you will need to configure your devices
to send notifications to both servers.
Related Topics
About the Primary and Secondary Servers, on page 285
Sources of Failure, on page 285
File and Database Synchronization, on page 285
HA Server Communications, on page 286
Sources of Failure
Prime Infrastructure servers can fail due to issues in one or more of the following areas:
• Application Processes: Failure of one or more of the Prime Infrastructure server processes, including
NMS Server, MATLAB, TFTP, FTP, and so on. You can view the operational status of each of these
application processes by running the ncs status command through the admin console.
• Database Server: One or more database-related processes could be down. The Database Server runs as
a service in Prime Infrastructure.
• Network: Problems with network access or reachability issues.
• System: Problems related to the server's physical hardware or operating system.
• Virtual Machine (VM): Problems with the VM environment on which the primary and secondary servers
were installed (if HA is running in a VM environment).
For more information, see How High Availability Works
File changes are synchronized using the HTTPS protocol. File synchronization is done either in:
• Batch: This category includes files that are not updated frequently (such as license files). These files are
synchronized once every 500 seconds.
• Near Real-Time: Files that are updated frequently fall under this category. These files are synchronized
once every 11 seconds.
By default, the HA framework is configured to copy all the required configuration data, including:
• Report configurations
• Configuration Templates
• TFTP-root
• Administration settings
• Licensing files
Related Topics
How High Availability Works, on page 283
HA Server Communications
The primary and secondary HA servers exchange the following messages in order to maintain the health of
the HA system:
• Database Sync: Includes all the information necessary to ensure that the databases on the primary and
secondary servers are running and synchronized.
• File Sync: Includes frequently updated configuration files. These are synchronized every 11 seconds,
while other infrequently updated configuration files are synchronized every 500 seconds.
• Process Sync: Ensures that application- and database-related processes are running. These messages fall
under the Heartbeat category.
• Health Monitor Sync: These messages check for the following failure conditions:
• Network failures
• System failures (in the server hardware and operating system)
• Health Monitor failures
Related Topics
How High Availability Works, on page 283
Related Topics
How High Availability Works, on page 283
1 Settings area displays Health Monitor state and configuration detail in five separate
sections.
2 Status indicates current functional status of the HA setup (green check mark indicates
that HA is on and working).
3 Check Failover Readiness field displays the values of system failback and system failover
details of the checklist items.
For more details, see "Check Failover Readiness" given below the table.
4 Primary IP Address identifies the IP of the peer server for this secondary server (on the
primary server, this field is labeled “Secondary IP Address”).
5 Events table displays all current HA-related events, in chronological order, with most
recent event at the top.
6 Message Level field lets you change the logging level (your choice of Error, Informational,
or Trace). You must press Save to change the logging level.
7 Logging Download area lets you download Health Monitor log files.
8 State shows current HA state of the server on which this instance of Health Monitor is
running.
9 Failover Type shows whether you have Manual or Automatic failover configured.
10 Identifies the HA server whose Health Monitor web page you are viewing.
11 Action shows actions you can perform, such as failover or failback. Action buttons are
enabled only when Health Monitor detects HA state changes needing action.
SYSTEM - CHECK DISK IOPS This validates the disk iops in both primary and secondary
server.
The minimum expected disk iops is 200 MBps.
NETWORK - CHECK NETWORK This checks if the eth0 interface speed matches the
INTERFACE BANDWIDTH recommended speed of 100 Mbps in both primary and
secondary sever.
This test will not measure network bandwidth by
transmitting data between primary and secondary server.
NETWORK - CHECK NETWORK This checks if the network bandwidth speed matches the
BANDWIDTH SPEED recommended speed of 100 Mbps in both primary and
secondary sever.
This test will measure network bandwidth by transmitting
data between primary and secondary server.
Note In Cisco Prime Infrastructure 3.9, the network
bandwidth speed test is calculated only in Mbps.
Therefore, GBps, MBps, KBps, and Mbps are
changed over to Mbps and given as an input to
the speed test.
DATABASE - SYNC STATUS This ensures the oracle data guard broker configuration
which syncs the primary and secondary database.
Related Topics
How High Availability Works, on page 283
How to Resolve Database Synchronization Issues, on page 324
we fail to reconfigure devices to send their notifications to the secondary server as well as the primary server,
then when the secondary Prime Infrastructure server goes into Active mode, none of these notifications will
be received by the secondary server.
Setting all of your managed devices to send notifications to two separate servers demands extra device
configuration work. To avoid this additional overhead, HA supports use of a virtual IP that both servers can
share as the Management Address. The two servers will switch IPs as needed during failover and failback
processes. At any given time, the virtual IP Address will always point to the correct Prime Infrastructure
server.
Note that you cannot use virtual IP addressing unless the addresses for both of the HA servers and the virtual
IP are all in the same subnet. This can have an impact on how you choose to deploy your HA servers (see
“Planning HA Deployments” and “Using the Local Model” in Related Topics).
Also note that a virtual IP address is in no way intended as a substitute for the two server IP addresses. The
virtual IP is intended as a destination for syslogs and traps, and for other device management messages being
sent to the Prime Infrastructure servers. Polling of devices is always conducted from one of the two Prime
Infrastructure server IP addresses. Given these facts, if you are using virtual IP addressing, you must open
your firewall to incoming and outgoing TCP/IP communication on all three addresses: the virtual IP address
as well as the two actual server IPs.
You can also use virtual IP addressing if you plan to use HA with Operations Center. You can assign a virtual
IP as SSO to the Prime Infrastructure instance on which Operations Center is enabled. No virtual IP is needed
for any of the instances managed using Operations Center (see “Enable HA for Operations Center”).
You can enable virtual IP addressing during HA registration on the primary server, by specifying that you
want to use this feature and then supplying the virtual IPv4 (and, optionally, IPv6) address you want the
primary and secondary servers to share (see “How to Register HA on the Primary Server”).
To remove Virtual IP addressing after it is enabled, you must remove HA completely (see “Remove HA Via
the GUI”).
Related Topics
What If I Cannot Use Virtual IP Addressing?, on page 294
Planning HA Deployments, on page 291
Using the Local Model, on page 292
Enable HA for Operations Center, on page 295
How to Register HA on the Primary Server, on page 299
How High Availability Works, on page 283
Remove HA Via the GUI, on page 328
To set up HTTPS access for Cisco Prime Infrastructure, see Set Up HTTPS Access to Prime Infrastructure
Step 1 Launch Firefox and enter the following URL in the location bar: about:preferences#advanced.
Firefox displays its Options > Advanced tab.
Step 2 Select Certificates > View Certificates > Your Certificates, then click Import....
Step 3 Navigate to the downloaded certificate files, select them, then click OK or Open.
Step 4 If the certificate files are encrypted: You will be prompted for the password used to encrypt the certificate file. Enter it
and click OK.
The certificate is now installed in the browser.
Planning HA Deployments
Prime Infrastructure’s HA feature supports the following deployment models:
• Local: Both of the HA servers are located on the same subnet (giving them Layer 2 proximity), usually
in the same data center.
• Campus: Both HA servers are located in different subnets connected via LAN. Typically, they will be
deployed on a single campus, but at different locations within the campus.
• Remote: Each HA server is located in a separate, remote subnet connected via WAN. Each server is in
a different facility. The facilities are geographically dispersed across countries or continents.
The following sections explain the advantages and disadvantage of each model, and discusses underlying
restrictions that affect all deployment models.
HA will function using any of the supported deployment models. The main restriction is on HA’s performance
and reliability, which depends on the bandwidth and latency criteria discussed in “Network Throughput
Restrictions on HA”. As long as you are able to successfully manage these parameters, it is a business decision
(based on business parameters, such as cost, enterprise size, geography, compliance standards, and so on) as
to which of the available deployment models you choose to implement.
Related Topics
Network Throughput Restrictions on HA, on page 291
Using the Local Model, on page 292
Using the Campus Model, on page 293
Using the Remote Model, on page 293
What If I Cannot Use Virtual IP Addressing?, on page 294
Automatic Versus Manual Failover, on page 294
Enable HA for Operations Center, on page 295
The main exception to this rule is the delay for a full database copy operation. This kind of operation is
triggered when the primary server has been down for more than the data retention period and you then bring
it back up. The data retention period for the express, express-plus and standard configurations server is six
hours and for professional and Gen 2 appliance server it is12 hours.
Prime Infrastructure will trigger a full database copy operation from the secondary to the primary. No failback
is possible during this period, although the Health Monitor page will display any events encountered while
the database copy is going on. As soon as the copy is complete, the primary server will go to the “Primary
Synching” state, and you can then trigger failback. Be sure not to restart the primary server or disconnect it
from the network while the full database copy is in progress.
Variations in net throughput during a full database copy operation, irrespective of database size or other
factors, can mean the difference between a database copy operation that completes successfully in under an
hour and one that does not complete at all. Cisco has tested the impact of net throughput on HA deployment
in configurations following the Remote model, using typical Prime Infrastructure database sizes of between
105 GB and 156 GB. Based on these tests, Cisco recommends for a typical database of 125 GB (generating
a 10 GB backup file):
• For best results: With sub-millisecond latency, and net throughput of 977 Mbps or more, expect a complete
database copy time of one hour or less.
• For good results: With latency of 70 milliseconds, and net throughput of 255 Mbps or more, expect a
complete database copy time of two hours or less.
• For acceptable results: With latency of 220 milliseconds or less, and net throughput of 86 Mbps or more,
expect a complete database copy time of 4.5 hours or less.
With latencies of 330ms or higher, and throughput of 46Mbps or less, you run the risk of the database copy
not completing successfully.
Related Topics
Planning HA Deployments, on page 291
Using the Remote Model, on page 293
• Does not permit use of a virtual IP address as the single management address for the system, so it requires
more device configuration (see “What If I Cannot Use Virtual IP Addressing?” in Related Topics).
• Usually provides lower bandwidth and higher latency than the other two models. This can affect HA
reliability and may require administrative intervention to remedy (see “Network Throughput Restrictions
on HA” in Related Topics).
Related Topics
Planning HA Deployments, on page 291
Network Throughput Restrictions on HA, on page 291
Using the Local Model, on page 292
Using the Campus Model, on page 293
What If I Cannot Use Virtual IP Addressing?, on page 294
If the failover type is set to Automatic and the network connection goes down or the network link between
the primary and secondary servers becomes unreachable, there is also a small possibility that both the primary
and secondary servers will become active at the same time. We refer to this as the “split brain scenario”.
To prevent this, the primary server always checks to see if the secondary server is Active. As soon as the
network connection or link is restored and the primary is able to reach the secondary again, the primary server
checks the secondary server's state. If the secondary state is Active, then the primary server goes down on its
own. Users can then trigger a normal, manual failback to the primary server.
Note that this scenario only occurs when the primary HA server is configured for Automatic failover.
Configuring the primary server for Manual failover eliminates the possibility of this scenario. This is another
reason why we recommend Manual failover configuration.
Automatic failover is especially ill-advised for larger enterprises. If a particular HA deployment chooses to
go with Automatic failover anyway, an administrator may be forced to choose between the data that was
newly added to the primary or to the secondary. This means, essentially, that there is a possibility of data loss
whenever a split-brain scenario occurs. For help dealing with this issue, see “How to Recover From Split-Brain
Scenario” in Related Topics.
To ensure that HA is managed correctly, Cisco recommends that Prime Infrastructure administrators always
confirm the overall health of the HA deployment before initiating failover or failback, including:
• The current state of the primary.
• The current state of the secondary.
• The current state of connectivity between the two servers.
Related Topics
Planning HA Deployments, on page 291
Network Throughput Restrictions on HA, on page 291
How to Trigger Failback, on page 313
How to Recover From Split-Brain Scenario, on page 323
Enable HA for Operations Center, on page 295
If you already have a Prime Infrastructure server with Operations Center enabled, and wish to use it as
your primary Operations Center server with HA: Remove Single Sign On (SSO) servers from the Operations
Center instance and all the Prime Infrastructure instances managed by that Operations Center server. You
can easily do this by selecting Administration > Users > Users, Roles & AAA > SSO Servers and then
using the Delete SSO Server(s) command.
3. Install the secondary server and configure it for use with HA. For details, see “How to Install the HA
Secondary Server ” in Related Topics.
4. Register the secondary server on the primary, specifying that you want to Enable virtual IP and supplying
the virtual IP address you selected. Logout from the Server and login back with the virtual IP. For details,
see “How to Register HA on the Primary Server” in Related Topics.
5. If this is a new primary HA server: Apply the Operations Center license file to the primary server to
transform it into an Operations Center instance. For details, see “Activate Your Operations Center License”.
6. Setup the virtual IP address as the SSO server on the primary server, specifying the virtual IP address as
the IP address for the SSO server.For details, see “Enable SSO for Operations Center” in Related Topics.
Note By default TOFU is enabled in the primary server and if no CA certificate is deployed in primary or secondary,
then after failover, delete the Virtual IP TOFU from the PI instances and secondary server. After failback
repeat the same from primary server. To remove TOFU for Virtual IP from SSO (primary) client server:
ncs certvalidation tofu-certs deletecert host <virtual ip>
Note Post the upgrade of Prime Infrastructure Operations center to 3.7, if you have a self-signed certificate then
before adding the Prime Infrastructure instance to Operations center, you must remove the VIP from TOFU
check.
7. Repeat the virtual IP SSO server setup on all instances of Prime Infrastructure that will be managed by
the primary Operations Center server. Make sure you have deleted any old SSO configuration and launch
PI server with its own IP.
8. Log out of all Prime Infrastructure instances and log back into the Operations Center instance, using the
virtual IP address as the Operations Center server IP.
9. If this is a new primary HA server: Add Prime Infrastructure instances to the Operations Center server,
as explained in “Add Cisco Prime Infrastructure Instances to Operations Center” in the Related Topics.
For more information, see "Activate Your Operations Center License" in Related Topics.
Note It is recommended to use either the host-name or the IP address uniformly for both managed servers and SSO
configuration. Including both IP address and host-name may cause unexpected behaviour in SSO when cross
launching from OPC to managed PI's.
To set up HA for Operations Center without using virtual IP, follow this workflow:
1. Install Prime Infrastructure on the server you plan to use as your primary Operations Center HA server.
If you already have a Prime Infrastructure server with Operations Center enabled, and wish to use it as
your primary Operations Center server with HA: Remove Single Sign On (SSO) servers from the Operations
Center instance and all the Prime Infrastructure instances managed by that Operations Center server. You
can easily do this by selecting Administration > Users > Users, Roles & AAA > SSO Servers and then
using the Delete SSO Server(s) command.
2. Install the secondary server and configure it for use with HA. For details, see “How to Install the HA
Secondary Server ” in Related Topics.
3. Register the secondary server on the primary.
4. If this is a new primary HA server: Apply the Operations Center license file to the primary server to
transform it into an Operations Center instance. For details, see “Activate Your Operations Center License”.
5. Repeat the primary Server IP address setup on all instances of Prime Infrastructure that will be managed
by the primary Operations Center server.
6. Log out of all Prime Infrastructure instances and log back into the Operations Center instance, using the
Primary IP address as the Operations Center server IP.
7. If this is a new primary HA server: Add Prime Infrastructure instances to the Operations Center server,
as explained in “Add Cisco Prime Infrastructure Instances to Operations Center” in the Related Topics.
For more information, see "Activate Your Operations Center License" in Related Topics.
Related Topics
Using Virtual IP Addressing With HA, on page 288
Before You Begin Setting Up High Availability, on page 298
How to Install the HA Secondary Server, on page 299
How to Register HA on the Primary Server, on page 299
Activate Your Operations Center License, on page 4
Add Cisco Prime Infrastructure Instances to Operations Center, on page 6
• If you plan on using Operations Center with an HA implementation of Prime Infrastructure: Ensure that
all of your HA-enabled Prime Infrastructure servers (both primary and secondary) have fully resolved
host names.
For more information, see Cisco Prime Infastructure Quick Start Guide
Related Topics
Set Up High Availability, on page 297
Using Virtual IP Addressing With HA, on page 288
Enable HA for Operations Center, on page 295
Network Throughput Restrictions on HA, on page 291
Step 1 Begin installing the Prime Infrastructure server software on your secondary server just as you would for a primary server.
For instructions on installing the server, see the Cisco Prime Infrastructure Quick Start Guide.
Step 2 During the installation, you will be prompted as follows:
Will this server be used as a secondary for HA? (yes/no)
Enter yes at the prompt.
Step 3 You will then be prompted for the HA authentication key, as follows:
Enter Authentication Key:
Enter the authentication key at the prompt. Enter it again at the confirmation prompt.
Related Topics
Set Up High Availability, on page 297
Before You Begin Setting Up High Availability, on page 298
Check Prime Infrastructure Version and Patch Status, on page 127
Check Prime Infrastructure Server Status, on page 126
How to Register HA on the Primary Server, on page 299
• The authentication key you set during installation of the secondary server.
• One or more email addresses, to which notifications will be sent.
• The Failover Type (see “Automatic Versus Manual Failover”).
If you plan to use virtual IP addressing (see “Using Virtual IP Addressing With HA”), you will also need to:
• Select the Enable Virtual IP checkbox.
• Specify the IPv4 virtual IP address to be shared by the primary and secondary HA servers. You may also
specify an IPv6 virtual IP address, although this is not required.
The following steps explain how to register HA on the primary server. You follow these same steps when
re-registering HA.
Step 1 Log in to Prime Infrastructure with a user ID and password that has administrator privileges.
Step 2 From the menu, select Administration > Settings > High Availability. Prime Infrastructure displays the HA status page.
Step 3 Select HA Configuration and then complete the fields as follows:
a. Secondary Server: Enter the IP address or the host name of the secondary server.
Note We always recommend to use DNS server for resolving the host name to IP address. If you are using the
"/etc/hosts" file instead of DNS server, you should enter the secondary IP address instead of host name.
b. Authentication Key: Enter the authentication key password you set during the secondary server installation.
c. Email Address: Enter the address (or comma-separated list of addresses) to which notification about HA state changes
should be mailed. If you have already configured email notifications using the Mail Server Configuration page (see
“Configure Email Server Settings”), the email addresses you enter here will be appended to the list of addresses
already configured for the mail server.
d. Failover Type: Select either Manual or Automatic. We recommend that you select Manual.
Step 4 If you are using the virtual IP feature: Select the Enable Virtual IP checkbox, then complete the additional fields as
follows:
a. IPV4 Virtual IP: Enter the virtual IPv4 address you want both HA servers to use.
b. IPV6 Virtual IP: (Optional) Enter the IPv6 address you want both HA servers to use.
Note that virtual IP addressing will not work unless both servers are on the same subnet. You should not use IPV6 address
block fe80, it is been reserved for link-local unicast addressing.
Step 5 Click Check Readiness to ensure if the HA related environmental parameters are ready for the configuration.
For more details, see "Check Readiness for HA Registration/Configuration".
Step 6 Click Register to view the Milestone progress bar, to check the 100% completion of Pre-HA Registration, Database
Replication and Post HA Registration as shown below. Prime Infrastructure initiates the HA registration process. When
registration completes successfully, Configuration Mode will display the value Primary Active.
For more information, see Configure Email Server Settings , on page 391.
Related Topics
How to Install the HA Secondary Server, on page 299
Automatic Versus Manual Failover, on page 294
Using Virtual IP Addressing With HA, on page 288
Before You Begin Setting Up High Availability, on page 298
What Happens During HA Registration, on page 304
Set Up High Availability, on page 297
Check Readiness for HA Registration/Configuration, on page 301
Step 1 Log in to Prime Infrastructure with a user ID and password that has administrator privileges.
Step 2 From the menu, select Administration > Settings > High Availability. Prime Infrastructure displays the HA status page.
Step 3 Select HA Configuration.
Step 4 Provide the secondary server IP address in the Secondary Server field and secondary Authentication Key Authentication
Key field .
Step 5 Click Check Readiness.
A pop up window with the system specifications and other parameters will be displayed. The screen will show the
Checklist Item name, Status, Impact and Recommendation details.
Below, is the list of checklist test name and the description displayed for Check Readiness:
SYSTEM - Check CPU Count This validates the CPU count in primary and secondary
server.
The CPU count in primary server can be less than or equal
to the secondary server.
DATABASE - LISTENER STATUS This checks if the database listeners are up and running in
both primary and secondary server.
If there is a failure, the test will restart and report the status.
This checks if all the wcs instances exist under oracle
"listener.ora" file. This is executed in both primary and
secondary server.
DATABASE - CHECK MEMORY TARGET This checks for "/dev/shm" database memory target size
for HA setup.
DATABASE - CHECK LISTENER CONFIG This checks for all the database instances exist under
CORRUPTION database listener configuration.
This is executed in both primary and secondary server.
SYSTEM - HEALTH MONITOR STATUS This checks whether the health monitor process is running
in both primary and secondary server.
SYSTEM - CHECK DISK IOPS This validates the disk IOPS in both primary and secondary
server.
The minimum expected disk IOPS is 200 MBps.
NETWORK - CHECK FIREWALL FOR DATABASE This checks if the database port 1522 is open in the system
PORT ACCESSIBILITY firewall.
If the port is disabled, the test will grant permission for 1522
in the iptables list.
NETWORK - CHECK NETWORK INTERFACE This checks if the eth0 interface speed matches the
BANDWIDTH recommended speed of 100 Mbps in both primary and
secondary sever.
This test will not measure network bandwidth by
transmitting data between primary and secondary server.
NETWORK - CHECK NETWORK BANDWIDTH SPEED This checks if the network bandwidth speed matches the
recommended speed of 100 Mbps in both primary and
secondary sever.
This test will measure network bandwidth by transmitting
data between primary and secondary server.
DATABASE - CHECK ONLINE STATUS This checks if the database files status is online and
accessible in both primary and secondary server.
DATABASE - CHECK TNS CONFIG CORRUPTION This validates if the tnsping is successful in both primary
and secondary server.
DATABASE - TNS REACHABILITY STATUS This checks if all the wcs instances exist under oracle
"listener.ora" file.
This is executable in both primary and secondary server.
DATABASE - VALIDATE STANDBY DATABASE This validates if the standby database instance (stbywcs) is
INSTANCE available in both primary and secondary server.
SYSTEM - CHECK RAM SIZE This checks if the disk size of primary server less than or
equal to secondary server.
SYSTEM - CHECK SERVER PING REACHABILITY This ensures that the primary server can run ping check
with the remote (secondary) server.
Step 6 Once the check is completed for all the parameters, check their status and click Clear to close the window.
Note The validation failback and failover events during Check Readiness will be sent to the Alarms and Events page;
whereas, the registration failure event will not be present in the Alarms and Evens page.
Step 1 Open a CLI session with the Prime Infrastructure server (see How to Connect Via CLI, on page 125).
Step 2 Enter the following command to display the current status of Prime Infrastructure HA processes:
PIServer/admin# ncs ha status
Related Topics
Set Up High Availability, on page 297
You can view these state changes on the HA Status page for the primary server, or the Health Monitor web
pages for either of the two servers. If you are using the HA Status page, click Refresh to view progress. Once
the data is fully synchronized, the HA Status page will be updated to show the current state as “Primary
Active”, as shown in the following figure.
After registration is initiated, Prime Infrastructure initiates synchronization between the primary and the
secondary HA servers. The synchronization should not have any impact on user activity, although users may
observe slow system response until the synchronization is complete. The length of the synchronization is a
function of the total database size and, is handled at the Oracle database level by the Oracle RMAN and Data
Guard Broker processes. There is no impact on the execution of user- or system-related activity during the
sync.
During registration, Prime Infrastructure performs a full database replication to the secondary server. All
processes on the secondary server will be running, but the server itself will be in passive mode. If you execute
the Prime Infrastructure CLI command ncs status on the secondary server while the secondary server is in
the “Secondary Syncing” state, the command output will show all processes as running.
Related Topics
How High Availability Works, on page 283
Planning HA Deployments, on page 291
f) When the upload is complete: On the Software Upload page, verify that the Name, Published Date and Description
of the patch file are correct.
g) Select the patch file and click Install.
h) Click Yes in the warning pop-up. When the installation is complete, the server will restart automatically. The restart
typically takes 15 to 20 minutes.
i) After the installation is complete on the primary server, verify that the Status of Updates table on the Software Update
page shows “Installed” for the patch.
Step 2 Install the same patch on the secondary server:
a) Access the secondary server’s Health Monitor (HM) web page by pointing your browser to the following URL:
https://ServerIP:8082
where ServerIP is the IP address or host name of the secondary server.
Note You will be prompted for the username and authentication key. Enter the username as 'root' and authkey
and click Login.
Note Verify that the secondary server state displayed on the HM web page is in the Secondary Syncing state.
b) You will be prompted for the username and authentication key. Enter the username as 'root' and authkey and click
Login.
c) Click the HM web page’s Software Update link. You will be prompted for the authentication key a second time.
Enter it and click Login again.
d) Click the Upload link at the top of the page.
e) Use one of the following options to upload the UBF file.
1. Upload from local computer
• Click the Upload from local computer radio button in the Upload Update window.
• Click Browse, navigate to the file, and click OK. After the successful upload, the software will appear under
the Files tab.
f) When the upload is complete: On the Software Upload page, confirm that the Name, Published Date and Description
of the patch file are correct.
g) Select the patch file and click Install.
h) Click Yes in the warning pop-up. When the installation is complete, the server will restart automatically. The restart
typically takes 15 to 20 minutes.
i) After the installation is complete on the secondary server, verify that the Status of Updates table on the Software
Update page shows “Installed” for the patch.
Step 3 Verify that the patch status is the same on both servers, as follows:
a) Log in to the primary server and access its Software Update page as you did in step 1, above. The “Status” column
should show “Installed” for the installed patch.
b) Access the secondary server’s Health Monitor page as you did in step 2, above. The “Status” column should show
“Installed” for the installed patch
Step 4 Register the servers.
For more information, see "Software patches listing for Cisco Prime Infrastructure", "Restart Prime Infrastructure Using
CLI" and "Check Prime Infrastructure Server Status".
Related Topics
Set Up High Availability, on page 297
How to Register HA on the Primary Server, on page 299
How to Patch HA Servers, on page 305
Note You will be prompted for the username and authentication key Entered when HA was enabled. provie the
username as 'root' and authentication key and click Login.
Step 1 Ensure that your HA implementation is enabled and ready for update:
a) Log in to the primary server using an ID with Administrator privileges.
b) Select Administration > Settings > High Availability, The primary server state displayed on the HA Status page
should be “Primary Active”.
c) Select HA Configuration. The current Configuration Mode should show “HA Enabled”. We recommend that you
set the Failover Type to “manual” during the patch installation.
d) Access the secondary server’s Health Monitor (HM) web page by pointing your browser to the following URL:
https://ServerIP:8082
where ServerIP is the IP address or host name of the secondary server.
e) Verify that the secondary server state displayed on the HM web page is in the “Secondary Syncing” state.
Step 2 You will be prompted for the user name and authentication key entered when HA was enabled. Enter username as 'root'
with authentication key and click Login.
Step 3 Download the UBF patch and install it on the primary server:
a) Point your browser to the software patches listing for Cisco Prime Infrastructure (see Related Topics) .
b) Click the Download button for the patch file you need to install (the file name ends with a UBF file extension), and
save the file locally.
c) Log in to the primary server using an ID with administrator privileges and choose Administration > Licenses and
Software Updates > Software Update.
d) Click the Upload link at the top of the page .
e) Use one of the following options to upload the UBF file.
1. Upload from local computer
• Click the Upload from local computer radio button in the Upload Update window.
• Click Browse, navigate to the file, and click OK. After the successful upload, the software will appear under
the Files tab.
f) When the upload is complete: On the Software Upload page, verify that the Name, Published Date and Description
of the patch file are correct.
g) Select the patch file and click Install.
h) Click Yes in the warning pop-up. When the installation is complete, the server will restart automatically. The restart
typically takes 15 to 20 minutes.
i) After the server restart is complete on the primary server, select Administration > Settings > High Availability,
The primary server state displayed on the HA Status page should be “Primary Active”.
j) Verify that the Status of Updates table on the Software Update page shows “Installed” for the patch.
Step 4 Install the same patch on the secondary server once patching is complete on the primary server:
a) Access the secondary server’s HM web page and login if needed.
b) Click the HM web page’s Software Update link. You will be prompted for the authentication key a second time.
Enter it and click Login again.
c) Click the Upload link at the top of the page.
d) Use one of the following options to upload the UBF file.
1. Upload from local computer
• Click the Upload from local computer radio button in the Upload Update window.
• Click Browse, navigate to the file, and click OK. After the successful upload, the software will appear under
the Files tab.
e) When the upload is complete: On the Software Upload page, confirm that the Name, Published Date and Description
of the patch file are correct.
f) Select the patch file and click Install.
g) Click Yes in the warning pop-up. When the installation is complete, the server will restart automatically. The restart
typically takes 15 to 20 minutes.
h) After the server restart is complete on the secondary server, log in to the secondary HM page (https://serverIP:8082)
and verify that the secondary server state displayed on the HM web page is “Secondary Syncing”.
i) Verify that the Status of Updates table on the Software Update page shows “Installed” for the patch.
Step 5 Once the server restart is complete, verify the patch installation as follows:
a) Log in to the primary server and access its Software Update page as you did in step 2, above. The “Status” column
on the Status of Updates > Update tab should show “Installed” for the patch.
b) Access the secondary server’s Software Update page as you did in step 3, above. The “Status” column on the Status
of Updates > Updates tab should show “Installed” for the patch.
For more information, see
• Software patches listing for Cisco Prime Infrastructure.
• Start Prime Infrastructure, on page 126
• Stop Prime Infrastructure, on page 127
• Check Prime Infrastructure Server Status, on page 126
Related Topics
Set Up High Availability, on page 297
Step 1 Ensure that your HA implementation is enabled and ready for update:
a) Log in to the primary server using an ID with Administrator privileges.
b) Select Administration > Settings > High Availability, The primary server state displayed on the HA Status page
should be “Primary Active”.
c) Select HA Configuration. The current Configuration Mode should show “HA Enabled”.
d) Access the secondary server’s Health Monitor (HM) web page by pointing your browser to the following URL:
https://ServerIP:8082
where ServerIP is the IP address or host name of the secondary server.
e) You will be prompted for the user name and authentication key entered when HA was enabled. Enter username as
'root' with authentication key and click Login.
f) Verify that the secondary server state displayed on the HM web page is in the “Secondary Syncing” state.
Step 2 Download the UBF patch and install it on the primary server:
a) Point your browser to the software patches listing for Cisco Prime Infrastructure (see Related Topics) .
b) Click the Download button for the patch file you need to install (the file name ends with a UBF file extension), and
save the file locally.
c) Log in to the primary server using an ID with administrator privileges and choose Administration > Licenses and
Software Updates > Software Update.
d) Click the upload link at the top of the page and browse to the location where you saved the patch file.
e) Select the UBF file and then click OK to upload the file.
f) When the upload is complete: On the Software Upload page, verify that the Name, Published Date and Description
of the patch file are correct.
Related Topics
Set Up High Availability, on page 297
Check High Availability Status, on page 303
Remove HA Via the GUI, on page 328
How to Patch New HA Servers, on page 305
How to Patch Paired HA Servers Set for Manual Failover, on page 307
Note You will be prompted for the username and authentication key .Enter the username as 'root' and authentication
key and click Login.
You can also access the Health Monitor web page for the currently active server by logging in to Prime
Infrastructure, selecting Administration > Settings > High Availability, and then clicking the Launch
Health Monitor link at the top right of the HA Status page.
Related Topics
Monitor High Availability, on page 312
How to Trigger Failover, on page 313
How to Trigger Failback, on page 313
Force Failover, on page 314
Step 1 Access the secondary server's Health Monitor web page using the web link given in the email notification, or using the
steps in “Accessing the Health Monitor Web Page”.
Step 2 Trigger the failover by clicking the Failover button.
Related Topics
How High Availability Works, on page 283
How to Trigger Failback, on page 313
Monitor High Availability, on page 312
How to Register HA on the Primary Server, on page 299
Access the Health Monitor Web Page, on page 312
Step 1 Access the secondary server's Health Monitor web page using the link given in the email notification, or using the steps
in “Accessing the Health Monitor Web Page”.
Step 2 Trigger the failback by clicking the Failback button.
The secondary server is automatically restarted in the standby mode after the failback and is automatically synced with
the primary server. The primary server will now be the available Prime Infrastructure server.
Related Topics
How High Availability Works, on page 283
How to Trigger Failover, on page 313
Force Failover, on page 314
Monitor High Availability, on page 312
Access the Health Monitor Web Page, on page 312
Force Failover
A forced failover is the process of making the secondary server active while the primary server is still up.
You will want to use this option when, for example, you want to test that your HA setup is fully functional.
Forced failover is available to you only when the primary is active, the secondary is in the “Secondary syncing”
state, and all processes are running on both servers. Forced failover is disabled when the primary server is
down. In this case, only the normal Failover is enabled.
Once the forced failover completes, the secondary server will be active and the primary will restart in standby
automatically. You can return to an active primary server and standby secondary server by triggering a normal
failback.
Step 1 Access the secondary server's Health Monitor web page using the steps in “Accessing the Health Monitor Web Page”.
Step 2 Trigger the forced failover by clicking the Force Failover button. The forced failover will complete in 2 to 3 minutes.
Related Topics
How High Availability Works, on page 283
How to Trigger Failover, on page 313
How to Trigger Failback, on page 313
Monitor High Availability, on page 312
How to Register HA on the Primary Server, on page 299
Access the Health Monitor Web Page, on page 312
Related Topics
HA Registration Fails, on page 315
Network is Down (Automatic Failover), on page 315
Network is Down (Manual Failover), on page 316
Process Restart Fails (Manual Failover), on page 319
Primary Server Restarts During Sync (Manual Failover), on page 320
Secondary Server Restarts During Sync, on page 320
Both HA Servers Are Down, on page 320
Both HA Servers Are Down and the Secondary Will Not Restart, on page 322
Replace Primary MSEs, on page 348
How to Recover From Split-Brain Scenario, on page 323
HA Registration Fails
If HA registration fails, you will see the following HA state-change transitions for each server (instead of
those detailed in “What Happens During HA Registration”:
Step 1 Use ping and other tools to check the network connection between the two Prime Infrastructure servers. Confirm that the
secondary server is reachable from the primary, and vice versa.
Step 2 Check that the gateway, subnet mask, virtual IP address (if configured), server hostname, DNS, NTP settings are all
correct.
Step 3 Check that the configured DNS and NTP servers are reachable from the primary and secondary servers, and that both
are responding without latency or other network-specific issues.
Step 4 Check that all Prime Infrastructure licenses are correctly configured.
Step 5 Once you have remedied any connectivity or setting issues, try the steps in “How to Register High Availability on the
Primary Server” again in related topics.
Related Topics
Respond to Other HA Events, on page 314
What Happens During HA Registration, on page 304
How to Register HA on the Primary Server, on page 299
Step 1 Check on and restore network connectivity between the two servers. Once network connectivity is restored and the primary
server can detect that the secondary is active, all services on the primary will be restarted and made passive automatically.
You will see the following state changes:
Step 2 Trigger a failback from the secondary to the primary. You will then see the following state transitions:
Related Topics
Respond to Other HA Events, on page 314
How to Trigger Failback, on page 313
You will get email notifications that each server has lost the other.
Step 1 Check on and, if needed, restore the network connectivity between the two servers.
You will see the following state changes once network connectivity is restored.:
Step 2 If network connection cannot be restored for any reason, use the HM web page for the secondary server to trigger a
failover from the primary to the secondary server. You will see the following state changes:
You will get an email notification that the secondary server is now active.
Step 3 Check and restore network connectivity between the two servers. Once network connectivity is restored and the primary
server detects that the secondary server is active, all services on the primary server will be restarted and made passive.
You will see the following state changes:
Related Topics
Respond to Other HA Events, on page 314
How to Trigger Failback, on page 313
When this process is complete, you will get an email notification that the secondary server is now active.
Step 1 Restart the primary server and ensure that it is running. Once the primary is restarted, it will be in the state “Primary
Syncing”. You will see the following state transitions:
Step 2 Trigger a failback from the secondary to the primary. You will then see the following state transitions:
Related Topics
Respond to Other HA Events, on page 314
How to Trigger Failback, on page 313
Step 1 Trigger on the secondary server a failover from the primary to the secondary. You will then see the following state
transitions:
Step 2 Restart the primary server and ensure that it is running. Once the primary server is restarted, the primary’s HA state will
be “Primary Syncing”. You will see the following state transitions:
Step 3 Trigger a failback from the secondary to the primary. You will then see the following state transitions:
Related Topics
Respond to Other HA Events, on page 314
The “Primary Alone” and “Primary Active” states occur immediately after the primary comes back online.
No administrator response should be required.
Related Topics
Respond to Other HA Events, on page 314
Step 1 Restart the secondary server and the instance of Prime Infrastructure running on it. If for some reason you cannot restart
the secondary server, see “Both HA Servers Are Down and Secondary Will Not Restart” in Related Topics.
Step 2 When Prime Infrastructure is running on the secondary, access the secondary server’s Health Monitor web page. You
will see the secondary server transition to the state “Secondary Lost Primary”.
Step 3 Restart the primary server and the instance of Prime Infrastructure running on it. When Prime Infrastructure is running
on the primary, the primary will automatically sync with the secondary. To verify this, access the primary server’s Health
Monitor web page. You will see the two servers transition through the following series of HA states:
Related Topics
Both HA Servers Are Down and the Secondary Will Not Restart, on page 322
Access the Health Monitor Web Page, on page 312
Respond to Other HA Events, on page 314
Step 1 Power on the secondary server and the instance of Prime Infrastructure running on it.
The secondary HA restart will fail at this stage because the primary is not reachable. However, the secondary Health
Monitor process will be running with an error.
Step 2 When Prime Infrastructure is running on the secondary, access the secondary server’s Health Monitor web page. You
will see the secondary server transition to the state “Secondary Lost Primary”.
Step 3 Power on the primary server and the instance of Prime Infrastructure running on it.
Step 4 When Prime Infrastructure is running on the primary, the primary will automatically sync with the secondary. To verify
this, access the primary server’s Health Monitor web page. You will see the two servers transition through the following
series of HA states:
Step 5 Restart the secondary server and the instance of Prime Infrastructure running on it. This is required because not all
processes will be running on the secondary at this point.
If for some reason you cannot restart the secondary server, see “Both HA Servers Are Down and Secondary Will Not
Restart” in Related Topics.
Step 6 When Prime Infrastructure finishes restarting on the secondary server, all processes should be running. Verify this by
running the ncs status command (see “Check Prime Infrastructure Server Status” in Related Topics).
Related Topics
Both HA Servers Are Down and the Secondary Will Not Restart, on page 322
Both HA Servers Are Down and the Secondary Will Not Restart
If both HA servers are down at the same time and the secondary will not restart, you will need to remove the
HA configuration from the primary server in order to use it as a standalone until you can replace or restore
the secondary server.
The following steps assume that you have already tried and failed to restart the secondary server.
Step 1 Attempt to restart the primary instance of Prime Infrastructure. If the primary is able to restart at all, the restart will abort
with an error message indicating that you must remove the HA configuration.
Step 2 Open a CLI session with the primary Prime Infrastructure server (see How to Connect Via CLI, on page 125).
Step 3 Enter the following command to remove the HA configuration on the primary server:
PIServer/admin# ncs ha remove
Step 4 You will be prompted to confirm that you want to remove the HA configuration. Answer Y to the prompt.
You should now be able to restart the primary instance of Prime Infrastructure without the error message and use it as a
standalone.
When you are able to restore or replace the secondary server, proceed as explained in “How to Register High Availability
on the Primary Server” in Related Topics.
Related Topics
Access the Health Monitor Web Page, on page 312
How to Register HA on the Primary Server, on page 299
Remove HA Via the CLI, on page 329
Respond to Other HA Events, on page 314
Step 1 Ensure that the secondary server is currently in “Secondary Active” state. If you have set the Failover Type on the primary
server to “manual”, you will need to trigger the failover to the secondary manually.
Step 2 Ensure that the old primary server you are replacing has been disconnected from the network.
Step 3 Ensure that the new primary server is ready for use. This will include connecting it to the network and assigning it the
same server IP, subnet mask, gateway as the old primary server. You will also need to enter the same authentication key
that you entered when installing the secondary server.
Step 4 Ensure that both the primary and secondary servers are at the same patch level and if you want to replace the primary
server, then you must :
a) Ensure the primary and secondary server are in TOFU Mode.
b) Login to Secondary server admin CLI.
c) Execute the following command in the secondary server CLI:
d) PIServer/admin# ncs certvalidation tofu-certs deletecert host <primaryserver's-hostname>
This is required to re-establish the communication between the Primary and Secondary servers.
Step 5 Trigger a failback from the secondary to the newly installed primary. During failback to the new primary HA server, a
full database copy will be performed, so this operation will take time to complete depending on the available bandwidth
and network latency (see “Network Throughput Restrictions on HA” in Related Topics). You will see the two servers
transition through the following series of HA states:
Related Topics
How to Trigger Failover, on page 313
How to Trigger Failback, on page 313
Respond to Other HA Events, on page 314
Network Throughput Restrictions on HA, on page 291
Step 1 Once the network is up, and the secondary server is up, the primary will restart itself automatically, using its standby
database. The HA status of the primary server will be, first, “Primary Failover” transitioning to “Primary Synching”. You
can verify this by logging on to the primary server’s Health Monitor web page.
Step 2 Once the primary server’s status is “Primary Syncing, confirm that a user can log into the secondary server’s Prime
Infrastructure page using the web browser (for example, https://x.x.x.x:443). Do not proceed until you have verified this.
Step 3 Once access to the secondary is verified, initiate a failback from the secondary server's Health Monitor web page (see
How to Trigger Failback, on page 313 ). You can continue to perform monitoring activities on the secondary server until
the switchover to the primary is completed.
For more information, see Restart Prime Infrastructure Using CLI, on page 127.
Related Topics
Automatic Versus Manual Failover, on page 294
Remove HA Via the CLI, on page 329
How to Register HA on the Primary Server, on page 299
Step 1 Remove HA, see Remove HA Via the CLI, on page 329 and Remove HA Via the GUI, on page 328.
Step 2 After both the primary and secondary servers reaches "HA not configured" state, perform the HA registration. See Set
Up High Availability, on page 297
Mode Description
HA initializing The HA registration process between the primary and secondary server has started.
Mode Description
HA alone Primary server is now running alone. HA is enabled, but the primary server is out of sync with the secondary,
or the secondary is down or otherwise unreachable.
Related Topics
High Availability Reference Information, on page 324
HA State Reference
The following table lists all possible HA states, including those that require no response from you.
Primary Alone Primary Primary restarted after it lost secondary. Only Health Monitor is running in this state.
HA Initializing Both HA Registration process between the primary and secondary server has started.
Primary Active Primary Primary server is now active and is synchronizing with secondary server.
Primary Database Copy Failed Primary Primary servers being restarted will always check to see if a data gap has occurred due
to the primary being down for 24 hours or more. If it detects such a gap, it will
automatically trigger a data copy from the active secondary server. In rare cases, this
database copy can fail, in which case this transition state is set on the primary. All
attempts to failback to the primary are blocked until the database copy completes
successfully. As soon as it does, the primary state is set to “Primary Syncing”.
Primary Lost Secondary Primary Primary server is unable to communicate with the secondary server.
Primary Preparing for Failback Primary This state will be set on primary server startup after a failover to the secondary. This
state signifies that the primary server has started up in standby mode (because the
secondary server is still active) and is ready for failback. Once the primary server is
ready for failback, its state will be set to “Primary Syncing”.
Primary Syncing Primary Primary server is synchronizing the database and configuration files from the active
secondary. Primary gets into this state when primary processes are brought up after
failover to secondary and secondary is playing the active role.
Primary Uncertain Primary Primary server's application processes are not able to connect to its database.
Secondary Alone Secondary Primary server is not reachable from secondary after primary server restart.
Secondary Syncing Secondary Secondary server is synchronizing the database and configuration files from the primary.
Secondary Active Secondary Failover from the primary server to the secondary server has completed successfully.
Secondary Lost Primary Secondary Secondary server is not able to connect to the primary server (occurs when the primary
fails or network connectivity is lost).
In case of automatic failover from this state, the secondary will automatically move to
Active state. In case of a manual failover, the user can trigger a failover to make the
secondary active.
Secondary Failback Secondary Failback triggered and in progress (database and file replication is in progress).
Secondary Post Failback Secondary This state occurs after failback is triggered, replication of database and configuration
files from the secondary to the primary is complete, and Health Monitor has initiated
changes of the secondary server's status to Secondary Syncing and the primary server's
status to Primary Active. These status changes and associated process starts and stops
are in progress.
Secondary Uncertain Secondary Secondary server's application processes are not able to connect to secondary server's
database.
Related Topics
High Availability Reference Information, on page 324
The following figure details all possible state transitions for the secondary server.
Related Topics
High Availability Reference Information, on page 324
Command Description
ncs ha authkey authkey Update the authentication key for high availability
Related Topics
High Availability Reference Information, on page 324
Step 1 Connect to the primary server via CLI. Do not enter “configure terminal” mode.
Step 2 Enter the following at the command line:
admin# ncs ha authkey MyNewAuthKey
Where MyNewAuthKey is the new authorization key. For more information, see How to Connect Via CLI, on page 125.
Related Topics
Before You Begin Setting Up High Availability, on page 298
High Availability Reference Information, on page 324
Step 1 Log in to the primary Prime Infrastructure server with a user ID that has administrator privileges.
Step 2 Select Administration > Settings > High Availability > HA Configuration.
Related Topics
Remove HA Via the CLI, on page 329
How to Trigger Failback, on page 313
High Availability Reference Information, on page 324
Step 1 Connect to the primary server via CLI. Do not enter “configure terminal” mode.
Step 2 Enter the following at the command line:
admin# ncs ha remove. For more information, see How to Connect Via CLI, on page 125.
Related Topics
Remove HA Via the GUI, on page 328
How to Trigger Failback, on page 313
High Availability Reference Information, on page 324
Step 1 Use the GUI to remove the HA settings from the primary server (see “Remove HA Via the GUI” in Related Topics).
Step 2 Restore the primary server as needed.
Step 3 Once the restore is complete, perform the HA registration process again.
For more information, see Restore Prime Infrastructure Data, on page 59 and How to Connect Via CLI, on page 125.
Related Topics
Remove HA Via the GUI, on page 328
How to Register HA on the Primary Server, on page 299
High Availability Reference Information, on page 324
Step 1 Use the GUI to remove the HA settings from the primary server (see “Remove HA Via the GUI” in Related Topics,
below).
Step 2 Upgrade the primary server as needed.
Step 3 Re-install the secondary server using the current image.
Note that upgrading the secondary server from the previous version or a beta version is not supported. The secondary
server must always be a fresh installation.
Step 4 Once the upgrade is complete, perform the HA registration process again.
Note After upgrade, health montior page will display the below health monitor event message:
Primary Authentication Key was changed by Admin
For more information, see How to Connect Via CLI, on page 125.
Related Topics
Remove HA Via the GUI, on page 328
How to Register HA on the Primary Server, on page 299
High Availability Reference Information, on page 324
Step 1 View the Health Monitor page for the server having trouble.
Step 2 In the Logging area, in the Message Level dropdown, select the error-logging level you want.
Step 3 Click Save.
Step 4 When you want to download the log files: In the Logs area, click Download. You can open the downloaded log files
using any ASCII text editor.
Related Topics
Access the Health Monitor Web Page, on page 312
High Availability Reference Information, on page 324
• Every active primary MSE is backed up by another inactive instance. The purpose of the secondary MSE
is to monitor the availability and state of the primary MSE. The secondary MSE becomes active only
after the failover procedure is initiated.
• One secondary MSE can support one primary MSE.
The MSEs, Synchronize Services, Synchronization History, High Availability, Context Aware Notifications,
and Mobile Concierge pages on the Services tab are available only in the virtual domain in Release 7.3.
The following related topics provide additional details on the MSE high availability architecture.
Related Topics
MSE High Availability Pairing Matrix, on page 332
Guidelines and Limitations for MSE High Availability, on page 332
Failover Scenario for MSE High Availability, on page 333
Failback Scenario for MSE High Availability, on page 333
Licensing Requirements for MSE High Availability, on page 334
Configure MSE High Availability , on page 331
3355 Y N N N N
VA-2 N Y Y Y Y
VA-3 N N Y Y Y
VA-4 N N N Y Y
VA-5 N N N N Y
Related Topics
Using the Remote Model, on page 293
Guidelines and Limitations for MSE High Availability, on page 332
takes to restore the failed MSE, the longer you are running with a single MSE without high availability
support.
• You can use either manual or automatic failback.
• Both the primary and secondary MSE should be running the same software version.
• High Availability over WAN is not supported.
• High Availability over LAN is supported only when both the primary and secondary MSEs are in the
same subnet.
• The ports over which the primary and secondary MSEs communicate must be open (not blocked with
network firewalls, application fireways, gateways, and so on). The following input/output ports should
be opened: 80, 443, 8080, 8081, 22, 8001, 1521, 1411, 1522, 1523, 1524, 1525, 9006, 15080, 61617,
59000, 12091, 1621, 1622, 1623, 1624, 1625, 8083, 8084, and 8402.
Related Topics
Overview of the MSE High Availability Architecture, on page 331
MSE High Availability Pairing Matrix, on page 332
Failover Scenario for MSE High Availability, on page 333
Step 1 Ensure that the network connectivity between the primary and secondary MSEs is functioning and that all the necessary
ports are open.
Step 2 Install the correct version of MSE on the primary MSE.
Step 3 Make sure that the same MSE version is installed on the secondary MSE.
Related Topics
Replace Primary MSEs, on page 348
Configure MSE High Availability , on page 331
Note that the default gateway must be reachable from the first Ethernet interface.
Enter default gateway address [172.20.104.123]:
And, now you want to restore the configuration from Secondary via Cisco Prime Infrastructure
Do you wish to start this MSE in HA receovery mode?: (yes/no} [no]:no
Current IP address = [1.1.1.10]
Current eth0 netmask=[255.255.255.0]
Current gateway address=[1.1.1.1]
Configure eth0 interface parameters? (Y)es/(S)kip/(U)se default [Skip]:
Enter an IP address for first Ethernet interface of this machine.
Enter eth0 IP address [1.1.1.10]: 10.10.10.12
Enter the network mask for IP address 10.10.10.12
Enter network mask [255.255.255.0]: 255.255.255.0
Enter an default gateway address for this machine.
Note that the default gateway must be reachable from the first Ethernet interface. Enter default gateway address
[1.1.1.1]:10.10.10.1
The second Ethernet interface is currently disabled for this machine.
Configure eth1 interface parameters? (Y)es/(S)kip/(U)se default [Yes]: S
Time zone=America/Los_Angeles
Enable DNS=yes, DNS servers=8.8.8.8
Enable NTP=yes, NTP servers=time.nist.gov
Time zone=America/Los_Angeles
Root password is changed.
Cisco Prime Infrastructure password is changed.
------------------------------END-----------------------------
You may enter "yes" to proceed with configuration, "no" to make
more changes.
Configuration Changed
Is the above information correct (yes or no): yes
--------------------------------------------------------------
Checking mandatory configuration information...
Root password: Not configured
**WARNING**
The above parameters are mandatory and need to be configured.
-------------------------------------------------------------
Ignore and proceed (yes/no): yes
Setup will now attempt to apply the configuration. Restarting network services with new settings. Shutting down
interface eth0:
The system is minimally configured right now. It is strongly recommended that you run the setup script under
/opt/mse/setup/setup.sh command to configure all appliance related parameters immediately after installation is complete.
PRESS <ENTER> TO EXIT THE INSTALLER:
Database started successfully. STarting framework and services....... Framework and services successfully started
Step 14 After all services have started, confirm MSE services are working properly by entering the following command:
[root@mse1]# getserverinfo
Related Topics
Prepare the MSEs for High Availability, on page 334
Configure MSE High Availability on Secondary MSEs, on page 343
Configure MSE High Availability , on page 331
Direct connect configuration facilitates use of a direct cable connection between the primary and secondary MSE
servers.This can help reduce latencies in heartbeat response times, data replication and failure detection times.Please
choose a network interface that you wish to use for direct connect. You should appropriately configure the respective
interfaces.
"none" implies you do not wish to use direct connect configuration.
-------------------------------------------------------------------
Select direct connect interface [eth0/eth1/none] [none]:
Current IP address=[1.1.1.10]
Current eth0 netmask=[255.255.255.0] Current gateway address=[1.1.1.1]
Configure eth0 interface parameters? (Y)es/(S)kip/(U)se default [Yes]:
Enter an IP address for first Ethernet interface of this machine. Enter eth0 IP address [1.1.1.10]: 10.10.10.13
Enter the network mask for IP address 10.10.10.13
Enter network mask [255.255.255.0]:
Enter an default gateway address for this machine.
Note that the default gateway must be reachable from the first Ethernet interface. Enter default gateway address
[1.1.1.1]:10.10.10.1
The second Ethernet interface is currently disabled for this machine. Configure eth1 interface parameters? (Y)es/(S)kip/(U)se
default [Yes]: S
Restarting network services with new settings. Shutting down interface eth0:
The system is minimally configured right now. It is strongly recommended that you run the setup script under
/opt/mse/setup/setup.sh command to configure all appliance related parameters immediately after installation is complete.
PRESS <ENTER> TO EXIT THE INSTALLER:
Related Topics
Prepare the MSEs for High Availability, on page 334
Configure MSE High Availability on Primary MSEs, on page 335
Configure MSE High Availability , on page 331
A new license is required on the this new primary MSE, as the original license will not match the UDI of the primary,
and will not work.
Related Topics
Configure MSE High Availability on Primary MSEs, on page 335
Configure MSE High Availability , on page 331
• The primary and secondary controllers must be of the same hardware model.
• The primary and secondary controllers must be running the same Controller software release.
• The IP addresses of the management, redundancy management, and peer redundancy management
interfaces must be in the same subnet.
• The service port IP address and route information is maintained for each device.
• If the redundancy is enabled on a controller, the Prime Infrastructure or any other device cannot manage
the standby controller.
• You cannot enable the redundancy on a controller if the controller is added to the Prime Infrastructure
through the service port. You must delete the controller and add it through the management interface to
enable the redundancy on that controller.
• When there is an audit mismatch between a controller and the Prime Infrastructure, you must not restore
the redundancy parameters from the Prime Infrastructure on to the controller. However, you can refresh
the redundancy parameters in the Prime Infrastructure.
• Before you enable the redundancy, you must download the certificates for each device.
• Configuration is downloaded from the network to the active controller, and then the details are transferred
to the standby controller through the redundancy interface.
• When an old active controller pairs up with the new active controller, the control is not transferred back
to the old active controller and it becomes the standby controller for the new active controller.
Step 3 Select the group of wireless controllers that match the device for which you have configured the redundancy-management
interface IP address (for example: Cisco 5500 Series Wireless LAN Controllers). Members of this device group are
displayed on the right.
Step 4 Click on the Device Name of the controller for which you have configured the redundancy-management interface IP
address.
Step 5 Click the Configuration tab.
Step 6 From the left sidebar menu, choose Redundancy > Global Configuration. The Global Configuration page appears.
Step 7 You must configure the following parameters before you enable the redundancy mode for the primary controller:
a. Redundancy-Management IP—The IP address of the local physical management interface, which you had configured
in the redundancy-management interface details page is displayed. You can also modify the IP address.
b. Peer Redundancy-Management IP—Enter the IP address of the peer redundancy-management interface.
c. Redundant Unit—Choose Primary.
d. Mobility MAC Address—Enter the virtual MAC address for the redundancy pair. Ensure that the mobility MAC
address that you enter is the same for both primary and secondary controllers.
Step 8 Click Save. The Enabled check box for the redundancy mode becomes available.
Step 9 Select the Enabled check box for the redundancy mode to enable the redundancy on the primary controller.
After you enable the redundancy, you cannot modify the Redundancy-Management IP, Peer Redundancy-Management
IP, Redundant Unit, and Mobility MAC Address parameters.
You cannot configure this controller during the redundancy pair-up process.
Step 10 Click Save. The configuration is saved and the system reboots.
d. Mobility MAC Address—Enter the virtual MAC address of the redundancy pair. Ensure that the mobility MAC
address that you enter is the same for both primary and secondary controllers.
Step 8 Click Save. The Enabled check box for the redundancy mode becomes available for editing.
Step 9 Select the Enabled check box for the redundancy mode to enable the redundancy on the secondary controller.
After you enable the redundancy, you cannot modify the Redundancy-Management IP, Peer Redundancy-Management
IP, Redundant Unit, and Mobility MAC Address parameters.
You cannot configure the primary controller during the redundancy pair-up process.
Step 10 Click Save. The configuration is saved and the system reboots.
Step 6 From the left sidebar menu, choose me Redundancy > Global Configuration. The Global Configuration page appears.
Step 7 Complete the following fields:
a. Peer Service Port IP—Enter the IP address of the peer service port.
b. Peer Service Netmask IP—Enter the IP address of the peer service subnet mask.
Step 3 Select the group of wireless controllers that contains the controller for which you have configured the
redundancy-management interface IP address. Members of this device group are displayed on the right.
Step 4 Click on the Device Name of the controller for which you have configured the redundancy-management interface IP
address.
Step 5 Click the Configuration tab.
Step 6 From the left sidebar menu, choose Redundancy > Redundancy Commands.
Step 7 Under Administrative Commands, choose Select a command > Reset Standby > Go to reset the secondary server.
Step 8 Under Upload/Download Commands:
a) Choose the transport protocol you want to use when uploading files from the secondary to the primary server (TFTP
is the default).
b) ChooseSelect a command > Upload File from Standby Controller > Go to upload files from the secondary to the
primary server.
Note The mediatrace feature has been deprecated from the latest IOS releases.
Prime Infrastructure supports tracing Real-Time Transport Protocol (RTP) and TCP application traffic paths
across endpoints and sites. Tracing data paths depends on Cisco Medianet and Web Services Management
Agent (WSMA). Both are built-in features of Cisco IOS software and Catalyst switches that help isolate and
troubleshoot problems with RTP and TCP data streams. Prime Infrastructure supports all versions of Cisco
Medianet and WSMA and makes it easy to enable them on any router.
Where Cisco Network Analysis Module (NAM) traffic monitoring data is not available, Prime Infrastructure
supports RTP service path tracing (Mediatrace) using Cisco Medianet Performance Monitor and Cisco IOS
NetFlow. When properly configured, Mediatrace can be your most valuable tool when troubleshooting RTP
and TCP application problems.
Related Topics
Prerequisites for Traffic Metrics With Mediatrace, on page 357
Configure Mediatrace on Routers and Switches, on page 359
Configure WSMA and HTTP(S) Features on Routers and Switches, on page 359
Step 1 Add NAMs to the system. You can do this either automatically using Discovery, or manually using bulk import or the
Device Work Center (see the section Add and Organize Devices in Cisco Prime Infrastructure User Guide).
Step 2 Enable NAM Data collection. To do this:
a) Choose Services > Application Visibility & Control > Data Sources.
b) In the NAM Data Collector section, select each NAM and click Enable to enable data collection on the selected
NAMs (see the section Enable NAM Data Collection in Cisco Prime Infrastructure User Guide).
Step 3 Create a site structure for your organization and assign your principal routers to the appropriate sites:
a) Choose Maps > Site Maps.
b) Add one or more campuses, buildings, and floors.
Step 4 Associate your sites with authorized data sources:
a) Choose Services > Application Visibility & Control > Data Deduplication.
b) Click Enable Data Deduplication, then click Apply. You can then assign authoritative sources for ART, Traffic
Analysis and Voice/Video data (see Enable Data Deduplication, on page 150).
Step 5 Associate your sites with endpoint subnets:
a) Choose Services > Application Visibility & Control > Endpoint Association.
b) Associate subnets with your sites. (see the section Associate Endpoints with a Site inCisco Prime Infrastructure User
Guide).
If you fail to do this, the data collected for these endpoints will have their sites set to “Unassigned.”
Step 6 Configure your routers for Mediatrace and WSMA (see the section Troubleshoot RTP and TCP Flows Using Mediatrace
in Cisco Prime Infrastructure User Guide).
For more details, see Control System Jobs".
Configure Cisco Prime Infrastructure to Use Routers and Switches as Data Sources
If your network uses Cisco routers and switches to monitor network traffic, complete the following steps to
enable path tracing for both RTP and TCP flows.
Step 1 Create a site structure for your organization and assign your principal routers to the appropriate sites:
a) Choose Maps > Site Maps.
b) Add one or more campuses, buildings, and floors (for details, see the section Work With Site Maps in Cisco Prime
Infrastructure User Guide).
Step 2 Associate your sites with authorized data sources:
a) Choose Services > Application Visibility & Control > Data Deduplication.
b) Click Enable Data Deduplication, then click Apply. You can then assign authoritative sources for ART, Traffic
Analysis and Voice/Video data (see Enable Data Deduplication, on page 150).
Step 3 Associate your sites with endpoint subnets:
a) Choose Services > Application Visibility & Control > Endpoint Association.
b) Associate subnets with your sites. (see the section Associate Endpoints with a Site in Cisco Prime Infrastructure User
Guide).
If you fail to do this, by default the data collected for these endpoints will have their sites set to “Unassigned.”
Step 4 Configure your compatible routers for Cisco Medianet Performance Monitor (see Configure Mediatrace on Routers and
Switches).
Step 5 Configure your routers for Mediatrace and WSMA (see the section Troubleshoot RTP and TCP Flows Using Mediatrace
in Cisco Prime Infrastrucutre User Guide).
Related Topics
Enable Data Deduplication, on page 150
Step 1 Choose Configuration > Templates > Features & Technologies > CLI Templates > System Templates - CLI >
Mediatrace -Responder-Configuration.
Step 2 Enter the required information for the template (see the Field reference for the template).
Step 3 Click Save as New Template and give the new template a name and description. Click Save.
Step 4 Click Deploy to deploy the new template .
For more details, see Enabling NetFlow Data Collection, Field Reference: Mediatrace-Responder-Configuration and
Deploying Templates .
Step 1 Choose Configuration > Templates > Features & Technologies > CLI Templates > System Templates - CLI >
HTTP-HTTPS Server and WSMA Configuration-IOS.
Step 2 Enter the required information for the template (see the Field reference for the template.
Be sure to enable the HTTP protocol. WSMA over HTTPS is not supported in the current version of Prime Infrastructure.
Step 3 Click Save as New Template and give the new template a name and description. Click Save.
Step 4 Click Deploy to deploy the new template.
When adding a device to Prime Infrastructure, you must provide the HTTP user and password for the device.
For more details, see Field Reference: HTTP-HTTPS Server and WSMA Configuration-IOS, Deploying Templates and
Add Devices to Prime Infrastructure .
Related Topics
Configure Mediatrace on Routers and Switches, on page 359
Note To use the features described in this chapter, your Prime Infrastructure implementation must include Assurance
licenses. These features are supported on ASR platforms only.
In the following workflow, we take the role of a network administrator who has just been told that a large
staff expansion is planned for a branch office. This change will add more users to the branch LAN, many of
whom will be using WAN applications. We want to monitor the branch’s key interfaces for usage and traffic
congestion, so we can see if more users on the branch LAN will mean degraded WAN application performance
for those users. To be certain we have an adequate picture, we will need to look at both short- and long-term
performance trends for all the WAN applications the branch uses.
Before You Begin
• Set up the Top N WAN Interfaces by Utilization dashlet:
• Choose Monitor > Monitoring Policies and create an Interface Health template.
• Choose Inventory > Group Management > Port Groups, select the interfaces and click Add to
Group, then select WAN Interfaces as the group.
Step 4 To see the utilization statistics for the past month, click the Clock icon next to the Top N Interface Utilization dashlet
title to change the Time Frame on the Filters line to Past 4 Weeks.
Step 5 In the Top N Interface Utilization dashlet, find the WAN interface for the branch to which you are adding users.
Step 6 In the Interface column, click the interface’s name to display the Dashboard > Performance > Interface page for that
interface. The page shows the following dashlets for this single interface:
• Interface Details
• Interface Tx and Rx Utilization
• Top N Applications
• Top N Clients
• Number of Clients Over Time
• DSCP Classification
• QoS Class Map Statistics
• oS Class Map Statistics Trend
• Top Application Traffic Over Time
Step 7 Concentrate on the Top Application Traffic Over Time dashlet on this page. This dashlet gives a color-coded map of
the top ten applications with the heaviest traffic over this interface.
Step 8 To get a better idea of the longer-term performance trend, click the Clock icon next to the Top Application Traffic Over
Tim dashlet title to change the Time Frame to Past 24 Hours, Past 4 Weeks, or Past 6 Months.
To zoom in on particular spikes in the graph, use the Pan and Zoom handles in the lower graph.
Step 9 For a quick report of the same data as the interface page, choose Reports > Report Launch Pad. Then choose
Performance > Interface Summary. Specify filter and other criteria for the report, select the same interface in Report
Criteria, then click Run.
What to do next
The following table shows the ISP profile used to test against (it is very similar to the Caida.org Internet
profile).
Number of Parallel Active Users 60,000 Derived from the number of flows
Important At any point of time only one version of controller will be active (either 16.12.x or 17.x). By default when
you first install Prime Infrastructure 3.9, support for Catalyst 9800 17.4.x will be active.
Procedure to enable Backward Compatibility between Catalyst 9800 Devices and Prime Infrastructure
3.9
Step 1 Change the Catalyst 9800 version using https://<prime ip>/ncsdiag/coralService.html url.
Step 2 In the Coral Service page, click Change coral to change the current Catalyst 9800 version supported by Prime Infrastructure
3.9.
Example: If the Coral Service page shows the Current Coral verison is "Coral 17", once you click Change Coral you
will be swapped to "Coral 16".
Step 4 When Prime Infrastructure is not on High Availability mode, please skip to Step 5.
Step 5 Restart Prime Infrastructure
Important Restarting the server after toggling the version is essential for the new Catalyst 9800 changes to take effect.
Step 6 Go to the directory /opt/CSCOlumos/coralinstances/coral2/coral/bin to verify if the Catalyst 9800 version has changed
by running the ./coral version 1 commands:
When you have changed to version Catalyst 9800 17.x below will be the expected result:
ade # sudo ./coral version 1
BuildTime: 2020-11-26_22.33
ReleaseDate: Thu-26-Nov-20-17:24
BuildArch: x86_64
Platform: CORAL
Build: 17.04.01
BuildPath: /scratch/mcpre/release/BLD-V17_04_01_FC5/binos
Version: 17.04.01.0.173.1606458801..Bengaluru
InstallVersion: 1.0.0
BootArch: Linux Name Space Container
Host System uptime: 0 days, 1 hours, 5 minutes, 22 seconds [3922.9 sec]
Coral service uptime: 0 days, 0 hours, 16 minutes, 11 seconds [971.38 sec]
ade #
When you have changed to version Catalyst 9800 16.12.x below will be the expected result:
ade # sudo ./coral version 1
BuildTime: 2019-07-30_16.43
ReleaseDate: Tue-30-Jul-19-08:15
BuildArch: x86_64
Platform: CORAL
Build: 16.12.01
BuildPath: /scratch/mcpre/release/BLD-V16_12_01_FC4/binos
Version: 16.12.1.0.544.1564530231..Gibraltar
InstallVersion: 1.0.0
BootArch: Linux Name Space Container
Host System uptime: 4 days, 22 hours, 24 minutes, 7 seconds [426247.80 sec]
ade #
Step 1 Back up your data. See Perform a Manual Backup, on page 57.
Step 2 Download the file to your local machine, then upload it from your local machine to the Prime Infrastructure server.
a) Log into cisco.com and go to the Prime Infrastructure Software Download site.
b) Locate the PI_3_9_Oct_Oracle_patch-1.0.8.ubf file you want to download, and download it to your local machine.
Step 3 Copy the file from your local machine to the Prime Infrastructure server as described in Copy a File from a Client Machine
to the Prime Infrastructure Server, on page 44.
Step 4 Log in to the Prime Infrastructure web GUI as a user with Administrator privileges.
Step 5 Upload the file to the Prime Infrastructure server.
a) Choose Administration > Licenses and Software Updates > Software Update.
b) Click Upload at the top of the page.
c) Use one of the following options to upload the UBF file.
1. Upload from local computer
• Click the Upload from local computer radio button in the Upload Update window.
• Click Browse, navigate to the file, and click OK. After the successful upload, the software will appear under
the Files tab.
Step 6 Select the software update, click Install, and then click Yes in the confirmation pop-up window.
Note If the .ubf file is not signed or has been modified since it was downloaded from Cisco.com, Prime Infrastructure
will abort the installation. Contact your Cisco representative.
Prime Infrastructure will auto-restart and the web GUI will not be accessible for some time. (If it does not, restart it by
following the procedure in Stop and Restart Prime Infrastructure, on page 93.)
Step 7 When the web GUI is accessible, log in and check the version on the Software Update page.
a) Choose Administration > Licenses and Software Updates > Software Update.
During installation, Prime Infrastructure also creates a web root user account, prompting the installer for the
password to be used for this account. The web root account is needed to enable first-time login to the Prime
Infrastructure server and its web user interface. We recommend that you never use this account for normal
operations. Instead, use it to create user IDs with appropriate privileges for day-to-day operations and network
management, and administrative user IDs for managing Prime Infrastructure itself. Once these user accounts
are created, disable the default “web root” account created at install time, and create user accounts using your
administrative user IDs thereafter.
If you forget the shell password, you can recover (and then reset) the shell password by following the steps
to recover the administrator password. See Recovering Administrator Passwords on Virtual Appliances .
Because recovering the administrator password requires the Prime Infrastructure server to reboot, your system
might go down for approximately 20 minutes.
To disable the root accounts:
Step 1 Open a CLI session with the Prime Infrastructure server (seeHow to Connect Via CLI, on page 125 ). Do not enter
“configure terminal” mode.
Step 2 Disable the web root account by entering the following command:
PIServer/admin# ncs webroot disable
Prime Infrastructure disables the web root account.
Step 3 Disable the root shell account by entering the following command at the prompt:
PIServer/admin# shell disable
Prime Infrastructure will prompt you for the root shell account password. Enter it to complete disabling of the root shell
account.
Related Topics
Use SNMPv3 to Import Devices, on page 371
Use SNMPv3 to Run Discovery, on page 371
Use SNMPv3 Instead of SNMPv2, on page 370
Related Topics
Use SNMPv3 to Add Devices, on page 370
Use SNMPv3 to Run Discovery, on page 371
Use SNMPv3 Instead of SNMPv2, on page 370
Step 1 Select Inventory > Device Management > Discovery. The Discovery Jobs page appears.
Step 2 Click the Discovery Settings link in the upper right corner of the page. The Discovery Settings page appears.
Step 3 Choose New to add new SNMP v3 credentials.
Step 4 Complete the fields as needed.
Step 5 Click Save to save the SNMPv3 settings and use them thereafter.
Related Topics
Use SNMPv3 to Add Devices, on page 370
Use SNMPv3 to Import Devices, on page 371
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > Users > Users, Roles & AAA > TACACS+ or Administration > Users > Users, Roles &
AAA > RADIUS.
Step 3 Enter the TACACS+ or RADIUS server IP address and shared secret in the appropriate fields.
Step 4 Select Administration > Users > Users, Roles & AAA > AAA Mode Settings.
Step 5 Set the AAA mode as appropriate.
Related Topics
Authenticate With External AAA, on page 372
Set Up External AAA Via CLI, on page 372
Step 1 Log in to Prime Infrastructure using the command line, as explained in How to Connect Via CLI, on page 125 . Be sure
to enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to setup an external TACACS+ server:
PIServer/admin/terminal# aaa authentication tacacs+ server tacacs-ip key plain shared-secret
Where:
• tacacs-ip is the IP address of an active TACACS+ server.
• shared-secret is the plain-text shared secret for the active TACACS+ server.
Step 3 At the prompt, enter the following command to create a user with administrative authority, who will be authenticated by
the above AAA server:
PIServer/admin/terminal# username username password remote role admin email emailID
Where:
• username is the name of the user ID.
• password is the plain-text password for the user.
• emailID is the email address of the user (optional).
Related Topics
Authenticate With External AAA, on page 372
Set Up External AAA Via GUI, on page 372
Step 1 Log in to Prime Infrastructure using the command line, as explained in How to Connect Via CLI, on page 125 .Be sure
to enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to setup an external NTPv4 server:
PIServer/admin/terminal# ntp server serverIP userID plain password
Where:
• serverIP is the IP address of the authenticating NTPv4 server you want to use.
• userID is the md5 key id of the NTPv4 server.
• password is the corresponding plain-text md5 password for the NTPv4 server.
For example: ntp server 10.81.254.131 20 plain MyPassword
Step 3 To ensure that NTP authentication is working correctly, test it by executing the following commands:
• To check the NTP update details: sh run
• To check NTP sync details: sh ntp
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > Users > Users, Roles & AAA > Local Password Policy.
Step 3 Select the check boxes next to the password policies you want to enforce, including:
• The minimum number of characters passwords must contain.
• No use of the username or “cisco” as a password (or common permutations of these).
• No use of “public” in root passwords.
• No more than three consecutive repetitions of any password character.
• Passwords must contain at least one character from three of the following character classes: upper case, lower case,
digit, and special character.
• Whether the password must contain only ASCII characters.
• Minimum elapsed number of days before a password can be reused.
• Password expiration period.
• Advance warnings for password expirations.
If you enable any of the following password policies, you can also specify:
• The minimum password length, in number of characters.
• The minimum elapsed time between password re-uses.
• The password expiry period.
• The number of days in advance to start warning users about future password expiration.
22/tcp SSHD Used by SCP, SFTP, and SSH connections to and from the system N
1522/tcp Oracle Oracle/JDBC Database connections: These include both internal server N
connections and for connections with the High Availability peer server.
8080 apache httpd For establishing comminution between WLC and Prime Infrastrucuture N
in Assurance (wsa_collector)
61617/tcp JMS (over SSL) For interaction with remote Plug&Play Gateway server Y
Step 1 Log in to Prime Infrastructure using the command line, as explained in Connecting Via CLI . Do not enter “configure
terminal” mode.
Step 2 Enter the following command at the prompt:
pi-33-aws/admin# show security-status
Depending on your settings, you will see output like the following:
Open TCP Ports : 21 22 80 443 1522 8082 9992 61617
Open UDP Ports : 69 162 514 9991
FIPS Mode : disabled
• Certificate Expiry
Prime Infrastructure does not send SNMPv2 Inform or SNMPv3 notifications.
Note Prime Infrastructure displays the alarms, stating the port unavailability, even if the traps are disabled for a
device.
Appliance Process FTP, MATLAB, Whenever the FTP, MATLAB, or TFTP process on Prime Infrastructure server fails,
Failure TFTP the server will generate a failure trap and the server's instance of Health Monitor will
try to restart the process automatically. If Health Monitor cannot restart it after 3 tries,
the HA server will send another failure trap.
Appliance Process NMS Whenever the NMS process on a server starts or fails, the Prime Infrastructure server's
Failure Health Monitor thread will generate a corresponding trap.
To stop or restart the process, connect to the server via CLI and log in as admin. Then
execute the nms stop or nms start command, as appropriate.
HA Operations Registration Trigger Prime Infrastructure generates this trap whenever the primary server initiates HA
registration (whether registration fails or succeeds).Once HA registration is triggered,
the primary server generates the trap, indicating the start of the operation.
HA Operations Registration Success When HA registration is successful, the primary server generates this trap, indicating
success.
HA Operations Registration Failure When HA registration fails for any reason, the primary or secondary server on which
the failure occurred, generates a trap indicating the failure. The trap contains details
about the failure. For assistance, contact the Cisco Technical Assistance Center (TAC).
HA Operations Failover Trigger This trap is generated whenever the Prime Infrastructure primary server fails and, as
part of a failover, the secondary server tries to become active (whether failover fails or
succeeds, and whether the secondary server comes up or fails to do so). If the HA
configuration (set during registration) has a Manual failover type, users must trigger
the failover. Otherwise, the Health Monitor will trigger failover to the secondary server
automatically.
One trap will be generated to indicate that the failover was triggered. Because the trap
is sent before the failover completes, it will not be logged on the secondary server.
HA Operations Failover Success When the triggered failover operation is successful, the secondary server generates a
trap indicating success. Users can view the trap in the secondary server's alarm browser.
HA Operations Failover Failure When the triggered failover operation fails, a trap will be generated indicating the
failure. Users can view the trap in the hm-#-#.log (see How to Troubleshoot Prime
Infrastructure SNMP Traps, on page 393). The trap contains details about the failure.
For assistance, contact Cisco TAC. As with other failure traps, alarms and a “clear”
trap are sent if the failure corrects itself.
HA Operations Failback Trigger This trap is generated whenever a failback to the primary server is triggered on the
secondary server (whether or not the failback is successful). Once the primary server
is restored, a user must trigger a failback from the secondary server to the primary
server using the Failback button on the secondary server Health Monitor web page
(there is no automatic Failback option). Once triggered, the secondary server generates
the trap indicating the start of the operation.
HA Operations Failback Success When the triggered failback operation is successful, the secondary server generates a
trap indicating success. Failback success sets the primary server to the ‘Active’ state
and the secondary server to the ‘Sync’ state.
HA Operations Failback Failure When the triggered failback operation fails, a trap will be generated indicating this
failure. Since the failure can occur on either server, the server on which it occurred will
generate the trap. Users can view the trap in the hm-#-#.log and on the northbound
management server.
A failback failure triggers an automatic rollback, in which the secondary server tries
to return to its previous ‘Active’ state. Failure of this operation will cause the secondary
server to generate an additional trap indicating rollback failure. The failure traps contain
details about the failures. For assistance, contact Cisco TAC. As with other failure traps,
alarms and a “clear” trap are sent if the failure corrects itself.
Hardware Traps CPU Utilization Traps will be sent only when the usage exceeds the preset threshold value for CPU
utilization. To view these traps, check the jobs and active sessions for the server that
generated the trap.
Hardware Traps Disk Utilization Traps will be sent only when the disk usage exceeds the set threshold limit for Disk
utilization. To respond, try to free up disk space under the /opt and /localdisk partitions.
Do not delete folders under /opt/CSCOlumos without guidance from Cisco TAC.
Hardware Traps Memory Utilization Traps will be sent to the SNMP trap receiver, only when memory usage exceeds the
set threshold limit for memory utilization.
Hardware Traps Disk Failure Traps will be sent to the SNMP trap receiver when disk failure is detected. Contact
your local system administrator for corrective action. As with other failure traps, alarms
and a “clear” trap are sent if the failure corrects itself.
Hardware Traps Fan Failure Traps will be sent to the SNMP trap receiver when fan failure is detected. The bad or
missing fan will be identified in the trap or alarm message. Contact your local system
administrator for corrective action. As with other failure traps, alarms and a “clear”
trap are sent if the failure corrects itself.
Hardware Traps PSU Failure Traps will be sent to the SNMP trap receiver when PSU failure is detected. The
problematic power supply will be identified in the trap or alarm message. Contact your
local system administrator for corrective action. As with other failure traps, alarms and
a “clear” trap are sent if the failure corrects itself.
Threshold Traps Backup Failure Traps will be sent to the SNMP trap receiver when failure of the daily background task
of Prime Infrastructure server backup is detected. The background task runs everyday
and takes a backup of the server at the scheduled time. If the backup fails due to
insufficient disk space, the event will be processed. If the backup is taken successfully,
the alarm will be cleared.
Threshold Traps Backup Threshold Informs users when Prime Infrastructure scheduled daily backup has not been taken
for a threshold number of days. The default threshold is seven days. If no backup has
been taken for seven days, users are notified by this event.
Threshold Traps Certificate Expiry Traps will be sent to the SNMP trap receiver when the certificate is about to expire. A
critical trap is sent when the certificate is set to expire in 15 days and a major trap is
sent when the certificate expiry is in 60 days.
System Traps Lifecycle Lifecycle license is used to manage devices. Alarm is generated when the license usage
exceeds the configured threshold percentage. By default, traps will be sent when the
usage exceeds 80%. However, this can be customized.
System Traps Assurance Assurance License is used to display the devices that pump NetFlow to Prime
Infrastructure. Alarm is generated when the license usage exceeds the configured
threshold percentage. By default, traps will be sent when the usage exceeds 80%.
However, this can be customized.
System Traps Collector Collector License is used to display the volume of NetFlow pumped to Prime
Infrastructure. Alarm is generated when the license usage exceeds the configured
threshold percentage. By default, traps will be sent when the usage exceeds 80%.
However, this can be customized.
System Traps Lifecycle License Traps will be sent when the expiry period of the License goes below the threshold limit.
By default, traps will be sent when the limit is 30 days. However, you can customize
the limit between 1-99 days. This event is considered only when you use Evaluation
License.
System Traps Assurance License Traps will be sent when the expiry period of the License goes below the threshold limit.
By default, traps will be sent when the limit is 30 days. However, you can customize
the limit between 1-99 days. This event is considered only when you use Evaluation
License.
System Traps Collector License Traps will be sent when the expiry period of the License goes below the threshold limit.
By default, traps will be sent when the limit is 30 days. However, you can customize
the limit between 1-99 days. This event is considered only when you use Evaluation
License.
the server, Result: Warning, Failure, Success, Information, Exception, MSG: Free-form text of the message
for a given SNMP Trap
Table A-2 describes possible values for each of the generic trap format attributes.
Attribute Value
Server From which server (Primary, Secondary or Standalone) was this trap sent?
Type Which type of action (Process, Sync, Activity, etc.) resulted in this trap?
Service Which Prime Infrastructure service reported this issue? The possible values include Registration, Failover, Failback,
NMS, NCS, Health Monitor, All, Prime Infrastructure, Database, Disk Space, and so on.
When At what point in the Prime Infrastructure server's life cycle (Startup, Shutdown, etc.) did this happen?
State What is the server state (Standalone, Failover, Failback, Registration, etc.)?
MSG Freeform text providing more details specific to each SNMP trap.
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
cWNotificationIndex None. Uniquely generated None None Index value that increases
for each trap. with each northbound trap
sent until it wraps back to
one.
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
cWNotificationSpecialAttributes All alarm fields Various, based on specific Various, based on Contains the contents of
alarm field specific alarm field the alarm itself (fields and
values)
MIB Variable Name Field From Associated GUI Name Events Details
Alarm
Purpose Informs users that a specific Prime Infrastructure server service is down and
that the Health Monitor is attempting to restart it.
When Sent The trap is sent when Health Monitor tries to restart the process.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
Example Component: Health Monitor, Server: Primary, Type: Process, Service: NCS,
When: Startup, State: Stand Alone, Result: Warning, MSG: FTP service is
down and an attempt will be made to automatically restart the service
Value Type, Range and Constraints The servername parameter in the MSG attribute will take the value of the
Prime Infrastructure server’s host name. This parameter can take one of the
following values: NMS Server, FTP, TFTP or MATLAB.
Purpose Informs users that a failback from the secondary server to the
primary server has been initiated.
When Sent This trap is sent when a failback is initiated from the secondary
server to the primary server, irrespective of whether the failback
operation fails or succeeds.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
When Sent When the primary server is down and, as part of failover, the
secondary server comes up, traps are generated, irrespective of
whether the failover operation fails or succeeds.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
Purpose Informs users that CPU utilization has crossed the set threshold limit.
When Sent After the CPU utilization crosses the set threshold, the trap is generated on the next polling cycle.
The system poller job runs every 5 minutes. A trap is also generated when the threshold limit is
changed on the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1.
Example CPU Utilization is at 85% and has violated threshold limit of 80%.
Value Type, Range and All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying
Constraints a threshold limit.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle.
Purpose Informs users that disk utilization has crossed the set threshold limit.
When Sent After the disk utilization crosses the set threshold, the trap is generated on the next polling cycle. The
system poller job runs every 5 minutes. A trap is also generated when the threshold limit is changed
on the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1
Examples PI opt disk volume utilization is at 85% and has violated threshold limit of 0%.
PI opt disk volume is within the recommended disk usage range, less than 80% used.
PI local disk volume utilization is at 85% and has violated threshold limit of 80%.
PI local disk volume is within the recommended disk usage range, less than 80% used.
Value Type, Range and All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying
Constraints a threshold limit.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle.
Purpose Informs users that memory utilization has crossed the set threshold limit.
When Sent After the memory utilization crosses the set threshold, the trap is generated on the next polling cycle.
The system poller job runs every 5 minutes. A trap is also generated when the threshold limit is
changed on the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1.
Examples Memory Utilization is at 85% and has violated threshold limit of 80%.
Value Type, Range and All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying
Constraints a threshold limit.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle.
When Sent Once a disk drive issue is detected, a trap will be generated on the next polling cycle. The system poller
job runs every 5 minutes.
OID .1.3.6.1.4.1.9.9.712.0.1
Example Component: Appliance, Server: Standalone, Type: Hardware, Message: A problem was detected in the
RAID device. A rebuild is in progress. Device at enclosure 252 slot ZERO is bad or missing. Drive0 is
missing or bad.
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle. If the drive is unplugged at
the time of system restart, the trap is generated.
When Sent When a fan fails, a trap is generated on the next polling cycle. The system poller job runs every 5 minutes.
OID .1.3.6.1.4.1.9.9.712.0.1
Constraints and Caveats Traps are not generated if the issue is resolved before the next polling cycle, or the fan is unplugged at the
time of system restart.
When Sent When a power supply is unplugged, a trap is generated on the next polling cycle. The system poller job
runs every 5 minutes.
OID .1.3.6.1.4.1.9.9.712.0.1
Example Component: Appliance, Server: Standalone, Type: Hardware, Message: Power supply: PSx is either bad
or missing.
Constraints and Caveats If the PSU is unplugged, a Power Supply alarm will be seen in Prime Infrastructure and a trap will be sent.
If the PSU is unplugged at the time of system shutdown, and Prime Infrastructure is not up till restart, an
alarm will not be generated.
When Sent When an ISE is down or unreachable, the trap is generated via polling.
Note This is a system generated trap. Hence it does not have any
corresponding OID.
Purpose Informs users when the number of devices Prime Infrastructure is actually managing exceeds the number of devices it
is licensed to manage.
When Sent At 2:10AM, on the day following the completion of the job that added the extra devices to Prime Infrastructure inventory
Note This is a system generated trap. Hence it does not have any corresponding OID.
Example Number of managed devices N is greater than licensed devices N. Please purchase and install a license that will cover
the number of managed devices, or remove unused devices from the system.
Table 37: Prime Infrastructure does not have enough disk space for backup
Purpose Informs users when Prime Infrastructure does not have sufficient space in the specified directory to perform a backup.
When Sent Whenever Prime Infrastructure runs a server backup job and the backup repository specified (or “defaultrepo”) is 100
percent full. The trap is generated after the job completes.
Note This is a system generated trap. Hence it does not have any corresponding OID.
Example Prime Infrastructure with address localIPAddress does not have sufficient disk space in directory directoryName for
backup. Space needed: Needed GB, space available Free GB.
Purpose Informs users that an attempt to send an email notification has failed.
When Sent This trap is generated by polling when Prime Infrastructure attempts to send an email notification to an invalid user,
or email notification is enabled without specifying the email server in Prime Infrastructure.
Note This is a system generated trap. Hence it does not have any corresponding OID.
Example Prime Infrastructure with address localIPAddress failed to send email. This may be due to possible SMTP
misconfiguration or network issues.
When Sent This trap is generated by polling when a destination northbound notification server is down or unreachable.
OID .1.3.6.1.4.1.9.9.712.0.1
Example Northbound notification server OSSIPAddress is unreachable. NCS alarms will not be processed for this server until
it is reachable.
Configure Notifications
For Prime Infrastructure to send northbound SNMP trap notifications, you must configure the correct settings
on both the Prime Infrastructure Event Notification and Notification Destiantion pages. Once configured,
traps will be generated based on the values associated with the Threshold and Severity for the following SNMP
Events:
• Appliance Process Failure
• HA Operations
• CPU, disk and memory utilization
• Disk, fan and PSU Failure
• Backup failure, certification expiry and licenses violations
You can edit the threshold and severity associated with each event, and enable or disable trap generation for
the associated event.
Step 1 Log in to Prime Infrastructure using a user ID with root domain privileges.
Step 2 Select Administration > Settings > System Settings > Alarms and Events > System Event configuration.
Step 3 For each SNMP event you want to configure:
a) Click on the row for that event.
b) Set the Event Severity level to Critical, Major, or Minor, as needed.
c) For the CPU, disk, memory utilization, life cycle, assurance, and collector traps: Enter the Threshold percentage
(from 1-99). These events will send the associated SNMP traps when the utilization exceeds the threshold limit. You
cannot set thresholds for events for which the threshold setting is shown as NA. These events send traps whenever
the associated failure is detected.
d) For backup threshold, certificate expiry, certificate expiry (critical), lifecycle license, assurance license, and collector
license trap: Enter the Threshold in days (from x-y, where x is the minimum value and y is the maximum value in
days).
e) Set the Event Status to Enabled or Disabled. If set to Enabled, the corresponding trap will be generated for this event.
f) For the CPU, disk, memory utilization, enter the Create and Clear Alarm Iteration value. The default value is two.
The first polling after setting the iteration value will take two times the iteration value entered in minutes. All the
future polling will take 20 minutes only.
The default polling time is 20 minutes.
Step 4 When you are finished, click Save to save your changes.
Related Topics
Configure Alarms Notification Destination, on page 239
Step 5 (Optional) Complete the same fields under Secondary SMTP Server.
Step 6 Under Sender and Receivers, enter a legitimate email address for the Prime Infrastructure server.
Step 7 (Optional) Enter a subject line in the Subject text box.
Step 8 When you are finished, click Save.
Related Topics
View Events and Alarms for SNMP Traps, on page 391
Filter Events and Alarms for SNMP Traps, on page 392
Purge Alarms for SNMP Traps, on page 393
How to Troubleshoot Prime Infrastructure SNMP Traps, on page 393
Configure Notifications, on page 390
Port Used To Send Traps , on page 391
Step 6 To save the Advanced filter, click the Save icon and supply a name for the filter.
Step 7 To clear the Advanced Filter, click Clear Filter.
For more details, see Purge Alarms for SNMP Traps, on page 393.
Related Topics
How to Troubleshoot Prime Infrastructure SNMP Traps, on page 393
Configure Notifications, on page 390
Port Used To Send Traps , on page 391
View Events and Alarms for SNMP Traps, on page 391
Filter Events and Alarms for SNMP Traps, on page 392
Step 1 Ping the notification destination from the Prime Infrastructure server, to ensure that there is connectivity between Prime
Infrastructure and your management application.
Step 2 Check if any firewall ACL settings are blocking port 162, and open communications on that port if needed.
Step 3 Log in to Prime Infrastructure with a user ID that has administrator privileges. Select Administration > Settings >
Logging and download the log files. Then compare the activity recorded in these log files with the activity you are seeing
in your management application:
• ncs_nb.log: This is the log of all the northbound SNMP trap messages Prime Infrastructure has sent. Check for
messages you have not received.
• ncs-# -# .log: This is the log of other recent Prime Infrastructure activity. Check for hardware trap messages you
have not received.
• hm-# -# .log: This is the complete log of Health Monitor activity. Check for recent messages about High Availability
state-changes and application-process failures that you have not received.
The messages you see in these logs should match the activity you see in your management application. If you find
major differences, open a support case with Cisco Technical Assistance Center (TAC) and attach the suspected log
files with your case.
Related Topics
Prime Infrastructure SNMP Trap Types, on page 378
Prime Infrastructure SNMP Trap Reference, on page 384
Configure Prime Infrastructure Traps , on page 389
• Configure the primary and secondaryPrime Infrastructure servers and these must be accessible from Plug
and Play Gateway standalone servers. See Configure High Availability, on page 283for more details.
• Ensure that the primary and secondary Prime Infrastructure SSL server certificates used for Message
Queue Ports 61617 and Health Monitor port 8082 are available for extraction from primary and secondary
servers for Prime Infrastructure HA mode with different IP addresses. See Set Up High Availability, on
page 297 for more details.
• For virtual IP Address based HA, both primary and secondary servers must have the virtual IP address
and certificates. See Using Virtual IP Addressing With HA, on page 288 for more details.
• At least one of the Prime Infrastructureserver Message Queue port 61617 port must be active at all times
depending on the service which will take the HA role.
• Install the primary and secondary Plug and Play Gateway Virtual Machines. See the latest Cisco Prime
Infrastructure Quick Start Guide for details of installation of virtual machines from OVA file.
• Primary IP address.
• Enter y, when prompted if a secondary server is to be configured.
• Secondary IP address.
See Command Reference Guide for Cisco Prime Infrastructure for more details about running the commands.
Note Cisco Plug and Play Gateway integrated with Prime Infrastructure will not work when the primary and
secondary servers have different IP addresses because the bootstrap configuration needs to be changed
according to the active node.
Related Topics
Cisco Plug and Play Gateway HA Prerequisites, on page 395
Set up Standalone Cisco Plug and Play Gateway for Prime Infrastructure HA, on page 396
Remove Cisco Plug and Play Gateway in HA, on page 399
Cisco Standalone Plug and Play Gateway Server HA Setup, on page 397
Cisco Plug and Play Gateway HA and Cisco Prime Infrastructure Combinations, on page 400
Note The standalone Cisco Plug and Play Gateway with Prime Infrastructure in HA has automatic failover from
primary to secondary. Manual failover is not available.
The standalone Cisco Plug and Play Gateway with Prime Infrastructure in HA can be configured to failback
manually or automatically from the secondary to primary server.
Enter the Cisco Plug and Play Gateway virtual IP address, virtual host name, IP address and username and
password of the secondary server as part of pnp setup. Enter 0 for manual failback and 1 for automatic failback
when prompted during the setup.
Note We recommend manual failback. Automatic failback is not recommended because in case of scenarios like
flapping interface, failover and failback happens continuously.
Related Topics
Cisco Plug and Play Gateway Status, on page 398
How Cisco Plug and Play Gateway HA Works, on page 395
Setting up Cisco Plug and Play Gateway HA
Cisco Plug and Play Gateway HA and Cisco Prime Infrastructure Combinations, on page 400
Note When deleting Cisco Plug and Play Gateway HA, the administrator must manually modify the dynamic port
allocation cns event command and decommission the secondary server, if HA is being turned off. The Cisco
Plug and Play Gateway secondary server will continue to run with the virtual IP address if it is not
decommissioned.
Related Topics
Cisco Plug and Play Gateway HA and Cisco Prime Infrastructure Combinations, on page 400
Limitations of Cisco Plug and Play Gateway HA, on page 400
How Cisco Plug and Play Gateway HA Works, on page 395
Setting up Cisco Plug and Play Gateway HA
Related Topics
Limitations of Cisco Plug and Play Gateway HA, on page 400
How Cisco Plug and Play Gateway HA Works, on page 395
Setting up Cisco Plug and Play Gateway HA
Remove Cisco Plug and Play Gateway in HA, on page 399
Cisco Plug and Play Gateway Status, on page 398
• Any Plug and Play requests that are partially completed on the Cisco Plug and Play Gateway during
failover and failback (the Prime Infrastructure and Cisco Plug and Play Gateway standalone server) will
remain incomplete in the Prime Infrastructure server and these may not be configured successfully on
the device.
• Failover and failback takes five to ten minutes during which Cisco Plug and Play Gateway provisioning
does not happen. Devices that have received bootstrap with cns config initial will continue to reach Cisco
Plug and Play Gateway for provisioning. Command Reference Guide for Cisco Prime Infrastructure for
more details.
• Devices take time to connect to the backup server once the IP address is moved from the active to standby
server depending on the configuration available in the cns event command for reconnect time.
• Prime Infrastructure integrated Plug and Play Gateway will support HA if the HA configuration in Prime
is based on a virtual IP address. Prime Infrastructure HA with different IP addresses for primary and
secondary servers will not support the Plug and Play Gateway HA functionality in the integrated server.
• For the Prime Infrastructure integrated Plug and Play Gateway, SSLv3 is disabled by default on all
Gateway SSL ports (for example, ports 11012, 11014, and so on).
• Related Topics
Related Topics
How Cisco Plug and Play Gateway HA Works, on page 395
Setting up Cisco Plug and Play Gateway HA
Remove Cisco Plug and Play Gateway in HA, on page 399
Cisco Plug and Play Gateway HA and Cisco Prime Infrastructure Combinations, on page 400