Prime 2.2 Administration Guide PDF
Prime 2.2 Administration Guide PDF
2
Administrator Guide
April 16, 2015
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT
SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE
OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public
domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH
ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT
LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF
DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING,
WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO
OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this
URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display
output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in
illustrative content is unintentional and coincidental.
Configuring Prime Infrastructure to Use Routers and Switches as Data Sources 14-2
CHAPTER C Configuring High Availability for Plug and Play Gateway C-1
Cisco Plug and Play Gateway HA and Prime Infrastructure Combinations C-6
Cisco Prime Infrastructure is a network management tool that supports lifecycle management of your
entire network infrastructure from one graphical interface. Prime Infrastructure provides network
administrators with a single solution for provisioning, monitoring, optimizing, and troubleshooting both
wired and wireless devices. Robust graphical interfaces make device deployments and operations simple
and cost-effective.
The Administration menu in Prime Infrastructure contains tasks that are typically performed by
administrators only.
The Cisco Prime Infrastructure administrator should plan on completing several initial setup tasks soon
after the product is installed.
Related Topics
• Setting Up the Operations Center
• Required Software Versions and Configurations
• Configuring Data Sources for Prime Infrastructure With Assurance
• Enabling Medianet NetFlow
• Enabling NetFlow and Flexible NetFlow
• Deploying Network Analysis Modules (NAMs)
• Installing Prime Infrastructure Patches
Related Topics
• Before You Begin Setting Up Operations Center
• Activating Your Operations Center License
• Enabling Prime Infrastructure 2.1.2 for Operations Center Management
Step 1 Select Administration > Licenses to open the Licenses > Summary page.
Step 2 From the left-hand navigation menu, select Files > License Files to open the Licenses > License Files
page.
Step 3 Click Add to open the Add a License File dialog box.
Step 4 Click Choose File.
Step 5 Navigate to your license file, select it, and then click Open.
Step 6 Click OK.
Your license should now be listed in the Licenses > License Files page.
Step 7 Log out of Prime Infrastructure and then log back in. The login page that appears should display “Cisco
Prime Infrastructure Operations Center”, which indicates the license has been applied.
Step 1 Select Administration > Users, Roles & AAA. The AAA Mode Settings page is displayed.
Step 2 In the AAA Mode field, select the Local radio button and then click Save.
Step 3 From the left-hand navigation menu, click SSO Servers to open the SSO Servers page.
Step 4 From the Select a Command drop-down list, select Add SSO Server and then click Go. The Add SSO
Servers page appears.
Step 5 Enter the following information and then click Save:
• Server IP Address: The IP address of the server on which you activated your license (i.e. the server
on which the Operations Center will run).
• Port: The port used to log in to the SSO server. By default, port 443 is set. Do not change this value.
• Retries: The number of retries to attempt when logging into the SSO server. By default, this value
is set to 1.
The server should now be listed on the Add SSO Servers page.
Step 6 From the left-hand navigation menu, select AAA Mode Settings to reopen the AAA Mode Settings page.
Step 7 Click the SSO radio button (if it is not already selected) and then click Save.
Step 8 After enabling SSO, log out of the instance of Prime Infrastructure on which you enabled SSO and then
log back in. On the Operations Center instance, you will see “Operations Center” in the product title
when you log in. On the managed instances the login page will look like Prime Infrastructure in SSO
mode.
Related Topics
• Before You Begin Setting Up Operations Center
• Activating Your Operations Center License
• Enabling Prime Infrastructure 2.1.2 for Operations Center Management
• Enabling SSO for Operations Center
• Adding Prime Infrastructure Instances to Operations Center
Related Topics
• Configuring SNMP
• Configuring NTP
Configuring SNMP
To ensure that Prime Infrastructure can query SNMP devices and receive traps and notifications from
them, you must:
• Set SNMP credentials (community strings) on each device you want to manage using Prime
Infrastructure.
• Configure these same devices to send SNMP notifications to the Prime Infrastructure server.
Use the following Cisco IOS configuration commands to set read/write and read-only community strings
on an SNMP device:
admin(config)# snmp-server community private RW
admin(config)# snmp-server community public RW
where private and public are the community strings you want to set.
After you set the community strings, you can specify that device notifications be sent as traps to the
Prime Infrastructure server using the following Cisco IOS global configuration command on each SNMP
device:
admin(config)# snmp-server host Host traps version community
notification-type
where:
• Host is the IP address of the Prime Infrastructure server.
• version is the version of SNMP that is used to send the traps.
• community is the community string sent to the server with the notification operation.
• notification-type is the type of trap to send.
You may need to control bandwidth usage and the amount of trap information being sent to the Prime
Infrastructure server using additional commands.
For more information on configuring SNMP, see:
• The snmp-server community and snmp-server host commands in the Cisco IOS Network
Management Command Reference.
• The “Configuring SNMP Support” section and the list of notification-type values in the Cisco IOS
Configuration Fundamentals Configuration Guide, Release 12.2.
If you are planning on implementing IPSec tunneling between your devices and the Prime Infrastructure
server, be advised that you will not receive syslogs transmitted from those devices to the Prime
Infrastructure server after implementing IPSec tunneling because IPSec does not support free-form
syslogs. However, IPSec does support SNMP traps. To continue getting SNMP notifications of any kind
from these devices, you need to configure your devices to send SNMP traps to the Prime Infrastructure
server.
Configuring NTP
Network Time Protocol (NTP) must be properly synchronized on all devices in your network as well as
on the Prime Infrastructure server. This includes all Prime Infrastructure-related servers: Any remote
FTP servers that you use for Prime Infrastructure backups, secondary Prime Infrastructure
high-availability servers, the Prime Infrastructure Plug and Play Gateway, VMware vCenter and the ESX
virtual machine, and so on.
You specify the default and secondary NTP servers during Prime Infrastructure server installation. You
can also use Prime Infrastructure’s ntp server command to add to or change the list of NTP servers after
installation. For details, see the section Connecting Via CLI in this Guide and the section on the ntp
server command in the Command Reference Guide for Cisco Prime Infrastructure 2.2. Note that Prime
Infrastructure cannot be configured as an NTP server; it acts as an NTP client only.
Failure to manage NTP synchronization across your network can result in anomalous results in Prime
Infrastructure. Management of network time accuracy is an extensive subject that involves the
organization's network architecture, and is outside the scope of this Guide. For more information on this
topic, see (for example) the Cisco White Paper Network Time Protocol: Best Practices.
Table 2-1 Prime Infrastructure Assurance: Supported Data Sources, Devices and Software Versions
Table 2-1 Prime Infrastructure Assurance: Supported Data Sources, Devices and Software Versions (continued)
If you configure multiple NetFlow exporters on the same router, make sure that only one of them exports
to the Prime Infrastructure server. If you have more than one exporter on the same router exporting to
the same destination, you risk data corruption.
Use the following commands to verify that NetFlow is working on a device:
Device# show ip flow export
Device# show ip cache flow
Device# show ip cache verbose flow
For more information on NetFlow configuration, see:
• Cisco IOS Switching Services Configuration Guide, Release 12.1
• Flexible NetFlow Configuration Guide, Cisco IOS Release 15.1M&T
• Cisco Nexus 7000 Series NX-OS System Management Configuration Guide, Release 5.x
• Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Use commands like the following to configure flow records for applications with flows across the router:
Router (config)# flow record type mace mace-record
Router (config)# collect application name
Step 1 Download the appropriate point patch to a local resource in your environment:
a. With the Cisco Download Software navigator displayed in your browser, choose Products > Cloud
and Systems Management > Routing and Switching Management > Network Management
Solutions > Cisco Prime Infrastructure.
b. Select the version of Cisco Prime Infrastructure that most closely matches the one you are currently
using (for example, Cisco Prime Infrastructure 2.2).
c. Click Prime Infrastructure Patches to see the list of available patches for that version of the
product.
d. Next to each patch that is required, click Download, then follow the prompts to download the file.
Step 2 Open a command-line interface session with the Prime Infrastructure server (see Connecting Via CLI in
the Cisco Prime Infrastructure 2.2 Administrator Guide).
Step 3 Copy the downloaded patch file to the default local repository. For example:
admin# copy source path/defaultRepo
Where:
– source is the downloaded patch file’s location and name (for example:
ftp://MyFTPServer/pi_9.3.1.0_update.tar.gz).
– path is the complete path to the default local backup repository, defaultRepo (for example:
/localdisk)
The following topics describe how to configure key Prime Infrastructure server settings:
• Available System Settings
• Configuring Email Settings
• Configuring Global SNMP Settings
• Configuring Proxy Settings
• Configuring Server Settings
• Configuring FTP, TFTP, and SFTP Servers
• Specifying Administrator Approval for Jobs
• Managing OUI
• Adding Notification Receivers to Prime Infrastructure
• Setting Up HTTPS Access to Prime Infrastructure
• MIB to Prime Infrastructure Alert/Event Mapping
• Set the protocol to be used for controller and CLI Session Wireless
autonomous AP CLI sessions. See Configuring Protocols for CLI Sessions.
devices only
• Enable autonomous AP migration analysis on
discovery.
• Enable automatic troubleshooting of clients on the Client Wired and
diagnostic channel. See Configuring Email Settings. wireless devices
• Enable lookup of client hostnames from DNS servers
and set how long to cache them.
• Set how long to retain disassociated clients and their
session data.
• Poll clients to identify their sessions only when a trap
or syslog is received.
• Disable saving of client association and disassociation
traps and syslogs as events.
• Enable saving of client authentication failure traps as
events, and how long between failure traps to save
them.
Step 1 Choose Administration > System Settings > Mail Server Configuration. The Mail Server
Configuration page appears.
Step 2 Enter the hostname of the primary SMTP server.
Step 3 Enter the username of the SMTP server.
Step 4 Provide a password for logging on to the SMTP server and confirm it.
Step 5 Provide the same information for the secondary SMTP server (only if a secondary mail server is
available).”
Step 6 The “From text box in the Sender and Receivers portion of the page is populated with
[email protected]. You can change this to a different sender.
Step 7 In the “To” text box, enter the email address of the recipient. The email address you provide serves as
the default value for other functional areas, such as alarms or reports. If you want to specify multiple
recipients, enter multiple email addresses separated by commas.
Note Global changes you make to the recipient email addresses in Step 7 are disregarded if email
notifications were set.
You must indicate the primary SMTP mail server and complete the From address text boxes.
If you want all alarm categories applied to the provided recipient list, select the Apply recipient list to
all alarm categories check box.
Step 8 In the “Subject” text box, enter the text that you want to appear in the email subject line.
Step 9 (Optional) Click the Configure email notification for individual alarm categories link, you can specify
the alarm categories and severity levels you want to enable. email notifications are sent when an alarm
occurs that matches categories and the severity levels you select.
Note You can set each alarm severity by clicking the alarm category, choosing Critical, Major, Minor,
or Warning, and providing an email address.
Step 10 Click the Test button to send a test email using the parameters you configured. The results of the test
operation appear on the same page. The test feature checks the connectivity to both primary and
secondary mail servers by sending an email with a “Prime Infrastructure test email” subject line.
Note The default network address is 0.0.0.0, which indicates the entire network. An SNMP credential
is defined per network so only network addresses are allowed. 0.0.0.0 is the SNMP credential
default and is used when no specific SNMP credential is defined. You should update the
prepopulated SNMP credential with your own SNMP information.
Note Constant Timeout is useful on unreliable networks (such as satellite networks) where the desired
number of retries is large. Because it does not double the timeout per try, it does not take as long
to timeout with a high number of retries.
Step 5 Determine if you want to use reachability parameters. If selected, Prime Infrastructure defaults to the
global Reachability Retries and Timeout that you configure. If unselected, Prime Infrastructure always
uses the timeout and retries specified per controller or per IOS access point.
Note Adjust this setting downward if switch port tracing is taking a long time to complete.
Step 6 For the Reachability Retries field, enter the number of global retries used for determining device
reachability. This field is only available if the Use Reachability Parameters check box is selected.
Note Adjust this setting downward if switch port tracing is taking a long time to complete.
Step 7 For the Reachability Timeout field, enter a global timeout used for determining device reachability. This
field is only available if the Use Reachability Parameters check box is selected.
Step 8 At the Maximum VarBinds per PDU field, enter a number to indicate the largest number of SNMP
variable bindings allowed in a request or response PDU.
Note This Maximum VarBinds per PDU field enables you to make necessary changes with when you
have any failures associated to SNMP.
For customers who have issues with PDU fragmentation in their network, this number can be reduced to
50, which typically eliminates the fragmentation.
The maximum rows per table field is configurable. The configured value is retained even if you upgrade
Prime Infrastructure to a newer version.
Step 9 Click Save to confirm these settings.
Note If SNMP v1 or v2 with default community is configured, the network is open to easy attacks
because default communities are well known. SNMP v1 or v2 with a non default community is
more secure than a default community, but SNMP v3 with Auth and Privacy type and no default
user is the most secure SNMP connection.
Step 4 Click OK to save changes or Cancel to return to the SNMP Credentials page without making any
changes to the SNMP credential details.
• If SNMP v1 Parameters or v2 Parameters is selected, enter the applicable community in the available
text box.
• If SNMP v3 Parameters is selected, configure the following parameters:
– Username
– Auth. Type
– Auth. Password
– Privacy Type
– Privacy Password
If SNMP v1 or v2 with default community is configured, the network is open to easy attacks because
default communities are well known. SNMP v1 or v2 with a non-default community is more secure than
a default community, but SNMP v3 with Auth and Privacy type and no default user is the most secure
SNMP connection.
Step 9 Click OK.
If Prime Infrastructure can use the SNMP credential listed to access the switch, the switch is added for
later use and appears in the Configure > Ethernet Switches page.
If you manually added switches through the Configure > Ethernet Switches page, then switch port
tracing uses the credentials from that page, not the ones listed in the SNMP Credentials page. If the
manually added switch credentials have changed, you need to update them from the Configure >
Ethernet page.
Step 1 Choose Administration > System Settings > Job Approval Settings.
Step 2 Select the Enable Job Approval check box
Step 3 From the list of job types, use the arrows to move any jobs for which you want to enable job approval to
the list in the right. By default, job approval is disabled so all jobs appear in the list on the left.
Step 4 To specify a customized job type, enter a string using regular expressions in the Job Type field, then click
Add. For example, to enable job approval for all job types that start with Config, enter Config.*
Step 5 Click Save.
Approving Jobs
If you have previously specified that a job must be approved by an administrator (see Specifying
Administrator Approval for Jobs) before the job can run, the administrator must approve the job.
Choose Administration > System Settings > Jobs Approval to:
• View the list of jobs that need approval.
• Approve any listed jobs—After an administrator approves a job, the job is enabled and runs per the
schedule specified in the job.
• Reject the approval request for any listed jobs—After an administrator rejects a job, the job is
deleted from the Prime Infrastructure database.
Step 1 Choose Administration > System Settings > User Defined Field.
Step 2 Click Add Row to add a UDF.
Step 3 Enter the field label and description in the corresponding fields.
Step 4 Click Save to add a UDF.
Managing OUI
Prime Infrastructure relies on the IEEE Organizational Unique Identifier (OUI) database to identify the
client vendor name mapping. Prime Infrastructure stores vendor OUI mappings in an XML file named
vendorMacs.xml. This file is updated for each release of Prime Infrastructure. With the OUI update, you
can perform the following:
• Change the vendor display name for an existing OUI.
• Add new OUIs to Prime Infrastructure.
• Refresh the vendorMacs.xml file with new vendor OUI mappings and upload it to Prime
Infrastructure.
Related Topics
• Adding a New Vendor OUI Mapping
• Uploading an Updated Vendor OUI Mapping File
Note After you upload the vendorMacs.xml file in the Administration > System Settings > Upload OUI
page: If the vendor name is not reflected for existing unknown vendor clients in the Unique Clients and
Users Summary report, run the updateUnknownClient.sh script. This script is located in the
/opt/CSCOlumos/bin folder.
The following sample output shows the ncs_nb.log file generated by Prime Infrastructure. This log file
is located in the log file directory on Prime Infrastructure server (/opt/CSCOlumos/logs). The log output
helps you troubleshoot when alarms are not being received by the North Bound SNMP receiver.
2013-12-02 17:11:53,868 [main] INFO services - Queue type is order
2013-12-02 17:11:53,870 [main] INFO services - Starting the notification thread..
2013-12-02 17:11:53,871 [NBNotifier] INFO services - Fetching the head of the queue
2013-12-02 17:11:53,871 [NBNotifier] INFO services - The Queue is empty
2013-12-02 17:11:53,871 [main] INFO notification - Setting the NB process flag
2013-12-02 17:41:50,839 [Task Scheduler Worker-10] ERROR notification - Unable to get OSS
list
2013-12-03 08:22:39,227 [main] INFO services - Queue type is order
2013-12-03 08:22:39,229 [main] INFO services - Starting the notification thread..
2013-12-03 08:22:39,231 [NBNotifier] INFO services - Fetching the head of the queue
2013-12-03 08:22:39,231 [NBNotifier] INFO services - The Queue is empty
2013-12-03 08:22:39,231 [main] INFO notification - Setting the NB process flag
2013-12-03 08:44:40,287 [main] INFO services - Queue type is order
2013-12-03 08:44:40,289 [main] INFO services - Starting the notification thread..
2013-12-03 08:44:40,290 [NBNotifier] INFO services - Fetching the head of the queue
2013-12-03 08:44:40,290 [NBNotifier] INFO services - The Queue is empty
2013-12-03 08:44:40,290 [main] INFO notification - Setting the NB process flag
2013-12-03 08:56:18,864 [Task Scheduler Worker-8] ERROR notification - Unable to get OSS
list
Related Topics
• Generating and Applying Self-Signed Certificates
• Obtaining and Importing CA-Signed Certificates
• Deleting CA-Signed Certificates
Step 1 Log in to Prime Infrastructure as explained in Connecting Via CLI. Do not enter “configure terminal”
mode.
Step 2 Enter the following command to generate a new RSA key and self-signed certificate with domain
information:
PIServer/admin# ncs key genkey –newdn
You will be prompted for the Distinguished Name (DN) fields for the certificate. It is important to
specify the fully qualified domain name (FQDN) of the server as the domain name that will be used to
access Prime Infrastructure.
Step 3 To make the certificate valid, restart Prime Infrastructure as explained in Restarting Prime Infrastructure.
To avoid login complaints, instruct users to add the self-signed certificate to their browsers’ trust stores
when they next access the Prime Infrastructure login page.
Step 1 Log in to Prime Infrastructure as explained in Connecting Via CLI. Do not enter “configure terminal”
mode.
Step 2 Enter the following command to generate a CSR file in the default backup repository:
PIServer/admin# ncs key genkey -newdn -csr CSRFile.csr repository defaultRepo
where CSRFile is an arbitrary name of your choice (for example: MyCertificate.csr).
Step 3 Copy the CSR file to a location you can access. For example:
PIServer/admin# copy disk:/defaultRepo/CSRFile.csr ftp://your.ftp.server
Step 4 Send the CSR file to a Certificate Authority (CA) of your choice.
The CA will respond by sending you an SSL server certificate and one or more CA certificate files. All
these files will have the filename extension CER. The CA response will indicate which of the files is:
• The SSL server certificate. This is typically given a filename that reflects the host name of the server
to which you will apply it.
• The CA certificates, which are typically given filenames that reflect the name of the CA.
Step 1 Log in to Prime Infrastructure as explained in Connecting Via CLI. Do not enter “configure terminal”
mode.
Step 2 List the short names of all the CA-signed certificates on the Prime Infrastructure server:
PIServer/admin# ncs key listcacert
Step 3 Enter the following command to delete the CA certificate you want:
PIServer/admin# ncs key deletecacert shortname
where shortname is the short name of the CA certificate you want to delete, taken from the listing given
in the output of ncs key listcacert.
Prime Infrastructure
Field Name and Object ID Data Type Event/Alert field Description
cWNotificationTimestamp DateAndTime createTime - NmsAlert Creation time for alarm/event.
eventTime - NmsEvent
cWNotificationUpdatedTimestamp DateAndTime modTime - NmsAlert Modification time for Alarm.
Events do not have modification time.
cWNotificationKey SnmpAdminString objectId - NmsEvent Unique alarm/event ID in string form.
entityString- NmsAlert
cwNotificationCategory CWirelessNotificat NA Category of the Events/Alarms.
ionCategory Possible values are:
unknown
accessPoints
adhocRogue
clients
controllers
coverageHole
interference
contextAwareNotifications
meshLinks
mobilityService
performance
rogueAP
rrm
security
wcs
switch
ncs
cWNotificationSubCategory OCTET STRING Type field in alert and This object represents the subcategory
eventType in event. of the alert.
cWNotificationServerAddress InetAddress N/A Prime Infrastructure IP address.
Prime Infrastructure
Field Name and Object ID Data Type Event/Alert field Description
cWNotificationManagedObject InetAddressType N/A The type of Internet address by which
AddressType the managed object is reachable.
Possible values:
0—unknown
1—IPv4
2—IPv6
3—IPv4z
4—IPv6z
16—DNS
Always set to “1” because Prime
Infrastructure only supports IPv4
addresses.
cWNotificationManagedObject InetAddress getNode() value is used if getNode is populated for events and
Address present some alerts. If it is not null, then it is
used for this field.
cWNotificationSourceDisplay OCTET STRING sourceDisplayName field This object represents the display
Name in alert/event. name of the source of the notification.
cWNotificationDescription OCTET STRING Text - NmsEvent Alarm description string.
Message - NmsAlert
cWNotificationSeverity INTEGER severity - NmsEvent, Severity of the alert/event:
NmsAlert
cleared(1)
critical(3)
major(4)
minor(5)
warning(6)
info(7)
cWNotificationSpecialAttributes OCTET STRING All the attributes in This object represents the specialized
alerts/events apart from attributes in alerts like APAssociated,
the base alert/event class. APDisassociated, RogueAPAlert,
CoverageHoleAlert, and so on. The
string is formatted in property=value
pairs in CSV format.
cWNotificationVirtualDomains OCTET STRING N/A Virtual Domain of the object that
caused the alarm. This field is empty
for the current release.
To view this information... Choose this tab... And see this dashlet
Prime Infrastructure server memory and CPU statistics over time. Health System Health
Alarms and events issued against the Prime Infrastructure server itself, System Alarms
including a list of events, times events occurred, and their severities.
General health statistics for the Prime Infrastructure server, such as the System Information
number of jobs scheduled and running, the number of supported MIB
variables, how much polling the server is doing, and the number of users
logged in.
The relative proportion of the Prime Infrastructure server database taken DB Usage Distribution
up by data on discovered device inventory (“Lifecycle Clients”), their
current status and performance data (“Lifecycle Statistics”), and the
server’s own system data (“Infrastructure” and “DB-Index”)
To view this information... Choose this tab... And see this dashlet
How quickly the Prime Infrastructure server is responding to user API Health API Response Time Summary
service requests for information, such device reachability, alarms and
events, and so on. Shows the maximum, minimum, and average response
times for each API underlying a client service.
The trend over time in how quickly the Prime Infrastructure server is Service Details API Response Time Trend
responding to user service requests.
The activity level for each of the logged-in Prime Infrastructure users, API Calls Per Client Chart
measured by the number of service requests each is generating.
The trend over time in the total number of service requests logged-in API Request Count Trend
clients are generating,
Note You must enter your Cisco.com username and password to access and participate in the forums.
Note To open a support case or access the Cisco Support Community, you must:
• Have a direct Internet connection on the Prime Infrastructure server
• Enter your Cisco.com username and password
Tip For better performance: If you are changing RAM and CPU resource allocations for the virtual machine
on which you run Prime Infrastructure, and you have more than one virtual machine running on the same
hardware, you may also want to change your RAM and CPU resource reservations using the vSphere
Client’s Resource Allocation tab. For details, see the VMware vSphere Client documentation.
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Stop Prime Infrastructure using the ncs stop command (see Stopping Prime Infrastructure).
Step 3 Halt the VMware virtual appliance:
PIServer/admin# halt
Step 4 Launch the vSphere Client, right-click the virtual appliance, then click Edit Settings.
Step 5 To change the RAM allocation, select Memory and change the Memory Size as needed. Then click OK.
Step 6 To change the CPU allocation, select CPUs and select the Number of Virtual Processors from the
drop-down list. Then click OK.
Step 7 To add a new disk (you cannot expand the space of the existing disk):
a. Click Add.
b. Select Hard Disk, then click Next.
c. Check Create a new virtual disk, then click Next.
d. Enter the desired Disk Size and specify a Location for the new virtual disk, then click Next.
e. With the Advanced Options displayed, click Next, then click Finish.
Step 8 Power on the virtual appliance (see Restarting Prime Infrastructure)
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to compact the application database:
PIServer/admin# ncs cleanup
Step 3 When prompted, answer Yes to the deep cleanup option.
Note Automatic client troubleshooting is only available for clients running CCX Version 5 or 6. For a list of
CCX-certified partner manufacturers and their CCX client devices, see the Cisco Compatible Extensions
Client Devices page.
Infrastructure can process up to 414,000 NetFlow host records in a single five-minute aggregation cycle.
With Assurance memory optimization, maximum processing for the same type of data is closer to
800,000 records per cycle.
You can increase the Assurance memory pool without balancing Assurance memory allocations, and
vice versa. But using these two optimization options together is the best way to improve Prime
Infrastructure performance when Assurance features are used.
Related Topics
• Optimizing Memory for Assurance Processing
• Monitoring Assurance Memory Allocation and Demand
• Increasing the Assurance Memory Pool
• Balancing Assurance Memory Allocation
• Resetting Assurance Memory Allocation
• Resetting the Assurance Memory Pool
Related Topics
• Optimizing Memory for Assurance Processing
• Increasing the Assurance Memory Pool
• Balancing Assurance Memory Allocation
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command:
PIServer/admin# ncs tune-resources assurance
Step 3 Restart the Prime Infrastructure server (see Restarting Prime Infrastructure).
Related Topics
• Optimizing Memory for Assurance Processing
• Monitoring Assurance Memory Allocation and Demand
• Balancing Assurance Memory Allocation
• Resetting the Assurance Memory Pool
• Connecting Via CLI
• Restarting Prime Infrastructure
Related Topics
• Optimizing Memory for Assurance Processing
• Monitoring Assurance Memory Allocation and Demand
• Increasing the Assurance Memory Pool
• Balancing Assurance Memory Allocation
• Resetting Assurance Memory Allocation
• Resetting the Assurance Memory Pool
Related Topics
• Optimizing Memory for Assurance Processing
• Balancing Assurance Memory Allocation
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command:
PIServer/admin# ncs tune-resources default
Step 3 Restart the Prime Infrastructure server (see Restarting Prime Infrastructure).
Related Topics
• Optimizing Memory for Assurance Processing
• Increasing the Assurance Memory Pool
• Connecting Via CLI
• Restarting Prime Infrastructure
Related Topics
• Connecting Via CLI
• Starting Prime Infrastructure
• Checking Prime Infrastructure Server Status
• Checking Prime Infrastructure Version and Patch Status
• Stopping Prime Infrastructure
• Restarting Prime Infrastructure
• Removing Prime Infrastructure
• Resetting Prime Infrastructure to Defaults
• Restoring Physical Appliances to Clean State
• Changing the Prime Infrastructure Host Name
• Changing the FTP User Password
• Changing the Root User Password
• Recovering Administrator Passwords on Virtual Appliances
• Recovering Administrator Passwords on Physical Appliances
• Getting the Installation ISO Image
• Checking High Availability Status
Step 1 Start up your SSH client, start an SSH session via your local machine’s command line, or connect to the
dedicated console on the Prime Infrastructure physical or virtual appliance.
Step 2 Log in as appropriate:
a. If connecting via a GUI client: Enter the ID of an active administrator with CLI access and the IP
address or host name of the Prime Infrastructure server. Then initiate the connection.
Or
b. If you are using a command-line client or session: Log in with a command like the following:
[localhost]# ssh -I admin IPHost
Where:
– admin is an active Prime Infrastructure administrator ID with CLI access.
– IPHost is the IP address or host name of the Prime Infrastructure server or appliance.
Or
c. If connecting via console: A prompt is shown for the administrator user name. Enter the user name.
Prime Infrastructure will then prompt you for the password for the administrator ID you entered.
Step 3 Enter the administrative ID password. Prime Infrastructure will present a command prompt like the
following: PIServer/admin#.
Step 4 If the command you need to enter requires that you enter “configure terminal” mode, enter the following
command at the prompt:
PIServer/admin# configure terminal
The prompt will change from PIServer/admin# to PIServer/admin/terminal#.
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to stop the Prime Infrastructure server or appliance:
PIServer/admin# ncs start
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to display the current status of Prime Infrastructure processes and
services:
PIServer/admin# ncs status
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to display the current status of Prime Infrastructure processes and
services:
PIServer/admin# ncs show version
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to stop the Prime Infrastructure server or appliance:
PIServer/admin# ncs stop
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI). Be sure to enter
“configure terminal” mode.
Step 2 Enter the following command:
PIServer/admin# hostname newHostName
Where newHostName is the new host name you want to assign to the Prime Infrastructure server.
Step 3 Restart the Prime Infrastructure server using the ncs stop and ncs start commands, as explained in
Restarting Prime Infrastructure
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command:
PIServer/admin/config# ncs password ftpuser username password password
Where password is the ftpuser login password. You can enter any password, not exceeding 80 characters.
For example:
PIServer/admin# ncs password ftpuser MyFTPUserName password MyFTPUserPassword
CompilerOracle: exclude org/snmp4j/Snmp.send
Loading USER - ftpuser
Validating new password..
Resetting password ..
Resetting password COMPLETED.
EXECUTION STATUS : Success
PIServer/admin#
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Assume root privileges on the server. For example:
PIServer/admin# root
Enter root password:
Starting root bash shell...
ade #
Step 3 Enter the following command:
PIServer/admin# ncs password root password password
Where password is the root user login password. You can enter a password not exceeding 80 characters.
For example:
PIServer/admin# ncs password root password password
CompilerOracle: exclude org/snmp4j/Snmp.send
Loading USER - root
Validating new password..
Resetting password ..
Resetting password COMPLETED.
Step 1 At the Prime Infrastructure OVA server, launch the VMware vSphere client.
Step 2 Upload the installation ISO image to the data store on the OVA virtual machine, as follows:
a. In the vSphere inventory, click Datastores.
b. On the Objects tab, select the datastore to which you will upload the file.
c. Click the Navigate to the datastore file browser icon.
d. If needed, click the Create a new folder icon and create a new folder.
e. Select the folder that you created or select an existing folder, and click the Upload a File icon.
If the Client Integration Access Control dialog box appears, click Allow to allow the plug-in to
access your operating system and proceed with the file upload.
f. On the local computer, find the ISO file and upload it.
g. Refresh the datastore file browser to see the uploaded file in the list.
Step 3 With the ISO image uploaded to a datastore, make it the default boot image, as follows:
a. Using the VMware vSphere client, right-click the deployed OVA and choose Power > Shut down
guest.
b. Select Edit Settings > Hardware, then select CD/DVD drive 1.
c. Under Device Type, select Datastore ISO File, then use the Browse button to select the ISO image
file you uploaded to the datastore.
d. Under Device Status, select Connect at power on.
e. Click the Options tab and select Boot Options. Under Force BIOS Setup, select Next time VM
boots, force entry into BIOS setup Screen. This will force a boot from the virtual machine BIOS
when you restart the virtual machine.
f. Click OK.
g. In the VMware vSphere client, right-click the deployed OVA and choose Power > Power On.
h. In the BIOS setup menu, find the option that controls the boot order of devices and move
DVD/CDROM to the top.
Step 4 Follow the steps below to reset a server administrator password:
a. Save your BIOS settings and exit the BIOS setup menu. The virtual machine will boot from the ISO
image and display a list of boot options.
b. Enter 3 if you are using the keyboard and monitor to access the OVA, or 4 if you are accessing via
command line or console. The vSphere client displays a list of administrator user names.
c. Enter the number shown next to the administrator username for which you want to reset the
password.
d. Enter the new password and verify it with a second entry.
e. Enter Y to save your changes and reboot.
f. Once the virtual machine has rebooted: Using the vSphere client, click on the CD icon and select
Disconnect ISO image.
Step 5 Log in with the new administrator password.
Step 1 Place the appliance recovery CD in the appliance's optical drive and reboot the appliance. The vSphere
client displays a list of boot options.
Step 2 Enter 3 to select the Reset Administrator Password (Keyboard/Monitor) boot option. The vSphere
client displays a list of administrator user names.
Step 3 Enter the number shown next to the administrator user name for which you want to recover (reset) the
password.
Step 4 Enter the new password and verify it with a second entry.
Step 5 Enter Y to save your changes and reboot.
Step 6 Log in with the new administrator password.
If you do not have a copy of the ISO image, you can download it from Cisco.com using the steps below:
Step 4 Select Prime Infrastructure Software to display the list of ISOs and other downloadable image files
for that software version.
Step 5 Download the ISO image from the page.
Step 6 When the download is complete, check that the MD5 checksum of the downloaded file matches the
checksum shown for the file on its Cisco.com download page. If the checksums do not match, the file is
corrupt, and you will need to download it from Cisco.com again.
Step 7 If you need the ISO image on disk: Burn the ISO image to a Dual Layer DVD using DVD authoring
software. For reliable results, we recommend that you conduct the burn at single (1X) speed and with
the “Verify” option turned on.
As with any other system upon which your organization relies, you will need to ensure that Cisco Prime
Infrastructure is backed up regularly, so it can be restored in case of hardware or other failure.
Related Topics
• Backup and Restore Concepts
• Using Automatic Application Backups
• Using Remote Backup Repositories
• Taking Backups From the Command Line
• Restoring From Backups
• Managing Disk Space Issues During Backup and Restore
Related Topics
• Backup Types
• Backup Scheduling
• Backup Repositories
• Backup Filenames
• Validating Backups
• Information Contained in Backup Files
• Using Backup and Restore to Replace Servers
• Backup and Restore in FIPS Mode
Backup Types
Prime Infrastructure creates two types of backups:
• Application backups: These contain all Prime Infrastructure application data, but do not include
host-specific settings, such as the server hostname and IP address.
• Appliance backups: These contain all application data and host-specific settings, including the
hostname, IP address, subnet mask, and default gateway.
Note that:
• Application and appliance backups can be taken from both virtual and hardware appliances.
• Either type of backup can be restored to the same or a new host, as long as the new host has the same
or higher hardware configuration as the host from which the backup was taken.
• You can only restore an appliance backup to a host running the same version of the Prime
Infrastructure server software as the server from which the backup was taken.
• You cannot restore an application backup using the appliance restore command, nor can you restore
an appliance backup using the application backup command.
We recommend:
• If you are evaluating Prime Infrastructure: Use the default automatic application backup to the local
repository.
• If you are running Prime Infrastructure in a production environment, either as a virtual or hardware
appliance: Take regular application backups to a remote backup server. You can use the application
backups to restore your server for all failures except complete failure of the server hardware.
Related Topics
• Using Automatic Application Backups
• Using Remote Backup Repositories
Backup Scheduling
Prime Infrastructure provides automatic, scheduled application backups. This feature is enabled by
default, and creates one application backup file each week, automatically, in the default local backup
repository.
You can change this schedule as needed. You can also take an automatic application backup at any time
from the Prime Infrastructure interface. Appliance backups can only be taken from the command line.
Automatic application backup can create storage-space problems if the backup repository is local to the
Prime Infrastructure server. While this is usually acceptable in test implementations, it s not intended to
substitute for routine scheduled backups to remote servers in a production environment.
In a production environment, most administrators will:
1. Set up remote repositories to hold the backup files.
2. Use the automatic scheduled application backup to create backups on the remote repositories on a
regular schedule.
You can still use the Prime Infrastructure command line to create application or appliance backups at
any time, as needed.
Related Topics
• Using Automatic Application Backups
• Using Remote Backup Repositories
• Scheduling Automatic Application Backups
• Specifying Automatic Application Backup Repositories
• Triggering Application Backups
• Taking Application Backups
• Taking Appliance Backups
Backup Repositories
By default, the automatic application backup feature stores backup files in the local backup repository
/localdisk/defaultRepo. You can use the Prime Infrastructure interface to change the local automatic
application backup repository, or create a new local repository.
You can also specify a remote repository using the Prime Infrastructure interface.
When taking application or appliance backups using the command line, you specify the local or remote
repository you want the backup to be stored in. Administrators in production environments normally
specify a remote repository, accessed via NFS, SFTP or FTP, as part of the command. NFS is a good
choice, as it is typically much faster and more reliable than other protocols.
There is no difference between performing a command line application backup and using the GUI to
perform an application backup. Both actions create the same backup file.
Whenever you use NFS to take backups or restore from a backup, make sure the mounted NFS server
remains active throughout the backup or restore operation. If the NFS server shuts down at any point in
the process, the Prime Infrastructure backup or restore operation will hang without warning or error
message.
Related Topics
• Specifying Automatic Application Backup Repositories
• Using Remote Backup Repositories
Backup Filenames
Automatically created Prime Infrastructure application backup files are assigned a filename with the
format
host-yymmdd-hhmm_VERver_BKSZsize_FIPS_ON_CPUcpus_MEMtarget_RAMram_SWAPswap_AP
P_CKchecksum.tar.gpg, where:
• host is the host name of the server from which the backup was taken. For example: MyHost.
• yymmdd-hhmm the date and time the backup was taken. For example: 140827-0745 for a backup
created on August 27, 2014, at 7:45AM local time.
• ver is the version of Prime Infrastructure from which the backup was taken. For example:
VER2.2.0.0.149 for a backup taken from Prime Infrastructure version 2.2.0.0.149.
• FIPS_ON is a flag that appears if and only if FIPS mode is enabled on the Prime Infrastructure server
from which the backup was taken.
• size is the total size of the backup file. For example: BKSZ15G for a backup of 15 Gigabytes.
• cpus is the total number of CPUs in the server from which the backup was taken. For example: CPU16
for a server with 16 CPUs.
• target is the total amount of system memory in the server from which the backup was taken. For
example: MEM4G for a server with 4 gigabytes of system memory.
• ram is the total amount of RAM in the server from which the backup was taken. For example: RAM15G
for a server with 16 gigabytes of RAM.
• swap is the total size of the swap disk on the server from which the backup was taken. For example:
SWAP15G for a server with 15 gigabytes of swap-disk space.
Validating Backups
Prime Infrastructure performs the following checks to ensure the validity of backups:
1. Before starting the backup process, disk size, fast-recovery area, and control files are validated.
2. The created backup database is validated to ensure that it can be restored.
3. After the application data is zipped, the zipped file is validated against the files that were backed up.
4. The TAR file is validated to make sure that it is correct and complete.
5. The GPG file is validated to make sure that it is correct.
If you manually transfer the backup file, or if you want to verify that the backup transfer is complete,
view the file’s md5CheckSum and file size.
Another best practice for validating a backup is to restore it to a standalone “test” installation of Prime
Infrastructure.
Related Topics
• Backup Scheduling
• Backup Repositories
• Backup Filenames
• Scheduling Automatic Application Backups
• Triggering Application Backups
• Specifying Automatic Application Backup Repositories
• Deleting Local Backup Repositories
• Disabling Automatic Application Backups
• Using Remote Backup Repositories
Related Topics
• Backup Types
• Backup Repositories
• Disabling Automatic Application Backups
Related Topics
• Scheduling Automatic Application Backups
• Taking Application Backups
Related Topics
• Backup Repositories
• Creating Local Backup Repositories
• Deleting Local Backup Repositories
• Using Remote NFS Backup Repositories
• Using Remote FTP Backup Repositories
Related Topics
• Backup Repositories
• Deleting Local Backup Repositories
• Using Remote Backup Repositories
• Using Remote NFS Backup Repositories
• Using Remote FTP Backup Repositories
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to list the local application backup repositories and identify the one that
you want to delete:
PIServer/admin# sh run | begin repository
Step 3 Enter configuration mode:
PIServer/admin# configure terminal
Step 4 Delete the existing repository:
PIServer/admin(config)# no repository repositoryName
Where repositoryName is the name of the repository that you want to delete.
Step 5 Repeat Step 2 to verify that the repository was deleted.
Related Topics
• Creating Local Backup Repositories
• Specifying Automatic Application Backup Repositories
Related Topics
• Scheduling Automatic Application Backups
• Using Remote Backup Repositories
Related Topics
• Types of Backup Repositories
• Scheduling Automatic Application Backups
• Specifying Automatic Application Backup Repositories.
• Disabling Automatic Application Backups
• Using Remote NFS Backup Repositories
• Using Remote SFTP Backup Repositories
• Using Remote FTP Backup Repositories.
• Taking Application Backups
• Taking Appliance Backups
Related Topics
• Scheduling Automatic Application Backups
• Specifying Automatic Application Backup Repositories.
• Disabling Automatic Application Backups
• Using Remote NFS Backup Repositories
• Using Remote SFTP Backup Repositories
• Using Remote FTP Backup Repositories.
• Taking Application Backups
• Taking Appliance Backups
Related Topics
• Using Remote NFS Backup Repositories
• Configuring the NFS Backup Server
Step 1 Log in to the NFS server with a user name that has root privileges, or assume root privileges on the
server.
Step 2 While in root mode, start the NFS service:
[root@server~]# service portmap start
[root@server~]# service nfs start
Step 3 If they do not already exist, create:
• a staging folder to hold temporary files created during backup processing (for example:
/localdisk/staging).
• a storage folder to hold finished backup files (for example: /localdisk/storage).
Step 4 Using VI or another editor, modify the NFS server’s /etc/exports file to expose the staging and storage
folders to the Prime Infrastructure server that will access them. You can do this by adding lines to the file:
stagingPath AccessingIP(rw,sync,no_subtree_check)
storagePath AccessingIP(rw,sync,no_subtree_check)
Where:
• stagingPath is the path name of the staging folder you created.
• storagePath is the path name of the storage folder you created.
• AccessingIP is the IP address of the Prime Infrastructure server that will be accessing the staging
and storage folders on the NFS backup server. This can also be a group of IP addresses under a
specified subnet (for example: 172.18.123.0/16).
Step 5 Load the modified exports file into the Prime Infrastructure server’s running configuration:
[root@server~]# exportfs -a
Step 6 Disable firewall checks for the staging and storage folders, and start the portmap service. For example:
[root@server~]# service iptables stop
[root@server~]# chkconfig iptables off
[root@server~]# service portmap start
Step 7 Make the staging and storage folders writable, then exit:
[root@server~]# chmod 777 stagingPath
[root@server~]# chmod 777 storagePath
[root@server~]# exit
Related Topics
• Before You Begin NFS Backup Configuration
• Configuring Prime Infrastructure to Use the NFS Backup Server
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Assume root privileges on the server. For example:
PIServer/admin# root
Enter root password:
Starting root bash shell...
ade #
Step 3 While in root mode, enable NFS communications with the NFS backup server:
ade# service nfs start
ade# service portmap start
Step 4 Check whether you are able to see the shared stage and storage folders on the remote NFS server from
the Prime Infrastructure server:
ade# rpcinfo –p RemoteServerIP
where RemoteServerIP is the IP address of the NFS server hosting the staging and storage folders (for
example: 198.168.1.1).
If the output of this command does not show the NFS service and its associated ports on the NFS server.
you may need to restart the NFS service on the Prime Infrastructure server:
ade# service nfs restart
Step 5 Exit root mode, then enter config mode and set up Prime Infrastructure to stage its backups on the NFS
server:
ade# exit
PIServer/admin# configure terminal
PIServer/admin(config)# backup-staging-url nfs://RemoteServerIP:/stagingPath
where stagingPath is the path name of the staging folder on the NFS server (for example:
/localdisk/staging).
For example:
ade# exit
PIServer/admin# configure terminal
PIServer/admin(config)# backup-staging-url nfs://198.168.1.1:/localdisk/staging
Step 6 Set up a named Prime Infrastructure repository to store backups on the NFS server, then exit:
PIServer/admin(config)# repository RepositoryName
PIServer/admin(config-Repository)# url nfs://RemoteServerIP:/storagePath
PIServer/admin(config-Repository)# exit
PIServer/admin(config)# exit
Where:
• RepositoryName is the name of the Prime Infrastructure repository (for example: NFSRepo).
• storagePath is the path name of the NFS server’s storage folder (for example:
/localdisk/storage).
For example:
PIServer/admin(config)# repository NFSRepo
PIServer/admin(config-Repository)# url nfs://198.168.1.1:/localdisk/storage
PIServer/admin(config-Repository)# exit
PIServer/admin(config)# exit
Step 7 When taking backups at the command line, specify the new repository name in the backup command.
For example:
PIServer/admin# backup MyBackupFileName repository MyRepo application NCS
To perform backups automatically, specify the new repository name in the Prime Infrastructure web
interface.
Related Topics
• Before You Begin NFS Backup Configuration
• Configuring the NFS Backup Server
• Specifying Automatic Application Backup Repositories
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
Related Topics
• Connecting Via CLI
• Using Remote NFS Backup Repositories
• Taking Application Backups
• Taking Appliance Backups
• Specifying Automatic Application Backup Repositories
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter configuration mode:
PIServer/admin# configure terminal
Step 3 Configure a symbolic link to the remote FTP server:
PIServer/admin(config)# repository repositoryName
PIServer/admin(config-Repository)# url ftp://RemoteServerIP
PIServer/admin(config-Repository)# user userName password plain userPassword
PIServer/admin(config-Repository)# exit
PIServer/admin(config)# exit
Where:
• repositoryName is the name of the repository (for example: MyRepo or PrimeInfrastructure).
• RemoteServerIP is the IP address of the FTP server hosting the shared backup folder.
• userName is the name of a user with write privileges to the repository on the FTP server.
• userPassword is the corresponding password for that user. This password must be 17 characters or
less.
Step 4 Verify creation of the symbolic link:
PIServer/admin# show repository repositoryName
Step 5 When taking backups at the command line, specify the new remote FTP repository as the repository
name in the backup command. For example:
PIServer/admin# backup MyBackupFileName repository MyRepo application NCS
If you want to perform backups automatically, select the repository name you created as the repository
name in the Prime Infrastructure web interface.
Related Topics
• Connecting Via CLI
• Using Remote NFS Backup Repositories
Related Topics
• Taking Application Backups
• Taking Appliance Backups
Related Topics
• Backup Repositories
• Backup Filenames
• Using Remote NFS Backup Repositories
• Using Remote FTP Backup Repositories
• Taking Appliance Backups
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Display the list of appliance backups:
PIServer/admin# show repository repositoryName
where repositoryName is the repository on which you want to store the appliance backup.
Step 3 Back up the appliance:
PIServer/admin# backup filename repository repositoryName
where filename is the name that you want to give the appliance backup file (for example, myBackup).
The date and time of the backup and the tar.gpg filename extension will be appended to the filename you
specify.
Related Topics
• Backup Repositories
• Backup Filenames
• Using Remote NFS Backup Repositories
• Using Remote FTP Backup Repositories
• Taking Application Backups
.Related Topics
• Backup and Restore Concepts
• Using Remote Backup Repositories
• Restoring From Application Backups
• Restoring From Appliance Backups
• Migrating to Another Virtual Appliance Using Backup and Restore
• Migrating to Another Physical Appliance Using Backup and Restore
• Recovering From Failed Restores
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to display the list of application backups:
PIServer/admin# show repository repositoryName
Where repositoryName is the repository from which you want to restore the backup.
Step 3 Identify the application backup file you want to restore and then enter the following command to restore
from that file:
PIServer/admin# restore filename repository repositoryName application NCS
Where filename is the name of the application backup file from which you want to restore.
Step 4 Whenever you restore from a backup, resync your device inventory:
a. Select Inventory > Network Devices.
b. Select the checkbox next to Device Name to select all devices.
c. Click Sync.
Related Topics
• Backup Types
• Backup Repositories
• Backup Filenames
• Restoring From Appliance Backups
• Migrating to Another Virtual Appliance Using Backup and Restore
• Recovering From Failed Restores
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to display the list of appliance backups:
PIServer/admin# show repository repositoryName
Where repositoryName is the repository from which you want to restore the backup.
Step 3 Identify the appliance backup file that you want to restore and then restore from that file:
PIServer/admin# restore filename repository repositoryName
Where filename is the name of the appliance backup file from which you want to restore.
Step 4 Once the restore is complete: If needed, stop the Prime Infrastructure server and use the command line
to change the IP address, subnet mask, default gateway, or host name on the restored server. You will
also need to write the changes to the server’s running configuration and reboot the physical or virtual
appliance. For example:
PIServer/admin# ncs stop
PIServer/admin# configure terminal
PIServer/admin(config)# int GigabitEthernet 0
PIServer/admin(config-GigabitEthernet)# ip address IPAddress subnetMask
PIServer/admin(config-GigabitEthernet)# exit
PIServer/admin(config)# ip default-gateway GatewayIP
PIServer/admin(config)# hostname hostname
PIServer/admin(config)# exit
PIServer/admin# write mem
PIServer/admin# ncs start
PIServer/admin# exit
Reboot the virtual or physical appliance to write these changes to the operating system.
Step 5 Whenever you restore from a backup, resync your device inventory:
a. Select Inventory > Network Devices.
b. Select the checkbox next to Device Name to select all devices.
c. Click Sync.
Related Topics
• Connecting Via CLI
• Backup Types
• Backup Repositories
• Backup Filenames
• Restoring From Application Backups
• Migrating to Another Physical Appliance Using Backup and Restore
• Recovering From Failed Restores
Step 1 If you have not already done so, set up a remote backup repository for the old host, as explained in Using
Remote Backup Repositories.
Step 2 Take an application backup of the old host on the remote repository, as explained in Taking Application
Backups.
Step 3 Install the new host as explained in the Cisco Prime Infrastructure 2.2 Quick Start Guide.
Step 4 Configure the new host to use the same remote backup repository as the old host, as explained in Using
Remote Backup Repositories.
Step 5 Restore the application backup on the remote repository to the new host, as explained in Restoring From
Application Backups.
Related Topics
• Using Remote Backup Repositories
• Taking Application Backups
• Restoring From Application Backups
Related Topics
• Using Remote Backup Repositories
• Taking Application Backups
• Taking Appliance Backups
• Restoring From Appliance Backups
• Restoring From Application Backups
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to reset the corrupted database:
PIServer/admin# ncs run reset db
Related Topics
• Connecting Via CLI
• Restoring From Application Backups
• Restoring From Appliance Backups
Related Topics
• Connecting Via CLI
• Compacting the Prime Infrastructure Database
• Using Remote Backup Repositories
• Migrating to Another Virtual Appliance Using Backup and Restore
• Migrating to Another Physical Appliance Using Backup and Restore
• Managing Disk Space Issues
• Delete all events after—Enter the number of days after which all the events are deleted. If you want
this deletion task to be performed first, set its value smaller than all the other Alarm and Events
Cleanup Options.
Note Cisco Prime Infrastructure deletes old alarms nightly, as part of normal data cleanup tasks, and
checks the storage size of the database alarm table once an hour. When the alarm table exceeds
the 300,000 limit, Prime Infrastructure deletes the oldest cleared alarms until the alarm table size
is within the limit. If you want to keep cleared alarms for more than seven days, then you can
specify a value more than seven days in the Delete cleared non-security alarms after text box,
until the alarm table size reaches the limit.
Step 4 In the Syslog Cleanup Options area, in the Delete all syslogs after text box, enter the number of days
after which all aged syslogs are to be deleted.
Step 5 Modify the Alarm Display Options as needed:
• Hide acknowledged alarms—When the check box is selected, Acknowledged alarms do not appear
in the Alarm Summary page. This option is enabled by default. Emails are not generated for
acknowledged alarms, regardless of severity change.
• Hide assigned alarms—When the check box is selected, assigned alarms do not appear in the Alarm
Summary page.
• Hide cleared alarms—When the check box is selected, cleared alarms do not appear in the Alarm
Summary page. This option is enabled by default.
• Add controller name to alarm messages—Select the check box to add the name of the controller to
alarm messages.
• Add Prime Infrastructure address to email notifications—Select the check box to add the Prime
Infrastructure address to email notifications.
Note Changes in these options affect the Alarm Summary page only. Quick searches for alarms for
any entity will display all alarms for that entity, regardless of alarm state.
• Enable Secure Message Mode—Select the check box to enable a secure message mode. If you select
the Mask IP Address and Mask Controller Name check boxes, the alarm emails are sent in secure
mode where all the IP addresses and controller names are masked.
Step 7 Modify the Alarm Other Settings:
• Controller license count threshold—Enter the minimum number of available controller licenses you
want to maintain. An alarm is triggered if the number of available controller licenses falls below this
threshold.
• Controller access point count threshold—Enter the maximum number of available controller access
points you want to maintain. An alarm is triggered if the number of available access points exceeds
this threshold limit.
Step 8 Click Save.
Step 1 Choose Administration > System Settings > Change Audit Notification.
Step 2 Select the Enable Change Audit Notification check box to enable notifications.
Step 3 Click Save.
In addition to sending JMS notifications, Prime Infrastructure also sends Syslog messages to notify the
Add/Delete/Edit/Create events that take place in the following features:
• Device management
• Device community and credential changes
• User management
• Configuration templates management
• Monitoring templates management
• Job management
• Login/logout
• Image distribution
• Configuration changes
• Inventory changes
To configure Syslog message notification settings, follow these steps:
Step 1 Choose Administration > System settings > Change Audit Notification.
Step 2 Enter the IP Address and TCP Port Number in the Syslog Receiver pane.
Step 3 Click Save.
Step 4 Click the Edit or Delete buttons, if you want to change or delete the Syslog message notification
settings.
Note If you have configured syslog message notification settings but are still not receiving syslogs, you may
need to change the anti-virus or firewall settings on the destination syslog receiver to permit reception
of syslog messages.
Step 1 Choose Administration > Logging. The General Logging Options Screen appears.
Step 2 Choose a message level.
Step 3 Select the check boxes within the Enable Log Module option to enable various administration modules.
Click Log Modules to select all modules.
Step 4 In the Log File Settings section, enter the required settings. These settings will be effective after you
restart Prime Infrastructure.
By default, the File Prefix entry is ncs-%g-%u.log where %g is a sequential number for the log file, and
%u is a unique number assigned by the local disk file system. For example, the first log file created is
named ncs-1-0.log.
Step 5 Click Download to download the log file to your local machine.
Note The logs.zip filename includes a prefix with the hostname, date, and time so that you can easily
identify the stored log file. An HTML file that documents the log files is included in the ZIP file.
Step 6 Enter the Email ID or Email IDs separated by commas to send the log file, then click Send.
Note To send the log file in an email, you must have configured an email server.
Caution Leaving the Message Level at Trace for a long period of time can adversely affect performance.
Step 1 In Classic view: Choose Design > Mobility Services > Mobility Services Engines, then select the name
of the mobility services engine that you want to configure.
Step 2 Choose System > Logs, then choose the appropriate options from the Logging Level drop-down list.
There are four logging options: Off, Error, Information, and Trace. All log records with a log level of
Error or preceding are logged to a new error log file locserver-error-%u-%g.log. This is an additional log
file maintained along with the location server locserver-%u-%g.log log file. The error log file consists
of logs of Error level along with their context information. The contextual information consists of 25 log
records prior to the error. You can maintain up to 10 error log files. The maximum size allowed for each
log file is 10 MB.
Caution Use Error and Trace only when directed to do so by Cisco TAC personnel.
Step 3 Select the Enable check box next to each element listed in that section to begin logging its events.
Step 4 Select the Enable check box in the Advanced Parameters dialog box to enable advanced debugging. By
default, this option is disabled.
Step 5 To download log files from the server, click Download Logs. See Downloading Mobility Services
Engine Log Files for more information.
Step 6 In the Log File Parameters area, enter the following:
• The number of log files to be maintained in the mobility services engine. You can maintain a
minimum of 5 log files and a maximum of 20 log files in the mobility services engine.
• The maximum log file size in MB. The minimum log file size is 10 MB and the maximum is 50 MB.
Step 7 In the MAC Address Based Logging Parameters area, do the following:
• Select the Enable check box to enable MAC address logging. By default, this option is disabled.
• Add one or more MAC addresses for which you want to enable logging. You can also remove MAC
addresses that you have already added by choosing the MAC address from the list and clicking
Remove (see MAC Address-Based Logging).
Step 8 Click Save to apply your changes.
Step 1 In Classic view: Choose Design > Mobility Services > Mobility Services Engines.
Step 2 Select the name of the mobility services engine to view its status.
Step 3 From the left sidebar menu, choose System > Logs.
Step 4 In the Download Logs area, click Download Logs.
Step 5 Follow the instructions in the File Download dialog box to open the file or save the zip file to your
system.
Step 1 Choose Administration > System Settings > Support Request Settings.
Step 2 Select the type of interaction you prefer:
• Enable interactions directly from the server—Specify this option to create the support case
directly from the Prime Infrastructure server. Emails to the support provider are sent from the email
address associated with the Prime Infrastructure server or the email address you specify.
• Interactions via client system only—Specify this option to download the information required for
your support case to a client machine. You must then email the downloaded support case details and
information to the support provider.
Step 3 Select your technical support provider:
• Click Cisco to open a support case with Cisco Technical Support, then enter your Cisco.com
credentials. Click Test Connectivity to check the connectivity to the following servers:
– Prime Infrastructure mail server
– Cisco support server
– Forum server
• Click Third-party Support Provider to create a service request with a third-party support provider.
You will need to enter the provider’s email address, the subject line, and the website URL.
One of the roles of an administrator is to manage Cisco Prime Infrastructure’s network data collection
and retention so that it:
• Scales to fit the real needs of the system’s users.
• Minimizes the burden on monitored devices, applications, and network bandwidth.
• Survives hardware failures.
The following topics explain how to achieve these goals and perform other data management tasks.
• Specifying Performance, Trend and Health Data Retention
• Specifying Client Data Retrieval and Retention
• About Prime Infrastructure Historical Data Retention
• Enabling Data Deduplication
• Controlling Report Storage and Retention
• Specifying Inventory Collection After Receiving Events
• Controlling Configuration Deployment Behavior
• Controlling Background Data Collection Tasks
• Migrating Data from Cisco Prime LMS to Cisco Prime Infrastructure
Related Topics
• About Prime Infrastructure Historical Data Retention
• Specifying Client Data Retrieval and Retention
Related Topics
• About Prime Infrastructure Historical Data Retention
• Specifying Performance, Trend and Health Data Retention
Step 3 To specify devices and configuration commands to exclude from archived configurations:
a. Click the Advanced tab.
b. In the Product Family list, choose the device(s) for which you want to specify configuration
commands to exclude.
Use the List/Tree View dropdown, or click the > icons to drill down to individual product types and
models for which you want to specify exclude commands.
c. In the Command Exclude List, enter (separated by commas) the configuration commands you want
to exclude for the currently selected device family, type, or model.
If the device(s) you select has configuration changes and Prime Infrastructure detects that the
change is one of the specified commands in the Exclude List, Prime Infrastructure will not create an
archived version of the configuration with this change.
d. Click Save.
e. To remove a specified set of command exclusions for a device family, type or model, select the
device(s) in the Product Family list and click Reset.
To enable or disable background data collection tasks in bulk, follow these steps:
Task
Task Name Status Default Schedule Description
AP Image Pre-Download Status Disabled 15 minutes Allows you to see the Image Predownload status of the
associated APs in the controllers. To see the status of the
access points, the Pre-download software to APs check
box should be selected while downloading software to the
controller.
Autonomous AP CPU and Enabled 15 minutes Collects information about memory and CPU utilization of
Memory Utilization autonomous APs.
Autonomous AP Inventory Enabled 180 minutes Collects the inventory information for autonomous APs.
Autonomous AP Radio Enabled 15 minutes Collects information about radio performance information
Performance as well as radio up or down status for autonomous APs.
Autonomous AP Tx Power and Enabled 30 minutes Collects information about radio performance of
Channel Utilization autonomous APs.
CCX Client Statistics Disabled 60 minutes Collects the Dot11 and security statistics for CCX Version
5 and Version 6 clients.
CleanAir Air Quality Enabled 15 minutes Collects information about CleanAir air quality.
Client Statistics Enabled 15 minutes Retrieves the statistical information for the autonomous
and lightweight clients.
Controller Performance Enabled 30 minutes Collects performance information for controllers.
Guest Sessions Enabled 15 minutes Collects information about the guest sessions.
Interferers Enabled 15 minutes Collects information about the interferers.
Media Stream Clients Enabled 15 minutes Collects information about media stream for clients.
Mesh link Performance Enabled 10 minutes Collects information about the performance of Mesh links.
Mesh Link Status Enabled 5 minutes Collects status of the Mesh links.
Mobility Service Performance Enabled 15 minutes Collects information about the performance of mobility
service engines.
Radio Performance Enabled 15 minutes Collects statistics from wireless radios.
Radio Voice Performance Enabled 15 minutes Collects voice statistics from wireless radios.
Rogue AP Enabled 120 minutes Collects information about the rogue access points.
Switch CPU and Memory Poll Enabled 30 minutes Collects information about switch CPU and memory poll.
Switch Inventory Enabled Daily at Collects inventory information for switches.
midnight
Traffic Stream Metrics Enabled 8 minutes Retrieves traffic stream metrics for the clients.
Unmanaged APs Enabled 15 minutes Collects poll information for unmanaged access points.
Task
Task Name Status Default Schedule Description
Wireless Controller Inventory Disabled Daily at Collects inventory information for wireless controllers.
midnight
Wireless Controller Performance Enabled 30 minutes Collects performance statistics for wireless controllers.
Default
Task Name Schedule Description Editable Options
Appliance Status 5 minutes Lets you schedule appliance polling. Enable—Select this check box to enable appliance
This task populates the appliance status polling.
polling details from the Interval—Enter the interval, in minutes, between
Administration > Appliance > polls. The valid range is 1 to 10800 minutes.
Appliance Status page. In addition,
this background task populates
information such as the performance
and fault checking capabilities of the
appliance.
Autonomous AP 5 minutes Lets you schedule status polling of Enable—Select this check box to enable status
Operational autonomous wireless access points. polling of autonomous APs.
Status
Interval—Valid interval is from 1 to10080.
Autonomous 5 minutes Lets you schedule status polling of Enable—Select this check box to enable
Client Status autonomous AP clients. autonomous client status polling.
Interval—Enter the interval, in minutes, between
polls. The valid range is 1 to 10800 minutes.
Default
Task Name Schedule Description Editable Options
Wireless Daily at 4 This task performs an audit. It verifies Enable—Select this check box to enable
Configuration am. the config for mismatches but does not configuration synchronization.
Audit take actions on it.
Enable—Select this check box to enable Network
Audit.
Enable—Select this check box to enable Security
Index calculation.
Enable—Select this check box to enable RRM
audit.
Interval—Enter the interval, in days, between each
configuration synchronization. The valid range is
1 to 360 days.
Time of Day—Enter the time of the day that you
want the configuration synchronization to happen.
The valid format is hh:mm AM|PM. For example,
12:49 AM.
Controller Daily at 10 Lets you view controller configuration Enable—Select this check box to enable controller
Configuration pm backup activities. configuration backup.
Backup Interval—Enter the interval, in days, between
controller configuration backups. The valid range
is 1 to 360 days.
Time of Day—Enter the time of the day that you
want the configuration backup to happen. The
valid format is hh:mm AM|PM. For example,
12:49 AM.
TFTP Server—If selected, also choose in the
dropdown the TFTP server to which you want to
back up the controller configurations.
FTP Server—If selected, enter the user name,
password, and port address for the FTP server to
which you want to back up the controller
configurations.
Controller 5 minutes Lets you schedule controller Enable—Select this check box to enable controller
Operational operational status polling. configuration status polling.
Status
Interval—Enter the interval, in minutes, between
controller status polls. The valid range is 1 to
10800 minutes.
Data Cleanup Daily at 2 Lets you schedule daily data file Time of Day—Enter the time of the day that you
am. cleanup. want the data cleanup to happen. The valid format
is hh:mm AM|PM. For example, 12:49 AM.
Default: Enabled.
Default
Task Name Schedule Description Editable Options
Device Data 30 minutes Lets you schedule data collection based Enabled—Select this check box to enable data
Collector on specified command-line interface collection for a specified controller.
(CLI) commands at a configured time
Controller IP address—The IP address of the
interval.
Controller to collect device data from.
CLI Commands—Enter the CLI commands,
separated by commas, that you want to run on the
specified device.
Clean Start—Select this check box to enable a
clean start before data collection.
Repeat—Enter the number of times that you want
the data collection to be repeated.
Interval—Enter the interval, in days, between each
device data collection. The valid range is 1 to 360
days.
Guest Accounts Daily at 1 Lets you schedule guest account Enable—Select this check box to enable guest
Sync am. polling and synchronization. account synchronization.
Interval—Enter the interval, in days, between each
guest account synchronization. The valid range is
1 to 360 days.
Time of Day—Enter the time of the day that you
want the guest account synchronization to happen.
The valid format is hh:mm AM|PM. For example,
12:49 AM.
Identity Services 15 minutes Lets you schedule the Identity Services Enable—Select this check box to enable Identity
Engine Status Engine polling. Services Engine polling.
Interval—Enter the interval, in days, between each
Identity Services Engine poll. The valid range is 1
to 360 days.
License Status 4 hours. Lets you schedule license status Enable—Select this check box to enable license
polling. status polling.
Interval—Enter the interval, in days, between each
license status poll. The valid range is 1 to 360
days.
Lightweight AP 5 minutes. Lets you schedule Lightweight AP Enable—Select this check box to enable
Operational operational status polling. Lightweight AP Operational Status polling.
Status
Interval—Enter the interval, in days, between each
Lightweight AP Operational Status poll. The valid
range is 1 to 360 days.
Default
Task Name Schedule Description Editable Options
Lightweight 5 minutes. Lets you discover Lightweight AP Enable—Select this check box to enable
Client Status clients from the network. Lightweight Client Status polling.
Interval—Enter the interval, in days, between each
Lightweight Client Status poll. The valid range is
1 to 360 days.
Mobility Service Every 7 Lets you schedule automatic mobility Enable—Select this check box to enable automatic
Backup days at 1 services backups. mobility service backups.
am.
Max UI backups to keep—Enter the maximum
number of automatic mobility services backups to
keep.
Interval—Enter the interval, in days, between each
mobility services backup. The valid range is 1 to
360 days.
Time of Day—Enter the time of day that you want
each mobility services backup to be taken. The
valid format is hh:mm AM|PM. For example,
12:49 AM.
Mobility Service 5 minutes. Lets you schedule mobility services Enable—Select this check box to enable mobility
Status status polling. services status polling.
Interval—Enter the interval, in days, between each
mobility services status poll. The valid range is 1
to 360 days.
Mobility Service 60 minutes. Lets you schedule mobility services Out of Sync Alerts—Select this check box to
Synchronization synchronization. enable out-of-sync alerts.
Smart Synchronization—Select this check box to
enable smart synchronization.
Interval—Enter the interval, in minutes, between
each mobility services synchronization. The valid
range is 1 to 10080 minutes.
Mobility Status 5 minutes Lets you schedule status polling of Enable—Select this check box to enable mobility
Task mobility services engines. status polling.
Interval—Enter the interval, in minutes, between
each mobility status poll. The valid range is 1 to
10080 minutes.
Default
Task Name Schedule Description Editable Options
Prime Every 7 Lets you schedule automatic Prime Enabled—Select this check box to enable
Infrastructure days at 1 Infrastructure server backups. The automatic Prime Infrastructure server backup.
Server Backup AM (01:00) backups created are application
Backup Repository—Enter the name of the local
backups.
or remote backup repository where automatic
backups are stored.
Max UI backups to keep—Enter the maximum
number of automatic backups to keep (affects local
repositories only).
Interval—Enter the interval, in days, between each
automatic Prime Infrastructure backup. The valid
range is 1 to 7 days.
Time of Day—Enter the time of the day that you
want Prime Infrastructure server backups to be
taken. Use 24-hour format (for example, 13:49).
OSS Server 5 minutes. Lets you schedule OSS server status Enable—Select this check box to enable OSS
Status polling. Server polling.
Interval—Enter the interval, in minutes, between
each OSS server poll. The valid range is 1 to 10080
minutes.
Redundancy 60 minutes Lets you schedule redundancy status Enabled—Select this check box to enable
Status polling of primary and secondary Redundancy status polling.
controllers. Interval—Enter the interval, in minutes, between
each poll.The valid range is 1 to 10080 minutes.
Switch NMSP 4 hours Lets you schedule Switch Network Enable—Select this check box to enable Switch
and Location Mobility Services Protocol (NMSP) NMSP and Civic Location status polling.
Status and Civic Location status polling.
Interval—Enter the interval, in minutes, between
each poll. The valid range is 1 to 10080 minutes.
Switch 5 minutes. Lets you schedule switch operational Enable—Select this check box to enable switch
Operational Full poll is status polling. status polling.
Status 60 minutes.
Interval—Enter the interval, in minutes, between
each poll. The valid range is 1 to 10080 minutes.
Full operational status interval—Enter the
interval, in minutes, between full switch
operational status polls. The valid range is 1 to
1440 minutes.
Create LinkDown Event—Select this check box to
have Prime Infrastructure generate alarms for both
access and trunk ports.
Third party 3 hours Lets you schedule operational status Enabled—Select this check box to enable
Access Point polling of third party APs. third-party AP operational status polling.
Operational Interval—Enter the interval, in hours, between
Status each poll. The valid range is 3 to 4 hours.
Default
Task Name Schedule Description Editable Options
Third party 3 hours Lets you schedule reachability status Enabled—Select this check box to enable
Controller polling of third-party controllers. reachability status polling of third-party
Operational controllers.
Status
Interval—Enter the interval, in hours, between
status polls. The valid range is 3 to 4 hours.
wIPS Alarm Sync 120 Lets you schedule wIPS alarm Enable—Select this check box to enable wIPS
minutes synchronization. alarm synchronization.
Interval—Enter the interval, in minutes, between
each synchronization. The valid range is 1 to
10080 minutes.
Wired Client 2 hours. Lets you schedule wired client status Enable—Select this check box to enable wired
Status polling. client status polling.
Interval—Enter the interval, in hours, between
each status poll. The valid range is 1 to 8640 hours.
Major Polling—Specify two times of day at which
you want to poll all wireless clients for their status.
The valid format is hh:mm AM|PM. For example,
12:49 AM.
where:
• location is a fully qualified URL, including access protocol, for the location of the LMS backup
data. For example: ftp://10.77.213.137/opt/lms, sftp://10.77.213.137/opt/lms, or
fdisk:foldername.
Note The default network address is 0.0.0.0, which indicates the entire network. An SNMP credential
is defined per network so only network addresses are allowed. 0.0.0.0 is the SNMP credential
default and is used when no specific SNMP credential is defined. You should update the
prepopulated SNMP credential with your own SNMP information.
Step 4 To add a new SNMP entry, choose Select a command > Add SNMP Entries, then click Go (see Adding
SNMP Credentials).
Note In CLI templates, you are not required to answer the question responses (such as Yes or No
answer to a command, Press enter to continue, and so on.). This is automatically performed by
Prime Infrastructure.
Step 1 Add switches with full license in Configure > Switches page. See the Adding Switches section in Cisco
Prime Infrastructure Classic View Configuration Guide for more details.
Step 2 Enable Auto switch port tracing in Administration > System Settings > Rogue AP Settings page. See
the Configuring Auto Switch Port Tracing Criteria on the Prime Infrastructure section in Cisco Prime
Infrastructure Classic View Configuration Guide for more details.
Step 3 Schedule to run wired client status Major Polling background task in Administration > Background
Task page.
Step 4 Click the Trace switch port icon in Rogue AP detail page. New pop up will show details of switch port
traced. Click the detail status to check trace status such as started/Found, and so on.
Note • Manual SPT will work, even if you do not add any switch to Prime Infrastructure. But you should
configure the SNMP credentials correctly in Administration > System Settings > SNMP
Credentials page.
• If a switch is added to Prime Infrastructure by selecting Configure > Switches, the SNMP
credentials entered in the Configure > Switches page will override any switch SNMP credentials
entered here, and will be used for switch port tracing. You can change the switch SNMP credentials
in the Configure > Switches page. Prime Infrastructure will not require any license for adding
switch with SPT and will not display wired clients connected to the switches. The Monitor > Switch
page will not display the switch details added with SPT.
• Prime Infrastructure requires full license for adding switch. The Monitor > Switch page will
display the switch details added with full license. Prime Infrastructure will also display wired clients
connected to switches. Location of switches is tracked with MSE.
Step 1 Choose Administration > System Settings > Switch Port Trace.
Step 2 Configure the following basic settings:
• MAC address +1/-1 search—Select the check box to enable.
This search involves the MAC address +1/-1 convention where the wired-side MAC address of the
rogue access point is obtained by adding or subtracting the radio MAC address by one.
• Rogue client MAC address search—Select the check box to enable.
When a rogue access point client exists, the MAC address of the client is added to the searchable
MAC address list.
• Vendor (OUI) search—Select the check box to enable. OUI refers to Organizational Unique
Identifier search which searches the first three bytes in a MAC address.
• Exclude switch trunk ports—Select the check box to exclude switch trunk ports from the switch port
trace.
Note When more than one port is traced for a given MAC address, additional checks are
performed to improve accuracy. These checks include the: trunk port, non-AP CDP
neighbors present on the port, and whether or not the MAC address is the only one on this
port.
• Exclude device list—Select the check box to exclude additional devices from the trace. Enter into
the device list text box each device that you want to exclude from the switch port trace. Separate
device names with a comma.
• Max hop count—Enter the maximum number of hops for this trace. Keep in mind that the greater
the hop count, the longer the switch port trace takes to perform.
Note This hop count value is not applicable for Auto SPT.
• Exclude vendor list—Enter in the vendor list text box any vendors that you want to exclude from the
switch port trace. Separate vendor names with commas. The vendor list is not case sensitive.
Step 3 Configure the following advanced settings:
• TraceRogueAP task max thread—Switch port tracing uses multiple threads to trace rogue access
points. This field indicates the maximum number of rogue access points that can be traced on
parallel threads.
• TraceRogueAP max queue size—Switch port tracing maintains a queue to trace rogue access points.
Whenever you select a rogue access point for tracing, it is queued for processing. This field indicates
the maximum number of entries that you can store in the queue.
• SwitchTask max thread—Switch port tracing uses multiple threads to query switch devices. This
field indicates the maximum number of switch devices that you can query on parallel threads.
Note The default value for these parameters should be good for normal operations. These parameters
directly impact the performance of switch port tracing and Prime Infrastructure. Unless required,
We do not recommend that you alter these parameters.
Note Prime Infrastructure uses CDP to discover neighbors during tracing. When the neighbors are
verified, Prime Infrastructure uses the CDP capabilities field to determine whether or not the
neighbor device is a valid switch. If the neighbor device is not a valid switch, it is not traced.
Step 4 Click Save to confirm changes made. Click Reset to return the page to the original settings. Click
Factory Reset to return settings to the factory defaults.
See Switch Port Tracing Details for additional information on the Switch Port Tracing Details dialog
box.
• An Ethernet connection should exist between the rogue access point and the Cisco switch.
• There should be some traffic between the rogue access point and the Ethernet switch.
• The rogue access point should be connected to a switch within the max hop limit. Default hop is 2.
Max hop is 10.
• If SNMPv3 is used, then make sure you use the context option and create one for each VLAN in
addition to the one for the main group (which is required for non-VLAN based MIBs).
To ensure continued operation in case of failure, Cisco Prime Infrastructure provides a high availability
(HA) framework. HA uses a pair of linked, synchronized Prime Infrastructure servers to minimize or
eliminate the impact of application or hardware failures that may take place on either server.
• How High Availability Works
• Planning HA Deployments
• Setting Up High Availability
• Monitoring High Availability
• Setting Up HA in FIPS Mode
• High Availability Reference Information
DB (wcs) DB (wcss1)
Health Health
Configuration Monitor Monitor Configuration
Files (HM) (HM) Files
363705
Spring RPC SOAP-based
"Health Check" heartbeat (5 secs)
An HA deployment consists of two Prime Infrastructure servers: a primary and a secondary. Under
normal circumstances, the primary server is active and manages the network. The corresponding
secondary server is passive. The secondary server is in constant communication with the primary server
and monitoring the primary server’s status. The secondary also has a complete copy of the data on the
primary, but it does not actively manage the network until the primary fails. When the primary fails, the
secondary takes over (you can trigger this manually, which is recommended, or have it triggered
automatically). You use the secondary server to manage the network while working to restore access to
the primary server. When the primary is available again, you can initiate a failback operation and resume
network management via the primary.
If you choose to deploy the primary and secondary servers on the same IP subnet, you can configure your
devices to send a notifications to Prime Infrastructure at a single virtual IP address. If you choose to
disperse the two servers geographically, such as to facilitate disaster recovery, you will need to configure
your devices to send notifications to both servers.
Related Topics
• About the Primary and Secondary Servers
• Sources of Failure
• File and Database Synchronization
• HA Server Communications
Sources of Failure
Prime Infrastructure servers can fail due to issues in one or more of the following areas:
• Application Processes: Failure of one or more of the Prime Infrastructure server processes,
including NMS Server, MATLAB, TFTP, FTP, and so on. You can view the operational status of
each of these application processes by running the ncs status command through the admin console.
• Database Server: One or more database-related processes could be down. The Database Server runs
as a service in Prime Infrastructure.
• Network: Problems with network access or reachability issues.
• System: Problems related to the server's physical hardware or operating system.
• Virtual Machine (VM): Problems with the VM environment on which the primary and secondary
servers were installed (if HA is running in a VM environment).
By default, the HA framework is configured to copy all the required configuration data, including:
• Report configurations
• Configuration Templates
• TFTP-root
• Administration settings
• Licensing files
• Key store
HA Server Communications
The primary and secondary HA servers exchange the following messages in order to maintain the health
of the HA system:
• Database Sync: Includes all the information necessary to ensure that the databases on the primary
and secondary servers are running and synchronized.
• File Sync: Includes frequently updated configuration files. These are synchronized every 11
seconds, while other infrequently updated configuration files are synchronized every 500 seconds.
• Process Sync: Ensures that application- and database-related processes are running. These messages
fall under the Heartbeat category.
• Health Monitor Sync: These messages check for the following failure conditions:
– Network failures
– System failures (in the server hardware and operating system)
– Health Monitor failures
1 Settings area displays Health Monitor state 2 Status indicates current functional status of the
and configuration detail in five separate HA setup (green check mark indicates that HA
sections. is on and working).
3 Events table displays all current HA-related 4 Secondary IP Address identifies the IP of the
events, in chronological order, with most peer server for this primary server (on the
recent event at the top. secondary server, this field is labeled “Primary
IP Address”).
5 State shows current HA state of the server on 6 Logging lets you change the logging level
which this instance of Health Monitor is (your choice of Error, Informational, or Trace).
running. You must press Save to change the logging
level.
7 Failover Type shows whether you have 8 Action shows actions you can perform, such as
Manual or Automatic failover configured. failover or failback. Action buttons are enabled
only when Health Monitor detects HA state
changes needing action.
9 Logs area lets you download Health Monitor 10 Identifies the HA server whose Health Monitor
log files. web page you are viewing.
Virtual IP Addressing
Under normal circumstances, you configure the devices that you manage using Prime Infrastructure to
send their syslogs, SNMP traps and other notifications to the Prime Infrastructure server’s IP address.
When HA is implemented, you will have two separate Prime Infrastructure servers, with two different
IP addresses. If we fail to reconfigure devices to send their notifications to the secondary server as well,
then when the secondary Prime Infrastructure server goes into Active mode, none of these notifications
will be received by the secondary server.
To avoid this additional device configuration overhead, HA supports use of a virtual IP that both servers
can share as the Management Address. The two servers will switch IPs as needed during failover and
failback processes. At any given time, the virtual IP Address will always point to the correct Prime
Infrastructure server.
You can enable virtual IP addressing during HA setup, by specifying that you want to use this feature
and then specifying the virtual IPv4 and IPv6 addresses you want to the servers to use (see Setting Up
High Availability).
Note that you cannot use this feature unless the addresses for both of the HA servers and the virtual IP
are all in the same subnet. This can have an impact on how you choose to deploy your HA servers (see
Planning HA Deployments and Using the Local Model).
Planning HA Deployments
Prime Infrastructure’s HA feature supports the following deployment models:
• Local: Both of the HA servers are located on the same subnet (giving them Layer 2 proximity),
usually in the same data center.
• Campus: Both HA servers are located in different subnets connected via LAN. Typically, they will
be deployed on a single campus, but at different locations within the campus.
• Remote: Each HA server is located in a separate, remote subnet connected via WAN. Each server
is in a different facility. The facilities are geographically dispersed across countries or continents.
The following sections explain the advantages and disadvantage of each model, and discusses underlying
restrictions that affect all deployment models.
HA will function using any of the supported deployment models. The main restriction is on HA’s
performance and reliability, which depends on the bandwidth and latency criteria discussed in Network
Throughput Restrictions on HA. As long as you are able to successfully manage these parameters, it is
a business decision (based on business parameters, such as cost, enterprise size, geography, compliance
standards, and so on) as to which of the available deployment models you choose to implement.
Related Topics
• Network Throughput Restrictions on HA
• Using the Local Model
• Using the Campus Model
• Using the Remote Model
• What If I Cannot Use Virtual IP Addressing?
• Automatic Versus Manual Failover
In addition to this main advantage, the Local model also has the following advantages:
• Usually provides the highest bandwidth and lowest latency.
• Simplified administration.
• Device configuration for forwarding syslogs and SNMP notifications is much easier.
The Local model has the following disadvantages:
• Being co-located in the same data center exposes them to site-wide failures, including power outages
and natural disasters.
• Increased exposure to catastrophic site impacts will complicate business continuity planning and
may increase disaster-recovery insurance costs.
Related Topics
• Before You Begin Setting Up High Availability
• Installing the Secondary Server
• Registering High Availability on the Primary Server
• What Happens During HA Registration
• Patching Paired High Availability Servers
• Patching New High Availability Servers
• Accessing the Health Monitor Web Page
• Setting Up HA in FIPS Mode
Step 1 Begin installing the Prime Infrastructure server software on your secondary server just as you would for
a primary server. For instructions on installing the server, see the Cisco Prime Infrastructure Quick Start
Guide
Step 2 During the installation, you will be prompted as follows:
Will this server be used as a secondary for HA? (yes/no)
Enter yes at the prompt.
Step 3 You will then be prompted for the HA authentication key, as follows:
Enter Authentication Key:
Enter the authentication key at the prompt. Enter it again at the confirmation prompt.
Step 4 When the secondary server is installed:
a. Use the CLI show version command on both servers, to verify that they are at the same version and
patch level (see Checking Prime Infrastructure Version and Patch Status).
b. Register HA on the primary server (see Registering High Availability on the Primary Server).
Step 1 Log in to Prime Infrastructure with a user ID and password that has administrator privileges.
Step 2 From the menu, select Administration > System Settings > High Availability. Prime Infrastructure
displays the HA status page.
Step 3 Select HA Configuration and then complete the fields as follows:
• Secondary Server: Enter the IP address or the host name of the secondary server.
• Authentication Key: Enter the authentication key password you set during the secondary server
installation.
• Email Address: Enter the address (or comma-separated list of addresses) to which notification
about HA state changes should be mailed. If you have already configured email notifications using
the Mail Server Configuration page (see Configuring Email Settings), the email addresses you
enter here will be appended to the list of addresses already configured for the mail server.
• Failover Type: Select either Manual or Automatic. We recommend that you select Manual (see
Automatic Versus Manual Failover).
Step 4 If you are using the virtual IP feature (see Virtual IP Addressing): Select the Virtual IP checkbox, then
complete the additional fields as follows:
• IPv4 Address: Enter the virtual IPv4 address you want both HA servers to use.
• IPv6 Address: (Optional) Enter the IPv6 address you want both HA servers to use.
Note that virtual IP addressing will not work unless both servers are on the same subnet.
Step 5 Click Save to save your changes. Prime Infrastructure initiates the HA registration process. When
registration completes successfully, Configuration Mode will display the value HA Enabled.
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI).
Step 2 Enter the following command to display the current status of Prime Infrastructure HA processes:
PIServer/admin# ncs ha status
You can view these state change on the HA Status page for the primary server, or the Health Monitor
web pages for each of the two servers. If you are using the HA Status page, click Refresh to view
progress. Once the data is fully synchronized, the HA Status page will be updated to show the current
state as “Primary Active”, as shown in the following figure.
After registration is initiated, there is a small window of time (usually less than five minutes) during
which the database process on the primary server is restarted. During this period, the database will be
offline. Once the database server is restarted, Prime Infrastructure initiates synchronization between the
primary and the secondary HA servers. The synchronization should not have any impact on user activity,
although users may observe slow system response until the synchronization is complete. The length of
the synchronization is a function of the total database size and, is handled at the Oracle level by the
RMAN related processes. There is no impact on the execution of user- or system-related activity during
the sync.
During registration, Prime Infrastructure performs a full database replication to the secondary server.
Step 1 Ensure that your HA implementation is enabled and ready for update:
a. Log in to the primary server using an ID with Administrator privileges.
b. Select Administration > System Settings > High Availability, The primary server state displayed
on the HA Status page should be “Primary Active”.
c. Select HA Configuration. The current Configuration Mode should show “HA Enabled”. We
recommend that you set the Failover Type to “manual” during the patch installation.
d. Access the secondary server’s Health Monitor (HM) web page by pointing your browser to the
following URL:
https://ServerIP:8082
where ServerIP is the IP address or host name of the secondary server.
e. You will be prompted for the authentication key entered when HA was enabled. Enter it and click
Login.
f. Verify that the secondary server state displayed on the HM web page is in the “Secondary Syncing”
state.
Step 2 Download the patch and install it on the primary server:
a. Point your browser to the software patches listing for Cisco Prime Infrastructure 2.2.
b. Click the Download button for the patch file you need to install (the file name ends with a UBF file
extension), and save the file locally.
c. Log in to the primary server using an ID with administrator privileges and choose Administration
> Software Update.
d. Click Upload Update File and browse to the location where you saved the patch file.
e. Click OK to upload the file.
f. When the upload is complete: On the Software Upload page, verify that the Name, Published Date
and Description of the patch file are correct.
g. Select the patch file and click Install. When the installation is complete, you will see a message
confirming this.
h. After the installation is complete on the primary server, verify that the Status of Updates table on
the Software Update page shows “Installed” or “Installed [Requires Restart]” for the patch.
Step 3 Install the same patch on the secondary server:
a. Access the secondary server’s HMweb page by pointing your browser to the following URL:
https://ServerIP:8082
where ServerIP is the IP address or host name of the secondary server.
b. You will be prompted for the authentication key entered when HA was enabled. Enter it and click
Login.
c. Click the HM web page’s Software Update link. You will be prompted for the authentication key a
second time. Enter it and click Login again.
d. Click Upload Update File and browse to the location where you saved the patch file.
e. Click OK to upload the file.
f. When the upload is complete: On the Software Upload page, confirm that the Name, Published Date
and Description of the patch file are correct.
g. Select the patch file and click Install. When the installation is complete, you will see a message
confirming this.
h. After the installation is complete on the secondary server, verify that the Status of Updates table on
the Software Update page shows “Installed” or “Installed [Requires failover]” for the patch.
Step 4 Stop the servers in the following sequence, using the commands explained in Restarting Prime
Infrastructure:
a. On the secondary server, run the ncs stop command.
b. On the primary server, run the ncs stop command.
Step 5 Re-start and monitor the servers in the following sequence
a. On the secondary server, run the following commands in this order:
– Run the ncs start command (see Restarting Prime Infrastructure) to start the secondary server.
Wait for the processes on the secondary to restart.
– Run the ncs status command (see Checking Prime Infrastructure Server Status) to verify that
the secondary’s processes have re-started. The only process you should see started on the
secondary is “Health Monitor”.
– Run the ncs ha status command (see Checking High Availability Status) to verify that the
secondary state is “Secondary Lost Primary”.
Once the secondary server is in “Secondary Lost Primary” state, you can go on to the next step.
b. On the primary server, run the following commands in this order:
– Run the ncs start command to restart the primary server. Wait for the processes on the primary
to restart.
– Run the ncs status command to verify that the primary’s Health Monitor and other processes
have re-started.
Once all the processes on the primary are up and running, automatic HA registration will be triggered
between the primary and secondary servers. This normally completes after a few minutes. You will also
receive email notification that registration has started.
Step 6 Once registration completes, verify the patch installation as follows:
a. Run the ncs ha status command on both the primary and secondary servers. You should see the
primary server state change from “HA Initializing” to “Primary Active”. You should see the
secondary server state change from “Secondary Lost Primary” to “Secondary Syncing”.
b. Log in to the primary server and access its Software Update page as you did in step 2, above. The
“Status” column on the Status of Updates > Status tab should show “Installed” for the patch.
c. Access the secondary server’s Health Monitor page as you did in step 3, above. The “Status” column
on the Status of Updates > Status tab should show “Installed” for the patch.
– Use the ncs stop and ncs start commands (see Restarting Prime Infrastructure) to restart the
server.
– Use the ncs status command (see Checking Prime Infrastructure Server Status) to verify that
the secondary’s Health Monitor process has restarted.
Step 3 Verify that the patch status is the same both servers, as follows:
a. Log in to the primary server and access its Software Update page as you did in step 1, above. The
“Status” column should show “Installed” instead of “Installed [Requires Restart]” for the installed
patch.
b. Access the secondary server’s Health Monitor page as you did in step 2, above. The “Status” column
should show “Installed” instead of “Installed [Requires Failover]” for the installed patch
Step 4 Register the servers as explained in Registering High Availability on the Primary Server.
Related Topics
• Registering High Availability on the Primary Server
• Accessing the Health Monitor Web Page
• Triggering Failover
• Triggering Failback
• Responding to Other HA Events
• HA Registration Fails
• Network is Down (Automatic Failover)
• Network is Down (Manual Failover)
• Process Restart Fails (Automatic Failover)
• Process Restart Fails (Manual Failover)
• Primary Server Restarts During Sync (Manual)
• Secondary Server Restarts During Sync
• Both HA Servers Are Down
• Replacing the Primary Server
• Recovering From Split-Brain Scenario
Triggering Failover
Failover is the process of activating the secondary server in response to a detected failure on the primary.
Health Monitor (HM) detects failure conditions using the heartbeat messages that the two servers
exchange (see How High Availability Works). If the primary server is not responsive to three consecutive
heartbeat messages from the secondary, it is considered to have failed. During the health check, HM also
checks the application process status and database health; if there is no proper response to these checks,
these are also treated as having failed.
The HA system takes approximately 10 to 15 seconds to detect a process failure on the primary server
and initiate a failover. If the secondary server is unable to reach the primary server due to a network
issue, it might take more time to initiate a failover. In addition, it may take additional time for the
application processes on the secondary server to be fully operational.
As soon as HM detects the failure, it sends an email notification. The email includes the failure status
along with a link to the secondary server's Health Monitor web page.
If HA is currently configured for automatic failover (see Registering High Availability on the Primary
Server), the secondary server will activate automatically and there is no action you need to perform.
If HA is currently configured for manual failover, you must trigger the failover as follows:
Step 1 Access the secondary server's Health Monitor web page using the web link given in the email
notification, or using the steps in Accessing the Health Monitor Web Page.
Step 2 Trigger the failover by clicking the Failover button.
Triggering Failback
Failback is the process of re-activating the primary server once it is back online. It also transfers Active
status from the secondary server to the primary, and stops active network monitoring processes on the
secondary.
When a failback is triggered, the secondary server replicates its current database information and
updated files to the primary server. The time it takes to complete the failback from the secondary server
to the primary server will depend on the amount of data that needs to be replicated and the available
network bandwidth.
Once the data has begun replicating successfully, HA changes the state of the primary server to Primary
Active and the state of the secondary server to Secondary Syncing. Once all the data is copied, all the
processes on the secondary server will be shut down except for the Health Monitor and database.
During failback, the secondary server is available except during the period when processes are started
on the primary and stopped on the secondary. Both servers’ Health Monitor web pages are accessible for
monitoring the progress of the failback. Additionally, users can also connect to the secondary server to
access all normal functionality, except for these caveats:
• Do not initiate configuration or provisioning activity while the failback is in progress.
• Be aware that, after a successful failback, the secondary server will go down and control will switch
over to the primary server. During this process, Prime Infrastructure will be inaccessible to the users
for a few moments.
You must always trigger failback manually, as follows:
Step 1 Access the secondary server's Health Monitor web page using the link given in the email notification, or
using the steps in Accessing the Health Monitor Web Page.
Step 2 Trigger the failback by clicking the Failback button.
Related Topics
• HA Registration Fails
• Network is Down (Automatic Failover)
• Process Restart Fails (Manual Failover)
• Process Restart Fails (Manual Failover)
• Primary Server Restarts During Sync (Manual)
• Secondary Server Restarts During Sync
• Both HA Servers Are Down
• Replacing the Primary Server
HA Registration Fails
If HA registration fails, you will see the following HA state-change transitions for each server (instead
of those detailed in What Happens During HA Registration):
Step 1 Use ping and other tools to check the network connection between the two Prime Infrastructure servers.
Confirm that the secondary server is reachable from the primary, and vice versa.
Step 2 Check that the gateway, subnet mask, virtual IP address (if configured), server hostname, DNS, NTP
settings are all correct.
Step 3 Check that the configured DNS and NTP servers are reachable from the primary and secondary servers,
and that both are responding without latency or other network-specific issues.
Step 4 Check that all Prime Infrastructure licenses are correctly configured.
Step 5 Once you have remedied any connectivity or setting issues, try the steps in Registering High Availability
on the Primary Server again.
You will get email notification that the secondary has lost the primary. Once the automatic failover is
completed, you will get another email notification that the secondary server is now active.
In this case, you will want to recover by following the steps below.
Step 1 Check on and restore network connectivity between the two servers. Once network connectivity is
restored, and the primary server can detect that the secondary is active, all services on the primary will
be stopped. You will see the following state changes:
Step 2 Trigger a failback from the secondary to the primary (see Triggering Failback). You will then see the
following state transitions:
You will get email notifications that each server has lost the other. In this case, you will want to follow
the steps below.
Step 1 Check on and restore network connectivity between the two servers.
Step 2 As soon as network connectivity is restored, use the HM web page for the secondary server to trigger a
failover from the primary to the secondary server. You will see the following state changes:
Step 3 Once you have received email notification that the secondary is now active, trigger a failback from the
secondary to the primary (see Triggering Failback). You will then see the following state transitions:
When this process is complete, you will get an email notification that the secondary server is now active.
In this case, you will want to follow the steps below.
Step 1 Restart the primary server and ensure that it is running. Once the primary is restarted, it will be in the
state “Primary Alone”.
Step 2 Trigger a failback from the secondary to the primary (see Triggering Failback). You will then see the
following state transitions:
Step 1 Trigger on the secondary server a failover from the primary to the secondary (see Triggering Failover).
You will then see the following state transitions:
Step 2 Restart the primary server and ensure that it is running. Once the primary server is restarted, the
primary’s HA state will be “Primary Alone”.
Step 3 Trigger a failback from the secondary to the primary (see Triggering Failback). You will then see the
following state transitions:
The “Primary Alone” and the initialization states occur immediately after the primary comes back
online. No administrator response should be required.
Step 1 Restart the secondary server and the instance of Prime Infrastructure running on it.
Step 2 When Prime Infrastructure is running on the secondary, access the secondary server’s Health Monitor
web page (see Accessing the Health Monitor Web Page). You will see the secondary server transition to
the state “Secondary Lost Primary”.
Step 3 Restart the primary server and the instance of Prime Infrastructure running on it. When Prime
Infrastructure is running on the primary, the primary will automatically register with the secondary and
enable HA. To verify this, access the primary server’s Health Monitor web page. You will see the two
servers transition through the following series of HA states:
Step 1 Ensure that the secondary server is currently in “Secondary Active” state. If you have set the Failover
Type on the primary server to “manual”, you will need to trigger the failover to the secondary manually
(see Triggering Failover).
Step 2 Ensure that the old primary server you are replacing has been disconnected from the network.
Step 3 Ensure that the new primary server is ready for use. This will include connecting it to the network and
assigning it the same server IP, subnet mask, gateway as the old primary server. You will also need to
enter the same authentication key that you entered when installing the secondary server.
Step 4 Trigger a failback from the secondary to the newly installed primary (see Triggering Failback). You will
see the two servers transition through the following series of HA states:
The following instructions apply to FIPS mode and to the installation of CA certificates. Note that Prime
Infrastructure in non-FIPS mode allows you to use self-signed certificates. Installing in FIPS mode
requires you to use CA certificates that are signed by an external registered Certificate Authority (CA).
Related Topics:
• About Certificates, Certificate Authorities (CAs), and Certificate Signing Requests (CSRs)
• Generating CSRs
• Importing CA Certificates to Prime Infrastructure Servers
Generating CSRs
To generate a Certificate Service Request (CSR) for a third-party certificate using Cisco Prime
Infrastructure:
Step 1 Connect to the primary server via CLI (see Connecting Via CLI). Do not enter “configure terminal”
mode.
Step 2 At the command line, enter the following command:
admin# ncs key genkey -newdn -csr csrfile.csr repository reponame
Where:
• csrfile is the name of the new CSR file.
• reponame is the location of the Prime Infrastructure repository to which the newly created CSR files
should be backed up (p to 80 alphanumeric characters).
The command generates a new key/self-signed certificate pair, and outputs the CSR to the specified
filename in the specified repository.
Step 3 Because the command includes the -newdn flag, you will be prompted for Distinguished Name fields
for the certificate. To avoid browser warnings in future, be sure to specify in the domain name field the
final hostname that will be used to access the Prime Infrastructure servers.
Step 4 Once the CSR is generated, submit it to the Certificate Authority.
Step 1 Connect to the primary server via CLI (see Connecting Via CLI). Do not enter “configure terminal”
mode.
Step 2 At the prompt, enter the following command to import the CA certificate file:
admin# ncs key importcacert CA-Alias CA.cer repository defaultRepo
If you have more than one CA certificate file, repeat this step for each CA cert file.
Step 3 When you are finished importing all CA cert files, import the CN.cer file into the server:
admin# ncs key importsignedcert CN.cer repository defaultRepo
Step 4 To restart the Prime Infrastructure server and apply the changes, issue the following two commands in
this order:
ncs stop
ncs start
Related Topics
• HA State Reference
• HA State Transition Reference
• High Availability CLI Command Reference
• Resetting the Authentication Key
• Removing HA Via the GUI
• Removing HA Via the CLI
• Removing HA During Restore
• Using HA Error Logging
• Resetting the Server IP Address or Host Name
Mode Description
HA not configured HA is not configured on this Prime Infrastructure server
HA initializing The HA registration process between the primary and secondary server has
started.
HA enabled HA is enabled between the primary and secondary server.
HA alone Primary server is now running alone. HA is enabled, but the primary server is out
of sync with the secondary, or the secondary is down or otherwise unreachable.
HA State Reference
The following table lists all possible HA states, including those that require no response from you.
Stand Primary
Alone Uncertain
Initiate HA
registration Primary
Database
HA Complete HA
failed
Initializing registration
Primary
Secondary Active
server not
reachable
Reregistration
Automatic
Registration Primary failed
(identified by primary)
Failback
Primary done
Lost Secondary
Primary
Primary Failover
restart Trigger
Primary failback
Trigger
restart
failback
Primary Primary
363708
Alone Trigger Failback
failback
The following figure details all possible state transitions for the secondary server.
Stand Secondary
Alone Uncertain
Initiate HA
registration Secondary
Database
HA Complete HA
failed
Initializing registration
Secondary
Sync
Automatic/Manual
Registration Primary server Complete Failback-
not reachable Start/Stop process
Secondary Secondary
Lost Primary Post Failback
Trigger Secondary
Failover Active DB & File
Replication
Complete Trigger Done
Failover failback
Secondary Secondary
363709
Failover Failback
Command Description
ncs ha ? Get help with high availability CLI commands
ncs ha authkey authkey Update the authentication key for high availability
ncs ha remove Remove the High Availability configuration
ncs ha status Get the current status for High Availability
Step 1 Connect to the primary server via CLI (see Connecting Via CLI). Do not enter “configure terminal”
mode.
Step 2 Enter the following at the command line:
admin# ncs ha authkey MyNewAuthKey
Where MyNewAuthKey is the new authorization key.
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > Settings > High Availability.
Step 3 Select Remove.
Step 1 Connect to the primary server via CLI (see Connecting Via CLI). Do not enter “configure terminal”
mode.
Step 2 Enter the following at the command line:
admin# ncs ha remove
Step 1 Remove the HA settings from the primary server (see Removing HA Via the GUI).
Step 2 Restore the primary server as needed (see Restoring From Backups).
Step 3 Once the restore is complete, perform the HA registration process again (see Registering High
Availability on the Primary Server).
Step 1 View the Health Monitor page for the server having trouble (see Accessing the Health Monitor Web
Page).
Step 2 In the Logging area, in the Message Level dropdown, select the error-logging level you want.
Step 3 Click Save.
Step 4 When you want to download the log files: In the Logs area, click Download. You can open the
downloaded log files using any ASCII text editor.
Controller redundancy in a wireless network allows you to reduce network downtime. In a redundancy
architecture, one controller is in the Active state and a second controller is in the Standby state. The
Standby controller continuously monitors the health of the Active controller via a redundant port. Both
controllers share the same configurations, including the IP address of the management interface.
The Standby or Active state of a controller is based on the redundancy Stock Keeping Unit (SKU), which
is a manufacturing ordered unique device identification (UDI). A controller with redundancy SKU UDI
is in the Standby state for the first time when it boots and pairs with a controller that runs a permanent
count license. For controllers that have permanent count licenses, you can manually configure whether
the controller is in the Active state or the Standby state.
In this release, a stateful switchover of access points (AP SSO) is supported. An AP SSO ensures that
the AP sessions are intact even after a switchover.
Stateful switchover of clients is not supported. This means that nearly all clients are deauthenticated and
forced to re-associate with the new controller in the Active state. The only exceptions to this rule are
clients on locally switched WLANs on access points in FlexConnect mode.
• Prerequisites and Limitations for Redundancy
• Configuring Redundancy Interfaces
• Configuring Redundancy on a Primary Controller
• Configuring Redundancy on a Secondary Controller
• Configuring Redundant Guest Anchors in Wireless Network
• Monitoring Redundancy States
• Running the Redundancy Status Background Task
• Configuring a Peer Service Port IP and Subnet Mask
• Adding a Peer Network Route
• Resetting and Uploading Files from the Secondary Server
• Disabling Redundancy on Controllers
Step 6 Unselect the Enabled check box for the redundancy mode to disable the redundancy on the selected
controller.
Step 7 Click Save. The configuration is saved and the system reboots.
This chapter describes how to control and manage the user access provided by Cisco Prime
Infrastructure.
• Creating Additional Administrative Users
• Managing User Accounts
• Viewing User Group Privileges and Membership
• Changing the Global Session Timeout for Idle Users
• Using Virtual Domains to Control Access
• User Access in Virtual Domains
• Auditing User Access
• Configuring AAA on Prime Infrastructure
Step 1 In Converged view: Choose Administration > Users, Roles & AAA > Active Sessions.
Step 2 Click the Audit Trail icon for the username for which you want to see the following data:
• User—User login name
• IP Address—IP address of the user’s client device
• Operation—Type of operation audited
• Time—Time operation was audited
• Status—Success or failure
• Reason—Failure reason when the user login failed
• Configuration Changes—This field provides a Details link if there are any configuration changes
associated with this user. Click the Details link for more information on the configuration changes
performed by the user.
The audit trail entries could be logged for individual device changes. For example, If a template is
applied on multiple switches, then there will be multiple audit entries for each switch to which the
template has been applied.
Adding Users
You can add a user and assign predefined static roles to that user. Besides complete access, you can give
administrative access with differentiated privileges to certain user groups.
User IDs created in Operations Center can log in to Operations Center or any of the Prime Infrastructure
2.2 instances being managed by Operations Center. To log into instances of Prime Infrastructure version
2.1.2 from Operations Center, the user ID must exist locally on the 2.1.2 instances, which also must have
the update for Operations Center (see Enabling Prime Infrastructure 2.1.2 for Operations Center
Management).
Step 1 Choose Administration > Users, Roles & AAA > Users.
Step 2 Choose Select a command > Add User, then click Go.
Step 3 Enter the username and password, and then confirm the password, for the new user.
Step 4 Choose the User Groups to which this user belongs by selecting the check box next to each group name
(see Using User Groups to Control Access).
Step 5 Click the Virtual Domains tab to assign a virtual domain to this user (see User Access in Virtual
Domains).
Step 6 Click Save.
Step 1 Choose Administration > System Settings > Guest Account Settings.
Step 2 Change radio button selections as follows:
• Select Automatically remove expired guest accounts to have guest accounts whose lifetimes have
ended moved to the Expired state. Guest accounts in the Expired state are deleted from Prime
Infrastructure automatically.
• Select Search and List only guest accounts created by this lobby ambassador to restrict Lobby
Ambassadors to modifying only the guest accounts that they have created. By default, any Lobby
Ambassador can modify or delete any guest account, irrespective of who created that account.
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Select the user whose access you want to disable.
Step 3 Choose Select a command > Lock User(s), then click Go.
The next time the user tries to log in to Prime Infrastructure, a message appears saying the login failed
because the account is locked.
Related Topics
• Changing Password Policies
• Changing User Passwords
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Select the user whose password you want to change.
Step 3 Complete the password fields, then click Save.
Related Topics
• Creating Additional Administrative Users
• Changing Password Policies
Step 1 Choose Administration > Users, Roles & AAA, then click Local Password Policy.
Step 2 Choose the necessary policies, then click Save.
Step 1 Choose Administration > Users, Roles & AAA, then click User Groups.
Step 2 Click the Group Name of the User Group whose privileges and members you want to see:
• The Tasks Permissions tab shows the privileges assigned to this User Group.
• The Members tab shows the users assigned to this User Group.
Step 1 Choose Administration > Users, Roles & AAA, then click User Groups.
Step 2 Click the Group Name of an editable User Group.
Step 3 Using the Tasks Permissions tab:
• Select the checkbox next to each task or function you want to provide to this User Group.
• Unselect the checkbox next to each task or function you want remove from this User Group’s
privileges.
Step 4 When you are finished, click Submit.
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Click on the User Name for the user whose memberships you want to change.
Step 3 On the General tab, under Groups Assigned to This User:
• Select the checkbox next to each User Group to which you want the user to belong.
• Unselect the checkbox next to each User Group from which you want the user to be removed.
Step 4 When you are finished, click Save.
Before you set up virtual domains, alway start by determining which Prime Infrastructure users are
responsible for managing particular sites, devices and access points in your network. You can then
organize your virtual domains according your organization’s physical sites, the device types in your
network, the user communities the network serves, or any other characteristic you choose.
Related Topics
• Understanding Virtual Domains
• Creating Virtual Domains
• Adding Users to Virtual Domains
Reports
Reports only include components assigned to the current virtual domain. For example, if you create a
virtual domain with only access points and no controllers assigned, all controllers are not displayed when
you generate a controller inventory report.
If you create a virtual domain with only access points and no controllers assigned, you lose some ability to
choose controller-based features. For example, some options require you to drill down from controller to
access points. Because controllers are not in the virtual domain, you are not able to generate associated
reports.
Reports are only visible in the current virtual domain. The parent virtual domain cannot view the reports
from its subvirtual domain. Client reports such as Client Count only include clients that belong to the
current virtual domain. If new clients are assigned to this partition by the administrator, the previous
reports do not reflect these additions. Only new reports reflect the new clients.
Search
Search results only include components that are assigned to the virtual domain in which the search is
performed. Search results do not display floor areas when the campus is not assigned to the virtual
domain.
The saved searches are only visible in the current virtual domain. The parent virtual domain cannot view
these search results. Prime Infrastructure does not partition network lists. If you search a controller by
network list, all controllers are returned. Search results do not display floor areas when the campus is
not assigned to the virtual domain.
Alarms
When a component is added to a virtual domain, no previous alarms for that component are visible to
that virtual domain. Only new alarms are visible. For example, when a new controller is added to a
virtual domain, any alarms generated for that controller prior to its addition do not appear in the current
virtual domain.
Alarms are not deleted from a virtual domain when the associated controllers or access points are deleted
from the same virtual domain.
Alarm Email Notifications—Only the ROOT-DOMAIN virtual domain can enable Location
Notifications, Location Servers, and Prime Infrastructure email notification.
Templates
When you create or discover a template in a virtual domain, it is only available to that virtual domain
unless it is applied to a controller. If it is applied to a controller and that controller is assigned to a
subvirtual domain, the template stays with the controller in the new virtual domain.
Access point templates are visible in the virtual domain in which they were created only. You cannot see
access points templates in other virtual domains, even if those virtual domains have the same access
point added.
If you create a sub (or child) domain and then apply a template to both network elements in the virtual
domain, Prime Infrastructure might incorrectly reflect the number of partitions to which the template
was applied.
Config Groups
Config groups in a virtual domain can also be viewed by the parent virtual domain. A parent virtual
domain can modify config groups for a sub (child) virtual domain. For example, the parent virtual
domain can add or delete controllers from a subvirtual domain.
Maps
You can only view the maps that your administrator assigned to your current virtual domain.
• When a campus is assigned to a virtual domain, all buildings in that campus are automatically
assigned to the same virtual domain.
• When a building is assigned to a virtual domain, it automatically includes all of the floors associated
with that building.
• When a floor is assigned, it automatically includes all of the access points associated with that floor.
If only floors are assigned to a virtual domain, you lose some ability to choose map-based features. For
example, some reports and searches require you to drill down from campus to building to floor. Because
campuses and buildings are not in the virtual domain, you are not able to generate these types of reports
or searches.
Coverage areas shown in Prime Infrastructure are only applied to campuses and buildings. In a floor-only
virtual domain, Prime Infrastructure does not display coverage areas. If a floor is directly assigned to a
virtual domain, it cannot be deleted from the virtual domain which has the building to which the floor
belongs.
Search results do not display floor areas when the campus is not assigned to the virtual domain.
Access Points
When a controller or map is assigned to a virtual domain, the access points associated with the controller
or map are automatically assigned as well. Access points can also be assigned manually (separate from
the controller or map) to a virtual domain.
If the controller is removed from the virtual domain, all of its associated access points are also removed.
If an access point is manually assigned, it remains assigned even if its associated controller is removed
from the current virtual domain.
If you create a virtual domain with only access points and no controllers assigned, you lose some ability
to choose controller-based features. For example, some options require you to drill down from controller
to access points. Because controllers are not in the virtual domain, you are not able to generate associated
reports.
If a manually added access point is removed from a virtual domain but is still associated with a controller
or map that is assigned to the same virtual domain, the access point remains visible in the virtual domain.
Any alarms associated with this access point are not deleted with the deletion of the access point.
When maps are removed from a virtual domain, the access points on the maps can be removed from the
virtual domain.
If you later move an access point to another partition, some events (such as generated alarms) might
reside in the original partition location.
Rogue access point partitions are associated with one of the detecting access points (the one with the
latest or strongest RSSI value). If there is detecting access point information, Prime Infrastructure uses
the detecting controller.
If the rogue access point is detected by two controllers which are in different partitions, the rogue access
point partition might be changed at any time.
Controllers
Because network elements are managed hierarchically, controllers might be affected by partitioning. If
you create a virtual domain with only access points and no controllers assigned, you lose some ability to
choose controller-based features. For example, some options require you to drill down from controller to
access points. Because controllers are not in the virtual domain, you are not able to generate associated
reports.
If you create a partition with only a few controllers, choose Configure > Access Points, and click an
individual link in the AP Name column. The complete list of Prime Infrastructure-assigned controllers
will be displayed for primary, secondary, and tertiary controllers rather than the limited number specified
in the partition.
If a controller configuration is modified by multiple virtual domains, complications can arise. To avoid
this, manage each controller from only one virtual domain at a time.
Email Notification
Email notification can be configured per virtual domain. An email is sent only when alarms occur in that
virtual domain.
Tip Hover your mouse cursor over the name of the parent virtual domain. You will see a cross-hair
icon appear next to the domain name. Click the icon to display a popup summary of the parent,
then click Create Sub Domain to create a new child domain of that parent.
Step 3 Enter the new domain’s name in the Name text box. This field is required.
Step 4 If needed, enter the new domain’s time zone, email address, and description. These are optional fields.
Step 5 Click Submit to view a summary of the newly created virtual domain and your changes to it.
Step 6 Click Save to confirm the changes.
Virtual domains are useful when you use them to restrict the view of a particular set of users to a
specified set of site maps, network devices, and access points. See the “Related Topics” to continue
creating a useful virtual domain.
Related Topics
• Adding Site Maps to Virtual Domains
• Adding Network Devices to Virtual Domains
• Adding Access Points to Virtual Domains
• Adding Users to Virtual Domains
• Importing Virtual Domains
Related Topics
• Adding Network Devices to Virtual Domains
• Adding Access Points to Virtual Domains
• Adding Users to Virtual Domains
Related Topics
• Adding Site Maps to Virtual Domains
• Adding Access Points to Virtual Domains
• Adding Users to Virtual Domains
Related Topics
• Adding Site Maps to Virtual Domains
• Adding Network Devices to Virtual Domains
• Adding Users to Virtual Domains
Related Topics
• Creating Virtual Domains
• Adding Users to Virtual Domains
Related Topics
• Creating Virtual Domains
• Importing Virtual Domains
Related Topics
• Using Virtual Domains to Control Access
• Creating Virtual Domains
• Adding Users to Virtual Domains
• Changing Virtual Domain Access
• Virtual Domain RADIUS and TACACS+ Attributes
Step 1 Choose Administration > Users, Roles & AAA, then click Users.
Step 2 Click on the user name of the user you want to add to one or more virtual domains. Prime Infrastructure
displays the User Details page for the user you selected.
Step 3 Click the Virtual Domains tab.
Step 4 In the “Available Virtual Domains”, click the virtual domain you want this user to access. Then click
Add to add it to the “Selected Virtual Domains” column.
Step 5 When you are finished, click Save.
Related Topics
• Using Virtual Domains to Control Access
• Understanding Virtual Domains
• Creating Virtual Domains
Step 4 To add elements to the Selected table, click the Add button, check the check boxes of the required
elements (Site Maps, Network Devices, or Access Points) and click Select.
In the Network Devices tab, when you click the Add button, the Select Network Devices pop-up appears.
Here, a Filter By drop-down list is available to select the required network devices. From the Filter By
drop-down list, choose a network device. Select the required devices from the Available Network
Devices table and click Select.
In the Access Points tab, when you click the Add button, the Add Access Points pop-up appears. Here,
a Filter By drop-down list is available to add the required access points. From the Filter By drop-down
list, choose an access point. Select the required access points from the Available Access Points table and
click Select.
Step 5 The selected elements (Site Maps, Network Devices, or Access Points) are listed in the Selected table.
Step 6 To delete elements from the Selected table, first check the check boxes of the required elements (Site
Maps, Network Devices, or Access Points) to select them, and then click the Delete button.
Step 7 Click Submit to view the summary of the virtual domain.
Step 8 Click Save to confirm the changes.
The autonomous AP added through Administration > Virtual Domains > Network Devices will be
listed under Administration > Virtual Domains > Access Points.
If you delete a switch, a controller, or an autonomous AP from the ROOT-DOMAIN, the device is
removed from Prime Infrastructure. If the device is explicitly associated with the ROOT-DOMAIN or
any other virtual domain that is not the child of the current virtual domain and if you delete the device
from the current virtual domain, the device is removed from this virtual domain but it is not removed
from Prime Infrastructure.
Related Topics
• Using Virtual Domains to Control Access
• Understanding Virtual Domains
• Creating Virtual Domains
Step 3 Highlight the text in the RADIUS or TACACS+ Custom Attributes list (depending on which one you are
currently configuring), go to your browser menu, and choose Edit > Copy.
Step 4 Log in to ACS.
Step 5 Navigate to User or Group Setup.
If you want to specify virtual domains on a per-user basis, then you need to make sure you add all of the
custom attributes (for example, tasks, roles, virtual domains) information to the User custom attribute
page.
Step 6 For the applicable user or group, click Edit Settings.
Step 7 Use your browser’s Edit > Paste feature to place the RADIUS or TACACS+ custom attributes into the
applicable text box.
Step 8 Select the check boxes to enable these attributes, then click Submit + Restart.
For more information on adding RADIUS and TACACS+ attributes to the ACS server, see Adding Prime
Infrastructure User Groups into ACS for TACACS+ or Adding Prime Infrastructure User Groups into
ACS for RADIUS.
Related Topics
• Using Virtual Domains to Control Access
• Understanding Virtual Domains
• Creating Virtual Domains
Step 1 Add one or more RADIUS or TACACS+ Server. For details, see Adding RADIUS Servers and Adding
TACACS+ Servers.
Step 2 Select AAA Mode Settings.
Step 3 Select RADIUS or TACACS+. The Enable Fallback to Local check box is automatically selected,
enabling use of the local database when the external AAA server is down.
Step 4 With the Enable Fallback to Local check box selected, specify the conditions under which the fallback
to local Prime Infrastructure user account authentication occurs:
• ONLY on no server response: Only when the external server is unreachable or has network
problems.
• on authentication failure or no server response: Either when the external server is unreachable or
has network problems or the external AAA server cannot authenticate the user.
For AAA mode, the root user is always locally authenticated.
Step 5 Click Save.
Step 1 In Converged Theme: Choose Administration > Users, Roles & AAA >TACACS+ Servers.
In Classic view: Choose Administration > AAA> TACACS+ Servers.
Step 2 Choose Select a command >Add TACACS+ Server, then click Go.
Step 3 Enter the TACACS+ server information, then click Save.
For Prime Infrastructure to communicate with the TACACS+ server, the shared secret you enter on this
page must match the shared secret configured on the TACACS+ server.
If you have enabled Prime Infrastructure High Availability and configured a virtual IP feature, the Local
Interface IP field will offer you a choice between the virtual IP address and the physical IP address of
the primary server. Be sure to select the virtual IP address as the Local Interface IP.
Related Topics
• How High Availability Works
• Virtual IP Addressing
• Required TACACS+/RADIUS Configurations After Prime Infrastructure IP Address Changes
Step 1 Choose Administration > Users, Roles & AAA, then click RADIUS Servers.
In Classic view: Choose Administration > AAA> RADIUS Servers.
Step 2 Choose Select a command >Add Radius Server, then click Go.
Step 3 Enter the RADIUS server information, then click Save.
For Prime Infrastructure to communicate with the RADIUS server, the shared secret you enter on this
page must match the shared secret configured on the RADIUS server.
Related Topic
• Required TACACS+/RADIUS Configurations After Prime Infrastructure IP Address Changes
Related Topics
• Adding TACACS+ Servers
• Adding RADIUS Servers
Step 1 In Converged view: Choose Administration > Users, Roles & AAA > SSO Servers.
In Classic view: Choose Administration > AAA> SSO Servers.
Step 2 Choose Select a command >Add SSO Server, then click Go.
Step 3 Enter the SSO server information, then click Save.
The number of retries allowed for the SSO server authentication request is from 0 to 3.
For SSO operation, Prime Infrastructure requires that the SSL/TLS certificate hold the fully qualified
domain name (FQDN) in the Common Name (CN) field. To verify that the certificate used by your Prime
Infrastructure server has the FQDN in the CN field, use your browser to view the certificate. If the
certificate does not contain the FQDN in the CN field, you must regenerate the certificate. For
instructions on regenerating the certificate, see the Cisco Prime Infrastructure Server Hardening section
of the Cisco Prime Infrastructure Classic View Configuration Guide for Wireless Devices, Release 2.1.
Note After you regenerate the SSL/TLS certificate, you must redistribute the new certificate to all users that
have the old certificate.
Step 1 In Converged view: Choose Administration > Users, Roles & AAA >SSO Server AAA Mode.
In Classic view: Choose Administration > AAA> SSO Server AAA Mode.
Step 2 Choose which SSO Server AAA mode you want to use. Only one can be selected at a time.
Any changes to local user accounts are effective only when you are configured for local mode. If you
use remote authentication, changes to the credentials are made on a remote server. The two remote
authentication types are RADIUS and TACACS+. RADIUS requires separate credentials for different
locations (East and West Coast). TACACS+ is an effective and secure management framework with a
built-in failover mechanism.
Step 3 Select the Enable Fallback to Local check box if you want the administrator to use the local database
when the external SSO AAA server is down.
This check box is unavailable if Local was selected as the SSO Server AAA Mode type.
Step 4 Click OK.
Step 1 Add Prime Infrastructure as a AAA client in ISE. For more information, see Adding Prime Infrastructure
as an AAA Client in ISE.
Step 2 Create a new User group in ISE. For more information, see Creating a New User Group in ISE.
Step 3 Create a new User in ISE and add that User to the User group created in ISE. For more information, see
Creating a New User and Adding to a User Group in ISE.
Step 4 Create a new Authorization profile. For more information, see Creating a New Authorization Profile in
ISE.
Step 5 Create an Authorization policy rule. For more information, see Creating an Authorization Policy Rule
in ISE.
Step 6 Create an Authentication policy. For more information, see Creating a Simple Authentication Policy in
ISE or Creating a Rule-Based Authentication Policy in ISE.
Step 7 Configure AAA in Prime Infrastructure. For more information, see Configuring AAA in Prime
Infrastructure.
Step 1 Choose ISE > Administration > Identity Management > Identities.
Step 2 From the left sidebar menu, choose Identities > Users, then click Add.
Step 3 Enter the username and password and reenter the password for the user.
Step 4 Choose the required user group from the User Group drop-down list, then click Save.
You can also integrate ISE with external sources such as Active Directory and Lightweight Directory
Access Protocol (LDAP).
Step 1 Choose ISE > Policy > Policy Elements > Results.
Step 2 From the left sidebar menu, choose Authorization > Authorization Profiles, then click Add.
Step 3 Enter the name and description for the profile.
Step 4 Choose ACCESS_ACCEPT from the Access Type drop-down list.
Step 5 In the Advanced Attribute Settings area, add Prime Infrastructure User Group RADIUS custom
attributes one after another along with the virtual domain attributes at the end.
User Group RADIUS custom attributes are located in Prime Infrastructure at Administration > Users,
Roles & AAA > User Groups. Click Task List for the group with appropriate permissions.
a. Select cisco - av - pair and paste Prime Infrastructure User Group RADIUS custom attribute next
to it. Keep adding one after another.
b. Add the Virtual Domain attribute at the end of the last RADIUS custom attribute for each group (for
RADIUS custom attributes, see Virtual Domain RADIUS and TACACS+ Attributes).
Step 6 Save the authorization profile.
Related Topics
Simple Authentication Policies in the Cisco Identity Services Engine User Guide, Release 1.2
Related Topics
Rule-Based Authentication Policies in the Cisco Identity Services Engine User Guide, Release 1.2
Step 1 Log in to Prime Infrastructure as root, then choose Administration > Users, Roles & AAA > RADIUS
Servers.
Step 2 Add a new RADIUS server with the ISE IP address, then click Save.
Step 3 Log in to ISE, then choose Administration > AAA > AAA Mode Settings.
Step 4 Select RADIUS as the AAA mode, then click Save.
Step 5 Log off of Prime Infrastructure.
Step 6 Log in again to Prime Infrastructure as an AAA user defined in ISE.
For example, log in as user ncs-sysmon.
For more information about creating users in ISE, see Creating a New User and Adding to a User Group
in ISE.
Adding Prime Infrastructure to an ACS Server for Use with TACACS+ Server
Note The instructions and illustrations in this section pertain to ACS Version 4.1 and might vary slightly for
other versions or other vendor types. See the Cisco Secure ACS documentation or the documentation for
the vendor you are using.
Step 1 Click Add Entry in the Network Configuration page of the ACS server.
Step 2 In the AAA Client Hostname text box, enter the Prime Infrastructure hostname.
Step 3 Enter the Prime Infrastructure IP address in the AAA Client IP Address text box.
Ensure that the interface that you use for ACS is the same as the interface specified in Prime
Infrastructure and that the interface is reachable.
Step 4 In the Shared Secret text box, enter the shared secret that you want to configure on both Prime
Infrastructure and ACS servers.
Step 5 Choose TACACS+ in the Authenticate Using drop-down list.
Step 11 Select the check box in front of these entries to enable the new service and protocol.
Note The ACS 4.x configuration is complete only when you specify and enable NCS service with
HTTP protocol.
Note When you upgrade Prime Infrastructure, you must re-add any permissions on the TACACS+ or
RADIUS server and update the roles in your TACACS+ server with the tasks from the Prime
Infrastructure server.
Note You must add a virtual domain in ACS when exporting the task list to ACS. This might be the
ROOT-DOMAIN virtual domain. For more information on virtual domains, see Using Virtual
Domains to Control Access.
Note Ensure the interface that you use for ACS is the same you specified in Prime Infrastructure and
it is reachable.
Step 5 In the Shared Secret text box, enter the shared secret that you want to configure on both Prime
Infrastructure and ACS servers.
Step 6 Choose RADIUS (Cisco IOS/PIX 6.0) from the Authenticate Using drop-down list.
Step 7 Click Submit + Apply. You can now associate ACS users with this ACS group.
To enable RADIUS in Prime Infrastructure, see Adding RADIUS Servers.
Note From Prime Infrastructure Release 1.0 and later, you are required to add a virtual domain in ACS
when exporting the task list to ACS. This might be the ROOT-DOMAIN virtual domain. For
more information on virtual domains, see Using Virtual Domains to Control Access.
Note When you upgrade Prime Infrastructure, any permissions on the TACACS+ or RADIUS server
must be readded.
Note When you upgrade Prime Infrastructure, any permissions on the TACACS+ or RADIUS server
must be readded.
Note You must add a virtual domain in ACS when exporting the task list to ACS. This might be the
ROOT-DOMAIN virtual domain. For more information on virtual domains, see Using Virtual
Domains to Control Access.
Adding Prime Infrastructure to a Non-Cisco ACS Server for Use with RADIUS
When you use a RADIUS server to log in to Prime Infrastructure, the AAA server sends back an
access=accept message with a user group and a list of available tasks, after the username and password
were verified. The access=accept message comes back as a fragmented packet because of the large
number of tasks in some user groups. You can look in the following file to see the tasks associated with
a given user group: C:\Program Files\Prime
Infrastructure\webnms\webacs\WEB-INF\security\usergroup-map.xml. The tasks are passed back as a
vendor specific attribute (VSA), and Prime Infrastructure requires authorization information using the
VSA (IETF RADIUS attribute number 26). The VSA contains Prime Infrastructure RADIUS task list
information.
The content of the VSA is as follows:
• Type = 26 (IETF VSA number)
• Vendor Id = 9 (Cisco vendor ID)
• Vendor Type = 1 (Custom attributes)
• Vendor Data = Prime Infrastructure task information (for example Prime Infrastructure: task0 =
Users and Group)
Each line from Prime Infrastructure RADIUS task list should be sent in its own RADIUS VSA.
In the data portion of the access=access packet, the truncated output sometimes shows only one role sent
back for an Admin user group login. The tasks associated with the role start with task0 and increment
with task1, task2, and so on. Table 11-2 defines what these attributes in the access=access packet
example signify.
0000 06 6d 0e 59 07 3d 6a 24 02 47 07 35 d2 12 a4 eb .m.Y.=j$G.5...
0010 a2 5a fa 84 38 20 e4 e2 3a 3a bc e5 1a 20 00 00 .Z..8..::..
0020 00 09 01 1a 57 69 72 65 6c 65 73 73 2d 57 43 53 ....Prime Infrastructure
0030 3a 72 6f 6c 65 30 3d 41 64 6d 69 6e 1a 2b 00 00 :role0=Admin.+...
0040 00 09 01 25 57 69 72 65 6c 65 73 73 2d 57 43 53 ...%Prime Infrastructure
0050 3a 74 61 73 6b 30 3d 55 73 65 72 73 20 61 6e 64 :task0=Users and
0060 20 47 72 6f 75 70 73 1a 27 00 00 00 09 01 21 57 Groups.”....!W
0070 69 72 65 6c 65 73 73 2d 57 43 53 3a 74 61 73 6b Prime Infrastructure:task
0080 31 3d 41 75 64 69 74 20 54 72 61 69 6c 73 xx xx 1=Audit Trails.*
Attribute Description
1a (26 in decimal) Vendor attribute
2b (43 bytes in decimal) Length as the total number of bytes to skip and still reach the next TLV (for
task0, Users and Groups)
4-byte field Vendor Cisco 09
01 Cisco AV pair - a TLV for Prime Infrastructure to read
25 (37 bytes in decimal) Length
hex text string Prime Infrastructure:task0=Users and Groups
The next TLV until the data portion is completely processed
255.255.255.255 TLV: RADIUS type 8 (framed IP address)
Type 35 (0x19) A class, which is a string
Type 80 (0x50) Message authenticator
Step 1 Choose Network Resources > Network Devices and AAA Clients.
Step 2 Enter an IP address.
Adding Groups
Adding Users
Step 1 Choose Users and Identity Stores > Internal Identity Stores > Users.
Step 2 Add a user, and then map a group to that user.
Step 1 Choose Policy Elements > Authorization and Permissions > Network Access > Authorization
Profiles, then click Create.
Step 2 Enter the required information, then click Submit.
Step 1 Choose Policy Elements > Authorization and Permissions > Device Administration > Shell Profiles,
then click Create.
Step 2 Enter the required information, then click Submit.
Step 1 Choose Access Policies > Access Services > Service Selection Rules, then click Create.
Step 2 Enter the required information, then click OK.
Step 1 Choose Access Policies > Access Services > Service Selection Rules, then click Create.
Step 2 Enter the required information, then click OK.
Step 1 Log in to the ACS 5.x server and choose Access Policies > Access Services > Default Network Access.
Step 2 On the General tab, click the policy structure you want to use. By default, all the three policy structures
are selected.
Step 3 From the Allowed Protocols, click the protocols you want to use.
You can retain the defaults for identity and group mapping.
Step 4 To create an authorization rule for RADIUS, choose Access Policies > Access Services > Default
Network Access > Authorization, then click Create.
Step 5 In Location, click All Locations or you can create a rule based on the location.
Step 6 In Group, select the group that you created earlier.
Step 7 In Device Type, click All Device Types or you can create a rule based on the Device Type.
Step 8 In Authorization Profile, select the authorization profile created for RADIUS, click OK, then click Save.
Step 1 Choose Access Policies > Access Services > Default Device Admin.
Step 2 On the General tab, click the policy structure you want to use. By default, all the three are selected.
Similarly, in Allowed Protocols, click the protocols you want to use.
You can retain the defaults for identity and group mapping.
Step 3 To create an authorization rule for TACACS+, choose Access Policies > Access Services > Default
Device Admin > Authorization, then click Create.
Step 4 In Location, click All Locations, or you can create a rule based on the location.
Step 5 In Group, select the group that you created earlier.
Step 6 In Device Type, click All Device Types, or you can create a rule based on the Device Type.
Step 7 In Shell Profile, select the shell profile created for TACACS+, click OK, then click Save.
Cisco Prime Infrastructure consumes a lot of information from various different sources, including
NAM, NetFlow, NBAR, Cisco Medianet, PerfMon, and Performance Agent. The following table depicts
the sources of the data for the site dashlets used by Prime Infrastructure:
The following table shows how Prime Infrastructure populates the application-specific dashlets:
DSCP Classification y _ y _ _
Number of Clients Over Time y _ y _ _
Top Application Traffic Over Time y _ y _ _
Top N Applications y _ y y _
Top N Clients (In and Out) y _ y y _
Average Packet Loss y y _ _ _
Client Conversations y _ y _ _
Client Traffic y _ y _ _
IP Traffic Classification y _ y _ _
Top N Applications y _ y _ _
DSCP Classification y _ y _ _
RTP Conversations Details y y _ _ _
Top N RTP Streams y y _ _ _
Voice Call Statistics Y y _ _ _
Worst N RTP Streams by Jitters y y _ _ _
Worst N RTP Streams by MOS y _ _ _ _
Worst N Sites by MOS y _ _ _ _
Worst N Site to Site Connections y y _ y _
by KPI
Related Topics
• Enabling Medianet NetFlow
• Enabling NetFlow and Flexible NetFlow
Dashlet Description
Average Concurrent Connections (Optimized Graphs the average number of concurrent client and
versus Pass-through) pass-through connections over a specified time
period.
Multi-segment Analysis Displays WAAS traffic across multiple segments in
a conversation or between sites.
Multi-segment Network Time (Client Graphs the network time between the multiple
LAN-WAN - Server LAN) segments.
Transaction Time (Client Experience) Graphs average client transaction times (in
milliseconds) for the past 24 hours, with separate
lines for optimized traffic and pass-through traffic
(in which optimization is disabled). With
optimization enabled, you should see a drop in the
optimized traffic time when compared to the
pass-through time.
Traffic Volume and Compression Ratio Graphs the bandwidth reduction ratio between the
number of bytes before compression and the number
of bytes after compression.
Note that you cannot access Multi-Segment Analysis unless you have purchased and applied Prime
Infrastructure Assurance licenses. The WAAS monitoring dashlets will display no data unless you have
implemented WAAS at candidate sites.
The Administration > Licenses page allows you to manage Cisco Prime Infrastructure, wireless LAN
controllers, and Mobility Services Engine (MSE) licenses.
Although Prime Infrastructure and MSE licenses can be fully managed from the Administration >
Licenses page, you can only view Cisco Wireless LAN Controllers (WLC). You must use Cisco WLC
or Cisco License Manager (CLM) to manage Cisco WLC licenses.
• Prime Infrastructure Licensing
• Controller Licensing
• MSE Licensing
• Assurance Licensing
2. View the existing licenses. See Verifying License Details for help on ordering and downloading
licenses.
3. Calculate the number of licenses you will need, based both on the package of features you want and
the number of devices you need to manage.
4. Add new licenses. See Adding Licenses.
5. Delete existing licenses. See Deleting Licenses.
Note You can ignore warning messages like “Base license is missing” or “Multiple base licenses present, use
only one” displayed in the Administration > Licenses > Files > License Files area.
Adding Licenses
You need to add new licenses when:
• You have purchased a new Prime Infrastructure license.
• You are already using Prime Infrastructure and have bought additional licenses.
Deleting Licenses
When you delete licenses from Prime Infrastructure, all licensing information is removed from the
server. Make a copy of your original license file in case you want to add it again later. There are several
reasons you might want to delete licenses:
• You installed temporary licenses and want to delete them before applying your permanent licenses.
• You want to move your licenses to a different server. You must first delete the licenses from the
original server, then send an email to [email protected] requesting a re-host for your licenses.
You can then apply the re-hosted licenses to the new server.
Troubleshooting Licenses
To troubleshoot licenses, you will need to get details about the licenses that are installed on your system.
Click Help > About Prime Infrastructure to access your license information.
When troubleshooting licenses, it is important to remember that Prime Infrastructure has five types of
licenses:
• Base: Required for every Prime Infrastructure installation. The requirement stems primarily from
the need to do accurate royalty accounting by knowing how many Prime Infrastructure instances
have been purchased. A Base license is required for each instance of Prime Infrastructure, and is a
prerequisite for all other license types.
• Lifecycle: Regulates the total number of devices under Prime Infrastructure management.
• Assurance: Regulates the total number of NetFlow devices under Prime Infrastructure management.
• Collector: Regulates the total number of NetFlow data flows per second that Prime Infrastructure
can process.
• Data Center: Regulates the total number of data-center devices under Prime Infrastructure
management.This license type was introduced in Prime Infrastructure version 2.2.
All five types of licenses are supplied as either evaluation or permanent licenses:
• Evaluation: These licenses permit or extend access to Prime Infrastructure for a pre-set period. You
can apply only one evaluation license of each type (that is, only one Lifecycle evaluation license,
one Assurance evaluation license, and so on). You cannot apply an evaluation license over a
permanent form of the same license.
• Permanent License: These permit access to Prime Infrastructure features as specified and are not
time-limited. Permanent licenses can be applied over evaluation licenses, and can also be applied
incrementally (that is, you can have multiple permanent Assurance licenses, and so on).
Controller Licensing
To view controller licenses, choose Administration > Licenses, then select Files > Controller Files
from the left sidebar menu.
Note Prime Infrastructure does not directly manage controller licenses, rather it simply monitors the licenses.
To manage the licenses you can use command-line interface (CLI) commands, Web UI, or Cisco License
Manager (CLM).
Note You can have both a WPlus and Base license, but only one can be active at any given time.
Note Types other than Permanent display the number of days left until the license expires.
Licenses not currently in use do not have their counts reduced until they become “In Use.”
• Status
– In Use—The license level and the license are in use.
– Inactive—The license level is being used, but this license is not being used.
– Not In Use—The license level is not being used and this license is not currently recognized.
– Expired In Use—The license is being used, but is expired and will not be used upon next reboot.
– Expired Not In Use—The license has expired and can no longer be used.
– Count Consumed—The ap-count license is In Use.
Note If you need to filter the list of license files, you can enter a controller name, feature, or type and click Go.
MSE Licensing
The MSE packages together multiple product features related to network topology, design such as
NMSP, Network Repository along with related Service Engines, and application processes, such as the
following:
• Context-Aware Service
• Wireless Intrusion Prevention System (WIPS)
To enable smooth management of MSE and its services, various licenses are offered.
You must have a Cisco Prime Infrastructure license to use MSE and its associated services.
• MSE License Structure Matrix
• Sample MSE License File
• Revoking and Reusing an MSE License
• MSE Services Coexistence
• Managing MSE Licenses
wIPS 3000 access points 2000 access points Validity 60 days, 20 access
points
Note Limits for individual services differ. For example, a low-end mobility services engine
(MSE-3310) tracks a total of 2,000 CAS elements; a high-end mobility services engine
(MSE-3350) tracks a total of 25,000 CAS elements.
A low-end mobility services engine has a maximum limit of 2000 wIPS elements; a high-end
mobility services engine has a maximum limit of 3000 wIPS elements.
Note Because tag licenses are added and managed using appropriate vendor applications, tag licenses
are not displayed in this page. Refer to the following URL for more information:
http://support.aeroscout.com.
Evaluation (demo) licenses are also not displayed.
Tag licenses are installed using the AeroScout System Manager only if the tags are tracked using Partner
engine. Otherwise the tags will be counted along with the CAS element license.
• MSE License File—Indicates the MSE License.
• MSE—Indicates the MSE name.
• Type—Indicates the type of mobility services engine (client elements, wIPS local mode or wIPS
monitor mode access points).
• Limit—Displays the total number of client elements or wIPS monitor mode access points licensed
across the mobility services engine.
• License Type—Permanent licenses are the only license types displayed on this page.
– Permanent—Licenses are node locked and have no usage period associated with them. They are
issued by Cisco licensing portal and must be installed using management interfaces on the
device. Upon installation of these licenses, you have the necessary permissions across different
versions.
• Registering Product Authorization Keys
• Installing Client and wIPS License Files
• Deleting Mobility Services Engine License Files
Note Verify that the UDI of the selected mobility services engine matches the one you entered when
registering the PAK.
Step 5 Enter the license file in the License File text box or browse to the applicable license file.
Step 6 Once displayed in the License File text box, click Upload. Newly added license appears in mobility
services engine license file list.
Note A Context Aware Service (CAS) restarts if a client or tag license is installed; a wIPS service
restarts if a wIPS license is installed.
Note Services must come up before attempting to add or delete another license.
Step 1 Choose Administration > Licenses, then select Files > MSE Files from the left sidebar menu.
Step 2 Select the check box of the mobility services engine license file that you want to delete.
Step 3 Click Delete, then click OK to confirm the deletion.
Assurance Licensing
As explained in Purchasing Prime Infrastructure Licenses, licenses for Assurance features are based on
the number of NetFlow-monitored devices and Network Analysis Module (NAM) data
collection-enabled devices you have in your network. You manage, verify, and troubleshoot Assurance
licenses much as you do with other feature licenses, as explained in Adding Licenses, Deleting Licenses
and Troubleshooting Licenses.
In addition to these functions, Prime Infrastructure also lets you choose which NetFlow and NAM
devices you want to manage using Assurance features. For example, if you have only 50 Assurance
feature licenses and more than 50 NetFlow and NAM devices, you can choose to manage only your most
critical devices. If you later purchase additional Assurance licenses, you can add license coverage for
the devices previously left unmanaged.
To see Choose
The NetFlow-enabled devices in your network that are under Administration > Licenses > Summary.
Assurance management, as a percentage of the total number of
Assurance licenses you have.
The total number of Assurance licenses you have and the files Administration > Licenses > Files.
associated with them.
A list of the devices sending NetFlow or NAM polling data to Prime Administration > Licenses > Assurance License
Infrastructure. Manager
The number of Assurance Licenses in use.
The maximum number of Assurance licenses available to you.
By default, the total count of Assurance licenses on the Assurance License Manager, Summary and Files
pages is always updated whenever you add or delete Assurance licenses. Note that the addition or
removal of devices covered under these added or deleted Assurance licenses takes place as part of a
System Defined Job, which runs automatically once every 12 hours. So it can take up to 12 hours for the
added or deleted devices to appear.
In addition to Administration > Licenses > Assurance License Manager, you can always access the
Assurance License Manager page using the Assurance License Manager link in the upper right corner
of the Summary and Files pages.
Step 1 Choose Administration > Licenses > Assurance License Manager. Prime Infrastructure displays the
list of devices currently under Assurance management. It also displays the total number of Assurance
licenses you have, and the total number of devices under Assurance management.
Step 2 Select the check box next to each device you want to remove from Assurance management, then click
Remove Device.
Cisco Prime Infrastructure supports tracing Real-Time Transport Protocol (RTP) and TCP application
traffic paths across endpoints and sites. Tracing data paths depends on Cisco Medianet and Web Services
Management Agent (WSMA). Both are built-in features of Cisco IOS software and Catalyst switches
that help isolate and troubleshoot problems with RTP and TCP data streams. Prime Infrastructure
supports all versions of Cisco Medianet and WSMA and makes it easy to enable them on any router.
Where Cisco Network Analysis Module (NAM) traffic monitoring data is not available, Prime
Infrastructure supports RTP service path tracing (Mediatrace) using Cisco Medianet Performance
Monitor and Cisco IOS NetFlow. When properly configured, Mediatrace can be your most valuable tool
when troubleshooting RTP and TCP application problems.
Before you can use Prime Infrastructure’s Mediatrace feature, you must complete the following
prerequisite setup tasks. These prerequisite tasks are required to enable Cisco routers (ISRs, ISR G2s,
ASRs) and NAM devices to act as data (metrics collection) sources to monitor network traffic (RTP and
TCP) performance metrics.
• Configuring Prime Infrastructure to Use NAM Devices as Data Sources
• Configuring Prime Infrastructure to Use Routers and Switches as Data Sources
• Configuring Mediatrace on Routers and Switches
• Configuring WSMA and HTTP(S) Features on Routers and Switches
Step 1 Add NAMs to the system. You can do this either automatically using Discovery, or manually using bulk
import or the Device Work Center (see Adding Devices Using Discovery in the Cisco Prime
Infrastructure 2.2 User Guide).
Step 2 Enable NAM Data collection. To do this:
a. In Converged view: Choose Administration > Settings > Data Sources.
b. In the NAM Data Collector section, enable data collection on each NAM. For more information, see
Enabling NAM Data Collection in the Cisco Prime Infrastructure 2.2 User Guide.
Step 3 Create a site structure for your organization and use the Device Work Center to assign your principal
routers to the appropriate sites:
a. In Converged view: Choose Maps > Site Maps.
b. Add one or more campuses. For more information, see Creating Locations or Sites in the Cisco
Prime Infrastructure 2.2 User Guide.
Step 4 Associate your sites with authorized data sources:
a. In Converged view: Choose Administration > Settings > System Settings > Data Deduplication.
In Classic view: Choose Administration > System Settings > Data Deduplication.
b. Click Enable Data Deduplication, then assign authoritative data sources for Voice/Video (for RTP
data) and Application Response Time (for TCP data). For more information, see Controlling
Background Data Collection Tasks.
Step 5 Associate your sites with endpoint subnets:
a. In Converged view: Choose Services > Application Visibility & Control > Endpoint-Site
Association.
b. Associate subnets with your sites. For more information, see Associating Endpoints with a Location
in the Cisco Prime Infrastructure 2.2 User Guide.
If you fail to do this, the data collected for these endpoints will have their sites set to “Unassigned.”
Step 6 Configure your routers for Mediatrace and WSMA (see Troubleshooting with Mediatrace in the Cisco
Prime Infrastructure 2.2 User Guide).
Step 1 Create a site structure for your organization and use the Device Work Center to assign your principal
routers to the appropriate sites:
a. In Converged view: Choose Maps > Site Maps.
b. Add one or more campuses. For more information, see Creating Locations or Sites in the Cisco
Prime Infrastructure 2.2 User Guide.
Step 2 Associate your sites with authorized data sources:
a. In Converged view: Choose Administration > Settings > System Settings > Data Deduplication.
In Classic view: Choose Administration > System Settings > Data Deduplication.
b. Click Enable Data Deduplication, then assign authoritative data sources for Voice/Video (for RTP
data) and Application Response Time (for TCP data). For more information, see Controlling
Background Data Collection Tasks.
Step 1 In Converged view: Choose Design > Feature Design > CLI Templates > System Templates - CLI >
Mediatrace-Responder-Configuration.
Step 2 Enter the required information. See the Cisco Prime Infrastructure 2.2 Reference Guide for field
descriptions.
Step 3 Click Save as New Template. After you save the template, deploy it to your routers using the procedures
in Deploying and Monitoring Configuration Tasks in the Cisco Prime Infrastructure 2.2 User Guide.
Step 1 Choose Design > Configuration > Feature Design > CLI Templates > System Templates - CLI >
HTTP-HTTPS Server and WSMA Configuration-IOS.
Step 2 Enter the required information. See the Cisco Prime Infrastructure 2.2 Reference Guide for field
descriptions.
Enable the HTTP protocol. WSMA over HTTPS is not supported in the current version of Prime
Infrastructure.
Step 3 Click Save as New Template. After you save the template, deploy it to your routers using the procedures
in Deploying and Monitoring Configuration Tasks in the Cisco Prime Infrastructure 2.2 User Guide.
When adding a device to the Device Work Center, you must provide the HTTP user and password for the
device (see Device Work Center in the Cisco Prime Infrastructure 2.2 User Guide).
Cisco Prime Infrastructure with Assurance allows you to view and report a variety of key performance
indicators that are critical for maintaining and improving your network’s operational readiness and
performance quality. This information is especially critical in adapting to ever increasing network loads.
Note To use the features described in this chapter, your Prime Infrastructure implementation must include
Assurance licenses. These features are supported on ASR platforms only.
In the following workflow, we take the role of a network administrator who has just been told that a large
staff expansion is planned for a branch office. This change will add more users to the branch LAN, many
of whom will be using WAN applications. We want to monitor the branch’s key interfaces for usage and
traffic congestion, so we can see if more users on the branch LAN will mean degraded WAN application
performance for those users. To be certain we have an adequate picture, we will need to look at both
short- and long-term performance trends for all the WAN applications the branch uses.
• Interface Details
• Top Applications by Volume
• Number of Users Over Time
• Class Map Statistics
• Interface Tx and Rx Utilization
• Top N Clients (In and Out)
• DSCP Classification
• Top Application Traffic Over Time
Step 5 Concentrate on Top Application Traffic Over Time, which gives a color-coded map of the top ten
applications with the heaviest traffic over this interface.
Step 6 To get a better idea of the longer-term performance trend, click the Clock icon next to the dashlet title
to change the Time Frame to Past 24 Hours, Past 4 Weeks, or Past 6 Months. To zoom in on particular
spikes in the graph, use the Pan and Zoom handles in the lower graph.
Step 7 For a quick report of the same data as the interface dashboard, choose Reports > Report Launch Pad.
Then choose Performance > Interface Summary. Specify filter and other criteria for the report, select
the same interface in Report Criteria, then click Run.
Table 15-1 shows the ISP profile used to test against (it is very similar to the Caida.org Internet profile).
Number of Parallel Active Users 60,000 Derived from the number of flows
• PSU Failure
Prime Infrastructure does not send SNMPv2 Inform or SNMPv3 notifications.
Attribute Value
Component Health Monitor or High Availability
Server From which server (Primary, Secondary or Standalone) was this trap sent?
Type Which type of action (Process, Sync, Activity, etc.) resulted in this trap?
Service Which Prime Infrastructure service reported this issue? The possible values include Registration, Failover,
Failback, NMS, NCS, Health Monitor, All, Prime Infrastructure, Database, Disk Space, and so on.
When At what point in the Prime Infrastructure server's life cycle (Startup, Shutdown, etc.) did this happen?
State What is the server state (Standalone, Failover, Failback, Registration, etc.)?
Result For which condition is this SNMP trap being reported?
MSG Freeform text providing more detail specific to each SNMP trap.
Purpose Informs users that a specific Prime Infrastructure server service is down and that the Health Monitor is
attempting to restart it.
When Sent The trap is sent when Health Monitor tries to restart the process.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
Example Component: Health Monitor, Server: Primary, Type: Process, Service: NCS, When: Startup,
State: Stand Alone, Result: Warning, MSG: FTP service is down and an attempt will be made
to automatically restart the service
MSG Content PI servername: serviceName service is down; an attempt will be made to automatically
restart the service.
Value Type, Range The servername parameter in the MSG attribute will take the value of the Prime Infrastructure server
and Constraints host name. The serviceName parameter can take one of the following values: NMS Server, FTP, TFTP
or MATLAB.
Purpose Informs users that a failback from the secondary server to the primary server has been initiated.
When Sent This trap is sent when a failback is initiated from the secondary server to the primary server, irrespective
of whether the failback operation fails or succeeds.
OID 1.3.6.1.4.1.9.9.712.1.1.2.1.12
Example Component: High Availability, Server: Secondary, Type: Process, Service: Database, When:
Failback, State: Primary Failback, Result: Failure, MSG: Error in Failback: Failed to
recover the primary database using Duplicate DB
Purpose Informs users that CPU utilization has crossed a set threshold limit.
When Sent After the CPU utilization crosses the set threshold, the trap is generated on the next polling cycle. The
system poller job runs every 5 minutes. A trap is also generated when the threshold limit is changed on
the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1.
Example CPU Utilization is at 85% and has violated threshold limit of 80%.
Value Type, Range All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying a
and Constraints threshold limit.
Wire Format [OctetString] applicationSpecificAlarmID=Appliance_CPU, lastModifiedTimestamp=12 Jun
2014 11:12:32 UTC, alarmCreationTime=12 Jun 2014 11:12:32 UTC, ownerID=, eventCount=1,
mayBeAutoCleared=false, instanceId=8178170, severity=4,
eventType=APPLIANCE_CPU_VIOLATED_THRESHOLD, previousSeverity=CLEARED,
category=System(17), transientNameValue={}, source=CPU,
notificationDeliveryMechanism=SYNTHETIC_EVENT, instanceVersion=0, description=Component:
Appliance, Server: primary, Type: Hardware, Message: CPU Utilization is at 3% and has
violated threshold limit of 1%, isAcknowledged=false, displayName=NMS:192.168.115.141
Constraints and Traps are not generated if the issue is resolved before the next polling cycle.
Caveats
Purpose Informs users that disk utilization has crossed a set threshold limit.
When Sent After the disk utilization crosses the set threshold, the trap is generated on the next polling cycle. The
system poller job runs every 5 minutes. A trap is also generated when the threshold limit is changed on
the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1
Examples PI opt disk volume utilization is at 85% and has violated threshold limit of 0%
PI opt disk volume is within the recommended disk usage range, less than 80% used
PI local disk volume utilization is at 85% and has violated threshold limit of 80%
PI local disk volume is within the recommended disk usage range, less than 80% used
Value Type, Range All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying a
and Constraints threshold limit.
Wire Format [OctetString]
applicationSpecificAlarmID=LocaldiskDiskSpace,reportingEntityAddress=10.77.240.246,last
ModifiedTimestamp=Sun Mar 23 08:44:06 UTC 2014, alarmCreationTime=2014-03-14
13:29:31.069, eventCount=1, mayBeAutoCleared=false, instanceId=483484, severity=1,
eventType=NCS_LOW_DISK_SPACE, authEntityId=93093, previousSeverity=MAJOR,
category=System(17), transientNameValue={}, source=10.77.240.246,
notificationDeliveryMechanism=SYNTHETIC_EVENT, instanceVersion=0, description=PI
localdisk volume is within the recommended disk usage range, less than 70% used.,
isAcknowledged=false, authEntityClass=983576643, displayName=NCS 10.77.240.246
Constraints and Traps are not generated if the issue is resolved before the next polling cycle.
Caveats
Purpose Informs users that memory utilization has crossed a set threshold limit.
When Sent After the memory utilization crosses the set threshold, the trap is generated on the next polling cycle. The
system poller job runs every 5 minutes. A trap is also generated when the threshold limit is changed on
the Prime Infrastructure Event Configuration web page.
OID .1.3.6.1.4.1.9.9.712.0.1.
Examples Memory Utilization is at 85% and has violated threshold limit of 80%.
Value Type, Range All percentage ranges are from 1 to 99. Do not enter the percentage character ("%") when specifying a
and Constraints threshold limit.
Wire Format [OctetString] applicationSpecificAlarmID=Appliance_MEMORY, lastModifiedTimestamp=12 Jun
2014 11:12:32 UTC, alarmCreationTime=12 Jun 2014 11:12:32 UTC, ownerID=, eventCount=1,
mayBeAutoCleared=false, instanceId=8178171, severity=4,
eventType=APPLIANCE_MEM_VIOLATED_THRESHOLD, previousSeverity=CLEARED,
category=System(17), transientNameValue={}, source=MEMORY,
notificationDeliveryMechanism=SYNTHETIC_EVENT, instanceVersion=0, description=Component:
Appliance, Server: primary, Type: Hardware, Message: MEMORY Utilization is at 38% and has
violated threshold limit of 1%, isAcknowledged=false, displayName=NMS:192.168.115.141
Constraints and Traps are not generated if the issue is resolved before the next polling cycle.
Caveats
Purpose Informs users when the number of devices Prime Infrastructure is actually managing exceeds the number
of devices it is licensed to manage.
When Sent At 2:10AM on the day following the completion of the job that added the extra devices to Prime
Infrastructure inventory
Example Number of managed devices N is greater than licensed devices N. Please purchase and install
a license that will cover the number of managed devices, or remove unused devices from
the system.
Table A-14 Prime Infrastructure does not have enough disk space for backup
Purpose Informs users when Prime Infrastructure does not have sufficient space in the specified directory to
perform a backup.
When Sent Whenever Prime Infrastructureruns a server backup job and the backup repository specified (or
“defaultrepo”) is 100 percent full. The trap is generated after the job completes.
Example Prime Infrastructure with address localIPAddress does not have sufficient disk space in
directory directoryName for backup. Space needed: Needed GB, space available Free GB.
Purpose Informs users that an attempt to send an email notification has failed.
When Sent This trap is generated by polling when Prime Infrastructure attempts to send an email notification to an
invalid user, or email notification is enabled without specifying the email server in Prime Infrastructure.
Example Prime Infrastructure with address localIPAddress failed to send email. This may be due to
possible SMTP misconfiguration or network issues.
Configuring Notifications
For Prime Infrastructure to send northbound SNMP trap notifications, you must configure the correct
settings on both the Prime Infrastructure Event Notification and Notification Receivers pages. Once
configured, traps will be generated based on values associated with the Threshold and Severity for the
following SNMP Events:
• Appliance Process Failure
• HA Operations
• CPU, disk and memory utilization
• Disk, fan and PSU Failure
You can edit the threshold and severity associated with each event, and enable or disable trap generation
for the associated event.
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > System Settings > Notification Receivers.
Step 3 In the Select a command box, select Add Notification Receiver, then click Go.
Step 1 Ping the notification receiver from the Prime Infrastructure server, to ensure that there is connectivity
between Prime Infrastructure and your management application.
Step 2 Check if any firewall ACL settings are blocking port 162, and open communications on that port if
needed.
Step 3 Log in to Prime Infrastructure with a user ID that has administrator privileges. Select Administration
> Logging and download the log files. Then compare the activity recorded in these log files with the
activity you are seeing in your management application:
• ncs_nb.log: This is the log of all the northbound SNMP trap messages Prime Infrastructure has sent.
Check for messages you have not received.
• ncs-#-#.log: This is the log of most other recent Prime Infrastructure activity. Check for hardware
trap messages you have not received.
• hm-#-#.log: This is the log of all Health Monitor activity. Check for recent messages about High
Availability state-changes and application-process failures that you have not received.
The messages you see in these logs should match the activity you see in your management application.
If you find major differences, open a support case with Cisco Technical Assistance Center (TAC) and
attach the suspect log files with your case.
Related Topics
• Hardening Server Security
• Configuring Prime Infrastructure in FIPS Mode
Related Topics
• Disabling Insecure Services
• Disabling Root Access
• Using SNMPv3 Instead of SNMPv2
• Authenticating With External AAA
• Enabling NTP Update Authentication
• Enabling Certificate-Based Authentication for Web Clients
• Enabling OCSP Settings on the Prime Infrastructure Server
• Setting Up Local Password Policies
• Disabling Individual TCP/UDP Ports
• Checking On Server Security Status
Step 1 Open a CLI session with the Prime Infrastructure server (see Connecting Via CLI). Do not enter
“configure terminal” mode.
Step 2 Disable the web root account by entering the following command:
PIServer/admin# ncs webroot disable
Prime Infrastructure disables the web root account.
Step 3 Disable the root shell account by entering the following command at the prompt:
PIServer/admin# root_disable
Prime Infrastructure will prompt you for the root shell account password. Enter it to complete disabling
of the root shell account.
Step 1 Select Inventory > Device Management > Network Devices, then click Add Device.
Step 2 In the SNMP Parameters area, in Version, select v3.
Step 3 Complete the other fields as appropriate, then click Add.
Step 1 Select Inventory > Device Management > Discovery, then click Discovery Settings.
Step 2 In the SNMP Credentials area, click the + sign and add SNMP v3 credentials.
Step 3 Save the modified discovery settings and use them thereafter.
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > Users, Roles & AAA > TACACS+ or Administration > Users, Roles & AAA
> RADIUS.
Step 3 Enter the TACACS+ or RADIUS server IP address and shared secret in the appropriate fields.
Step 4 Select Administration > Users, Roles & AAA > AAA Mode Settings.
Step 5 Set the AAA mode as appropriate.
Step 1 Log in to Prime Infrastructure using the command line, as explained in Connecting Via CLI. Be sure to
enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to setup an external TACACS+ server:
PIServer/admin/terminal# aaa authentication tacacs+ server tacacs-ip key plain shared-secret
Where:
• tacacs-ip is the IP address of an active TACACS+ server.
• shared-secret is the plain-text shared secret for the active TACACS+ server.
Step 3 At the prompt, enter the following command to create a user with administrative authority, who will be
authenticated by the above AAA server:
PIServer/admin/terminal# username username password remote role admin email emailID
Where:
• username is the name of the user ID.
• password is the plain-text password for the user.
• emailID is the email address of the user (optional).
Step 1 Log in to Prime Infrastructure using the command line, as explained in Connecting Via CLI.Be sure to
enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to setup an external NTPv4 server:
PIServer/admin/terminal# ntp server serverIP userID plain password
Where:
• serverIP is the IP address of the authenticating NTPv4 server you want to use.
• userID is the md5 key id of the NTPv4 server.
• password is the corresponding plain-text md5 password for the NTPv4 server.
For example: ntp server 10.81.254.131 20 plain MyPassword
Step 3 To ensure that NTP authentication is working correctly, test it by executing the following commands:
• To check the NTP update details: sh run
• To check NTP sync details: sh ntp
Step 1 Log in to Prime Infrastructure using the command line, as explained in Connecting Via CLI. Do not enter
“configure terminal” mode.
Step 2 At the prompt, enter the following command to enable client certificate authentication:
PIServer/admin# ncs run client-auth enable
Step 3 At the command line, enter the following command:
PIServer/admin# ncs key importcacert aliasname CACertFile repository reponame
Where:
• aliasname is the short name supplied for this CA certificate (for example, aolrootca1).
• CACertFile is the name of the CA certificate file.
• reponame is the location of the Prime Infrastructure repository where the certificate file is hosted.
Step 4 After entering this command, enter the ncs stop and ncs start commands to restart the Prime
Infrastructure server and apply the changes, as follows:
ncs stop
ncs start
Step 1 Log in to the Prime Infrastructure server using the command line, as explained in Connecting Via CLI.
Do not enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to enable client certificate authentication:
PIServer/admin# ocsp responder custom enable
Step 3 At the prompt, enter the following command to set the custom OCSP responder URL:
PIServer/admin# ocsp responder set url Responder#URL
Where:
• Responder# is the number of the OCSP responder you want to define (e.g., 1 or 2).
• URL is the URL of the OCSP responder, as taken from the client CA certificate.
Note that there should be no space between the Responder# and URL values.
Step 4 To delete an existing custom OCSP responder defined on the Prime Infrastructure server, use the
following command:
PIServer/admin# ocsp responder clear url Responder#
If you do not already know the number of the OCSP responder you want to delete, use the show
security-status command to view the OCSP responders currently configured on the server. For details,
see Checking On Server Security Status.
Step 1 Log in to Prime Infrastructure with a user ID that has administrator privileges.
Step 2 Select Administration > Users, Roles & AAA > Local Password Policy.
Step 3 Select the check boxes next to the password policies you want to enforce, including:
• The minimum number of characters passwords must contain.
• No use of the username or “cisco” as a password (or common permutations of these).
• No use of “public” in root passwords.
Step 1 Log in to Prime Infrastructure using the command line, as explained in Connecting Via CLI. Do not enter
“configure terminal” mode.
Step 2 Enter the following command at the prompt:
PIServer/admin# show security-status
Depending on your settings, you will see output like the following:
Open TCP Ports: 22 443 1522 8082
Open UDP Ports: 162 514 9991
FIPS Mode: enabled
TFTP Service: disabled
FTP Service: disabled
JMS port (61617): disabled
Root Access: disabled
Client Auth: enabled
OCSP Responder1: http://10.77.167.65/ocsp
OCSP Responder2: http://10.104.178.99/ocsp
Please note that only certificate-based authentication is supported for IPSec in Prime Infrastructure. To
set this up properly, see the topic .
Prime Infrastructure supports SNMP traps via IPSec. IPSec is supported only with device having amur
image(03.06.00).
Related Topics
• Generating the Certificate
• Importing the Certificate to Prime Infrastructure
• Importing the Certificate to Managed Devices
Step 1 Log in to Prime Infrastructure using the command line, as explained in Connecting Via CLI. Do not enter
“configure terminal” mode.
Step 2 At the prompt, enter the following command to generate the CSR:
ncs key genkey -newdn -csr test.csr repository defaultRepo
This will generate the CSR file “test.csr” in the Prime Infrastructure server’s default repository.
Step 3 Copy test.csr to a file storage resource to which you have all access rights. For example:
copy disk:/defaultRepo/test.csr ftp\://your.ftp.server.
Step 4 Submit the test.csr file to the third-party Certificate Authority for verification and signing. Depending
on the CA, you may need to email the file, or paste its contents into a web form.
Step 5 You will receive the server and CA certificates from the CA. For example:
• CN.cer - The server certificate. CN is replaced with the common name of the CA (e.g.,
“MyCompany CA”).
• CA.cer - The CA certificate from the signing authority. You may receive more than one of these files,
with various names.
Step 6 Copy all the certificate files from your file resource back to the default repository. For example:
copy ftp\://your.ftp.server/CN.cer disk:defaultRepo
copy ftp\://your.ftp.server/CA.cer disk:defaultRepo
You are now ready to import the certificates into the Prime Infrastructure server, as explained in
Importing the Certificate to Prime Infrastructure
Step 1 If you have not already done so, log in to Prime Infrastructure using the command line, as explained in
Connecting Via CLI. Do not enter “configure terminal” mode.
Step 2 At the prompt, enter the following command to import the CA certificate file:
ncs key importcacert CA-Alias CA.cer repository defaultRepo
If you have more than one CA certificate file: Repeat this step for each CA cert file.
Step 3 Finally, import the CN.cer file into the server:
ncs key importsignedcert CN.cer repository defaultRepo
Step 4 Restart the Prime Infrastructure server to apply the changes:
ncs stop
ncs start
This chapter explains how to configure the high availability (HA) functionality for the Cisco Plug and
Play Gateway standalone server and how to incorporate the feature along with HA implemented in Prime
Infrastructure (where the primary and secondary servers have two different IP addresses) and Prime
Infrastructure 2.2 virtual IP address HA Model.
Prerequisites
Before using the HA feature on Cisco Plug and Play Gateway, you must:
• Configure the primary and secondary Prime Infrastructure servers and these must be accessible from
Plug and Play Gateway standalone servers. See Configuring High Availability for more details.
• Ensure that the primary and secondary Prime Infrastructure SSL server Certificates used for
Message Queue Ports 61617 and Health Monitor port 8082 are available for extraction from
primary and secondary servers for Prime Infrastructure HA mode with different IP addresses. See
Setting Up High Availability for more details.
• For virtual IP Address based HA, both primary and secondary servers must have the samevVirtual
IP address and certificates. See Virtual IP Addressing for more details.
• At least one of the Prime Infrastructure server Message Queue port 61617 port must be active at all
times depending on the service which will take the HA role.
• Install the primary and secondary Plug and Play GatewayVirtual Machines . See Cisco Prime
Infrastructure 2.2 Quick Start Guide for details of installation of virtual machines from OVA file.
Setting up Standalone Cisco Plug and Play Gateway for Prime Infrastructure HA
The Cisco Prime Infrastructure server in HA can be configured in two modes:
• Virtual IP addresses for primary and secondary servers. See Virtual IP Addressing for more details.
• Different IP addresses for primary and secondary servers. See Setting Up High Availability for more
details
The standalone Cisco Plug and Play Gateway can be configured to work in both of these modes with a
slight modification in the setup procedure.
Note Integrated Cisco Plug and Play Gateway is not supported on FIPS mode.
Note Cisco Plug and Play Gateway integrated with Prime Infrastructure will not work when the primary and
secondary servers have different IP addresses because the bootstrap configuration needs to be changed
according to the active node.
Note The standalone Cisco Plug and Play Gateway with Prime Infrastructure in HA has automatic failover
from primary to secondary. Manual failover is not available.
The standalone Cisco Plug and Play Gateway with Prime Infrastructure in HA can be configured to
failback manually or automatically from the secondary to primary server.
Enter the Cisco Plug and Play Gateway virtual IP address, virtual host name, IP address and username
and password of the secondary server as part of pnp setup. Enter 0 for manual failback and 1 for
automatic failback when prompted during the setup.
Note We recommend manual failback. Automatic failback is not recommended because in case of scenarios
like flapping interface, failover and failback happens continuously.
Along with the status for the different Cisco Plug and Play Gateway processes, it will also display
the Cisco Plug and Play Gateway in active mode when both the gateways are up. The status will also
show the connection status between the primary and secondary servers as an additional value in the
table.
To check the status of the Cisco Plug and Play Gateway server, log in to the gateway server and run the
pnp status command. See Command Reference Guide for Cisco Prime Infrastructure 2.2 for more
details.The gateway server status is displayed.
See Command Reference Guide for Cisco Prime Infrastructure 2.2 for more details on running the
commands.
Note When deleting Cisco Plug and Play Gateway HA, the administrator must manually modify the dynamic
port allocation cns event command and decommission the secondary server if HA is being turned off.
The Cisco Plug and Play Gateway secondary server will continue to run with the virtual IP address if it
is not decommissioned.