Cisco Prime Network 4.0 User Guide July 2013 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices.
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
C O N T E N T S Preface xxiii Audience xxiii Document Organization Conventions xxiv xxvi Related Documentation xxvii Obtaining Documentation and Submitting a Service Request xxvii xxvii CHAPTER 1 Setting Up Devices and Using the GUI Clients 1-1 Overview of the GUI Clients 1-1 Prime Network Vision 1-2 Prime Network Events 1-3 Prime Network Administration 1-3 Prime Network Change and Configuration Management Prime Network Operations Reports 1-3 1-3 Setting Up Devices and Validating Device In
Contents Opening Maps 2-7 Navigation Pane 2-7 Content Pane: Map, List, and Links Views Ticket Pane 2-17 Prime Network Vision Status Indicators Severity 2-18 VNE Management States 2-19 Tickets 2-23 Prime Network Vision Toolbar 2-8 2-17 2-23 Prime Network Vision Menu Bar 2-25 File Menu 2-26 Edit Menu 2-27 View Menu 2-27 Node Menu 2-28 Tools Menu 2-28 Activation Menu 2-29 Network Inventory Menu 2-29 Reports Menu 2-30 Window Menu 2-30 Help Menu 2-30 Prime Network Vision Right-Click Menus 2-31 Map Right-Cli
Contents Content Pane 3-13 Device View Pane 3-13 Device View Pane Toolbar 3-14 Ticket and Events Pane 3-15 Checking VNE Connectivity and Communication Status Viewing the Physical Properties of a Device Redundancy Support 3-21 Viewing Satellite Properties 3-22 3-16 3-19 Working with Ports 3-23 Viewing Port Status and Properties 3-23 Viewing a Port Configuration 3-25 Disabling and Enabling Alarms 3-26 Generating a Port Utilization Graph 3-27 Viewing the Logical Properties of a Network Element 3-27 Logical
Contents Protect Configurations in the Archive 4-13 Editing an Archive Configuration 4-14 Find Out What is Different Between Configurations 4-14 Copy a Configuration File to a Central Server 4-16 Are Running and Startup Configs Mismatched? (Cisco IOS and Cisco Nexus) Copy the Device Files to the Archive (Backups) 4-18 Fix a Live Device Configuration (Restore) 4-22 Clean Up the Archive 4-25 Find Out What Changed on Live Devices 4-25 4-17 Software Images 4-26 Add New Images to the Repository 4-27 New Devic
Contents Creating and Deleting Maps 5-6 Creating New Maps 5-6 Deleting Maps from the Database 5-8 Adding and Removing NEs from Maps 5-9 Managing Maps 5-11 Selecting Map Viewing Options 5-12 Applying a Background Image 5-12 Using the Overview Window 5-14 Saving Maps 5-15 Finding NEs, Services, and Links, and Elements Affected by Tickets 5-15 Working with Aggregations 5-16 Grouping Network Elements into Aggregations 5-16 Viewing an Aggregation Thumbnail 5-16 Adding Elements to an Existing Aggregation 5
Contents CHAPTER 7 Labeling NEs Using Business Tags 7-1 User Roles Required to Work with Business Tags and Business Elements Using Chinese Characters 7-2 Attaching and Detaching Business Tags 7-3 Searching for Business Tags and Viewing Their Properties Renaming a Business Element Deleting a Business Element CHAPTER 8 7-7 8-1 User Roles Required to Work with Prime Network Events Launching Prime Network Events 8-2 Working with Cisco Prime Network Events 8-10 Viewing Event Properties 8-10 Viewin
Contents Viewing Ticket Properties 9-9 Details Tab 9-10 History Tab 9-11 Affected Parties Tab 9-11 Correlation Tab 9-13 Advanced Tab 9-13 Notes Tab 9-14 User Audit Tab 9-14 Managing Tickets 9-15 Impact Analysis in Prime Network CHAPTER 10 Working with Reports 9-17 10-1 User Roles Required to Manage Reports 10-1 Using the Report Manager 10-4 Menu Options 10-6 Report Manager Toolbar 10-6 Navigation Tree 10-7 Content Pane 10-7 Reports Right-Click Options 10-9 Report Categories 10-11 Events Reports 1
Contents Moving Reports Between Folders 10-43 Deleting Reports 10-43 Viewing Report Properties 10-44 Defining Report Types 10-45 Managing Report Folders 10-45 Creating Folders 10-45 Moving Folders 10-46 Renaming Folders 10-46 Deleting Folders 10-47 Viewing Folder and Report Type Properties CHAPTER 11 10-47 Using Cisco PathTracer to Diagnose Problems 11-1 User Roles Required to Work with Cisco PathTracer Cisco PathTracer Overview 11-1 11-2 Launching Path Tracer 11-3 Cisco PathTracer Right-Click M
Contents Cisco PathTracer MPLS Start and Endpoints 11-30 Using Cisco PathTracer for CSC Configurations 11-31 Using Cisco PathTracer for Layer 3 VPNs 11-32 Using Cisco PathTracer for Layer 2 VPNs 11-32 Using Cisco PathTracer for MPLS TE Tunnels 11-33 CHAPTER 12 Monitoring Carrier Ethernet Services 12-1 User Roles Required to Work with Carrier Ethernet Services Viewing CDP Properties 12-6 Viewing Link Layer Discovery Protocol Properties Viewing Spanning Tree Protocol Properties 12-8 12-10 Viewing R
Contents Viewing STP Properties for VLAN Service Links Viewing VLAN Trunk Group Properties 12-68 Viewing VLAN Bridge Properties 12-70 Using Commands to Work With VLANs 12-72 12-67 Understanding Unassociated Bridges 12-73 Adding Unassociated Bridges 12-73 Working with Ethernet Flow Point Cross-Connects 12-75 Adding EFP Cross-Connects 12-76 Viewing EFP Cross-Connect Properties 12-76 Working with VPLS and H-VPLS Instances 12-78 Adding VPLS Instances to a Map 12-79 Applying VPLS Instance Overlays 12-80 Viewi
Contents Configuring IS-IS CHAPTER 13 12-121 Monitoring Carrier Grade NAT Properties 13-1 User Roles Required to View Carrier Grade NAT Properties 13-2 Viewing Carrier Grade NAT Properties in Logical Inventory 13-2 Viewing Carrier Grade NAT Properties in Physical Inventory Configuring CG NAT Service CHAPTER 14 13-6 Monitoring DWDM Properties 14-1 User Roles Required to View DWDM Properties Viewing DWDM in Physical Inventory Viewing G.
Contents CHAPTER 18 Monitoring MPLS Services 18-1 User Roles Required to Work with MPLS Networks 18-1 Working with MPLS-TP Tunnels 18-4 Adding an MPLS-TP Tunnel 18-5 Viewing MPLS-TP Tunnel Properties 18-7 Viewing LSPs Configured on an Ethernet Link 18-11 Viewing MPLS-TE and P2MP-MPLS-TE links in a map 18-13 Viewing LSP Endpoint Redundancy Service Properties 18-14 Applying an MPLS-TP Tunnel Overlay 18-16 Viewing VPNs 18-18 Viewing Additional VPN Properties 18-20 Managing VPNs 18-21 Creating a VPN 18
Contents Configuring VRF 18-53 Configuring IP Interface 18-54 Configuring MPLS-TP 18-54 Locking/Unlocking MPLS-TP Tunnels in Bulk Configuring MPLS-TE 18-57 Configuring MPLS 18-57 Configuring RSVP 18-58 Configuring BGP Configuring VRRP 18-59 18-60 Configuring Bundle Ethernet CHAPTER 19 18-56 18-61 Viewing IP and MPLS Multicast Configurations IP and MPLS Multicast Configuration: Overview 19-1 19-1 User Roles Required to View IP and Multicast Configurations Viewing the Multicast Configurati
Contents Viewing MLPPP Properties 20-26 Viewing MLPPP Link Properties 20-29 Viewing MPLS Pseudowire over GRE Properties 20-31 Network Clock Service Overview 20-34 Monitoring Clock Service 20-34 Monitoring PTP Service 20-36 Viewing Pseudowire Clock Recovery Properties 20-41 Viewing SyncE Properties 20-45 Applying a Network Clock Service Overlay 20-48 Viewing CEM and Virtual CEM Properties 20-49 Viewing CEM Interfaces 20-50 Viewing Virtual CEMs 20-50 Viewing CEM Groups 20-50 Viewing CEM Groups on Physi
Contents Viewing Dynamic Authorization Profile 22-3 Viewing Radius Global Configuration Details 22-4 Viewing AAA Group Configuration Details 22-5 Viewing Diameter Configuration Details for an AAA Group 22-6 Viewing Radius Configuration Details for an AAA Group 22-7 Viewing Radius Accounting Configuration Details for an AAA Group 22-7 Viewing the Radius Keepalive and Detect Dead Server Configuration Details for an AAA Group 22-9 Viewing the Radius Authentication Configuration Details for an AAA Group 22-9 V
Contents Working with the Evolved GPS Tunneling Protocol (eGTP) 25-30 Monitoring the Serving GPRS Support Node (SGSN) 25-32 LTE Networks 25-40 Overview of LTE Networks 25-40 Working with LTE Network Technologies 25-41 Monitoring System Architecture Evolution Networks (SAE-GW) 25-42 Working with PDN-Gateways (P-GW) 25-44 Working with Serving Gateway (S-GW) 25-46 Viewing QoS Class Index to QoS (QCI-QoS) Mapping 25-48 Viewing Layer 2 Tunnel Access Concentrator Configurations (LAC) 25-49 Monitoring the HRPD Se
Contents Viewing the MME Policy Configuration Details Viewing the S1 Interface Configuration Details Viewing the Stream Control Transmission Protocol CHAPTER 26 Monitoring Data Center Configurations 25-153 25-154 25-155 26-1 User Roles Required to Work with Data Center Configurations Virtual Port Channel (vPC) 26-3 Viewing Virtual Port Channel Configuration Viewing vPC Configuration 26-7 26-2 26-5 Cisco FabricPath 26-7 Viewing Cisco FabricPath Configuration 26-9 Monitoring Cisco FabricPath Config
Contents Viewing the DTI Client Configuration Details 27-4 Viewing the QAM Domain Configuration Details 27-5 Viewing the MAC Domain Configuration Details 27-6 Viewing the Narrowband Channels Configuration Details 27-8 Viewing the Wideband Channels Configuration Details 27-8 Viewing the Fiber Node Configuration Details 27-10 Configure Cable Ports and Interfaces 27-11 View Upstream and Downstream Configuration for Cable Configure QAM 27-12 View QAM Configurations Configure DEPI and L2TP CHAPTER 28 27-
Contents Ticket Properties Buttons A-18 Report Manager Buttons A-19 Badges A-19 VNE Communication State Badges A-20 VNE Investigation State Badges A-20 Network Element Technology-Related Badges Alarm and Ticket Badges A-22 A-21 GLOSSARY INDEX Cisco Prime Network 4.
Contents Cisco Prime Network 4.
Preface This guide describes Cisco Prime Network 4.0. Prime Network serves as an extensible integration platform for network and service management. At its core is a virtual network mediation model that is rich, open, and vendor-neutral, and supports the management of diverse multiservice and multivendor networks. Additionally, Prime Network provides the following mature NMS functionality: • Network topology discovery and visualization. • Element management, providing near real-time inventory.
Document Organization This guide contains the following sections: Chapter and Title Description Chapter 1, “Setting Up Devices and Using the GUI Clients” Describes the suite of GUI tools that offer an intuitive interface for managing the network and services, and for performing required system administration activities.
Chapter and Title Description Chapter 12, “Monitoring Carrier Ethernet Services” Describes how to view Carrier Ethernet services in Prime Network Vision and how to work with VLANs, pseudowires, overlays, VPLS instances, and Ethernet services. Chapter 13, “Monitoring Carrier Grade NAT Properties” Describes the Carrier Grade Name Address Translation (NAT) properties available in Prime Network Vision.
Chapter and Title Description Chapter 23, “Monitoring IP Pools” Describes how to view IP pool properties in Prime Network Vision. An IP pool is a sequential range of IP addresses within a certain network. Prime Network provides the flexibility of assigning IP addresses dynamically for services running on a network element. Chapter 24, “Monitoring BNG Configurations” Describes how to view Broadband Network Gateway (BNG) configuration in Prime Network Vision.
Table 1 Conventions (continued) Convention Description italic font Variables for which you supply values. italic screen font Variables you enter. screen font Courier plain shows an example of information displayed on the screen. Option > Network Choosing a menu item. Preferences Related Documentation Note We sometimes update the documentation after original publication. Therefore, you should also review the documentation on Cisco.com for any updates. Cisco Prime Network 4.
Cisco Prime Network 4.
CH A P T E R 1 Setting Up Devices and Using the GUI Clients These topics provides an overview of the Prime Network GUI clients, the commands you can use to set up devices, and how to use Prime Network with Prime Central.
Chapter 1 Setting Up Devices and Using the GUI Clients Overview of the GUI Clients Prime Network Vision Prime Network Vision is the main GUI client for Prime Network. Maps of devices create a visualization of the network, from the intricacies of a single device physical and logical inventory, to multi-layer topological information on connections, traffic, and routes. Faults and alarms are graphically displayed with built-in troubleshooting tools.
Chapter 1 Setting Up Devices and Using the GUI Clients Overview of the GUI Clients Prime Network Events Prime Network Events is the interface used by system managers and administrators for viewing system events that occur in the network. You can use the GUI to retrieve detailed information about the different types of system events and tickets that are generated; it also helps predict and identify the sources of system problems.
Chapter 1 Setting Up Devices and Using the GUI Clients Setting Up Devices and Validating Device Information Setting Up Devices and Validating Device Information Prime Network provides a variety of management and configuration commands that you can launch from the Vision GUI client by right-clicking an NE and selecting Commands. These commands are executed on the actual physical device versus being performed on the network model that is stored in memory (and subsequently on the real device).
Chapter 1 Setting Up Devices and Using the GUI Clients Setting Up Devices and Validating Device Information Note 1 Menu Bar 5 Ticket Pane 2 Tool bar 6 Hide/display Ticket Pane 3 Device Right-click Menu 7 Navigation Pane 4 Status Bar You might be prompted to enter your device access credentials. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials.
Chapter 1 Setting Up Devices and Using the GUI Clients Setting Up Devices and Validating Device Information Configure a Device NTP Server Command Description NTP > Add NTP Server Assigns the device to a Network Time Protocol (NTP) server to manage clock synchronization.
Chapter 1 Setting Up Devices and Using the GUI Clients Setting Up Devices and Validating Device Information Configure SNMP and SNMP Traps on Device Use the following commands to configure SNMP settings and SNMP traps on the real device. All of the following commands are launched by right-clicking the device and choosing Commands > Configuration > System.
Chapter 1 Setting Up Devices and Using the GUI Clients Setting Up Devices and Validating Device Information Command Navigation Description Add / Remove / Update port description Physical Inventory > navigate to port > Commands > Configuration Configures the descriptive information that is displayed in GUI clients when the port is selected. Examples are customer information or business case details. Change Port Status Note Disables (Shutdown) or enables (No Shutdown) the port.
Chapter 1 Setting Up Devices and Using the GUI Clients Setting Up Devices and Validating Device Information View Device and VRF Routing Tables and Device Interface Briefs These commands can be executed on all network elements that run on Cisco IOS software, Cisco IOS XR software, and Cisco NX OS. View Interface Briefs and IP Routes Command Navigation Description Show > IP Route Logical Inventory > Routing Entities > Routing Entity > Commands Displays the device routing table.
Chapter 1 Setting Up Devices and Using the GUI Clients Using Prime Network with Prime Central View, Copy, and Overwrite Device Configuration Files These commands can be executed on all network elements that run on Cisco IOS software, Cisco IOS XR software, Cisco NX OS, and Cisco IOS XE softwar Command Navigation Description Write memory NE > Commands > Configuration Overwrites the startup-config file with the current running-config.
Chapter 1 Setting Up Devices and Using the GUI Clients Using Prime Network with Prime Central Prime Network also receives EPM-MIB traps from the network. By default Prime Network receives EPM-MIB traps from any source in the network. If desired, you can configure Prime Network to only process EPM-MIB traps arriving from a specific Prime Performance Manager server. The instructions for doing this are provided on the Cisco Developer Network at http://developer.cisco.com/web/prime-network/home.
Chapter 1 Setting Up Devices and Using the GUI Clients Using Prime Network with Prime Central Cisco Prime Network 4.
CH A P T E R 2 Working with the Prime Network Vision Client The following topics describe the user access roles required to use Cisco Prime Network Vision (Prime Network Vision), the Prime Network Vision working environment, and how to access the Prime Network Vision tools and commands: • User Roles Required to Work with Basic Operations in Prime Network Vision, page 2-1 • Launching Prime Network Vision, page 2-2 • Changing Your GUI Client Password, page 2-4 • The Prime Network Vision Window, page
Chapter 2 Working with the Prime Network Vision Client Launching Prime Network Vision Table 2-1 Default Permission/Security Level Required for the Basic Prime Network Vision Functions Task Viewer Operator OperatorPlus Configurator Administrator Start Prime Network Vision X X X X X Change a user password —1 in Prime Network Vision —1 —1 —1 X1 Set Prime Network Vision options X X X X X Work with Prime Network Vision tables X X X X X 1.
Chapter 2 Working with the Prime Network Vision Client Launching Prime Network Vision Figure 2-1 Prime Network Vision with Network Elements Tab This tab contains the following radio buttons: • Search—This radio button is selected by default and allows you to search for a device by selecting any one of the following options and specifying the relevant search criteria: – Element Type – IP Address – Name – Product – System Name – Vendor • Show All—Selecting this option will display all the devices avail
Chapter 2 Working with the Prime Network Vision Client Changing Your GUI Client Password After logging into Prime Network Vision and launching the application, you can customize the Prime Network Vision settings. For example, you can: • Load the content pane with information when starting Prime Network Vision. • Display network elements in the Prime Network Vision content pane and navigation pane. • Configure audio responses when different alarms are triggered.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window Figure 2-2 Prime Network Vision Window 1 GUI client menu bar 5 GUI client status bar (amount of memory used by client and gateway connection status) 2 GUI client toolbar 6 List of tickets on selected item 3 Active map and inventory tabs 7 Toggle to hide/display ticket pane 4 Map view (content pane) 8 Inventory window (navigation pane) Prime Network Vision Inventory Tabs Prime Network Vision includes th
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window • Virtual Machines—Lists all the virtual machines. For more information about virtual machines, see Viewing the Virtual Machines of a Data Center, page 26-19. If there are tickets associated with the virtual machine, an icon is displayed. The color of the icon indicates the ticket severity. To open an inventory tab, choose Network Inventory in the menu bar, and choose the required option.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window Opening Maps You can open up to five maps at one time. To open a map, choose File > Open Map. The Open Map dialog box is displayed (see Figure 2-4). Figure 2-4 Open Map Dialog Box A check mark in the Opened column indicates that the map is already open. Map tabs display the root node icon and name.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window The navigation pane can include up to two icons for each element. These icons can include alarm icons, communication or investigation state icons, and badges, as shown in Figure 2-5. Alarm icons are always displayed next to the element icon. Figure 2-5 Navigation Pane with Icons For information about the status of network objects, see Prime Network Vision Status Indicators, page 2-17.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window • Links – Service and business links are represented as well as physical and topological links. – Unidirectional links include arrowheads that indicate the direction of the flow, while bidirectional links do not have arrowheads. • Relationships between network elements, aggregations, and networks You can move network elements manually on the map by dragging the required icon.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window For a complete list of the icons and their descriptions, see Appendix A, “Icon and Button Reference.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window Table 2-4 Icon Business Element Icons Business Element Icon Business Element Aggregation or root node Network Traffic Profile (TP) tunnel Backup pseudowire edge Network VLAN Connection termination point (TP) Ethernet flow point (EFP) MToP service Pseudowire edge EFP cross-connect Pseudowire switching entity Ethernet service Subnet Ethernet virtual connection (EVC) Switching entity Label-Switched Pat
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window To reduce the number of graphical links in a map, click Link Filter in the toolbar, and uncheck the check boxes for the links you do not need to view. Links in maps have tooltips that provide you with information regarding the link endpoints and the number of links represented by the selected link in the map. Click the link tooltip to view additional information about the link in a link quick view window.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window Table 2-6 Prime Network Vision List View Tabs Tab Description Aggregations Aggregations in the current map. Connection TP Connection termination points (TPs) in the current map. EFP Cross-Connect EFP cross-connects in the current map. Ethernet Flow Points EFPs in the current map. Ethernet Services Ethernet services in the current map. EVCs EVCs in the current map.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window Table 2-7 Tip Network Element Information Displayed in List View (continued) Field Name Description Unacknowledged Severity of the most severe unacknowledged ticket. Communication State Ability of the VNE to reach the network element, according to the health of the element. For more information about communication states, see the Cisco Prime Network 4.0 Administrator Guide.
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window Table 2-8 List View Right-Click Options (continued) Right-Click Option Function Related Documentation Properties View network element properties Viewing the Properties of a Network Element, page 3-6 Commands Launch any of the commands that are included with Prime Network Vision Setting Up Devices and Validating Device Information, page 1-4 Management Access Command Builder and Soft Properties Management Cis
Chapter 2 Working with the Prime Network Vision Client The Prime Network Vision Window Figure 2-6 shows a links view. Figure 2-6 Note Links View An external link has a blue cell background in the table, and you can open the inventory window by clicking the hyperlink. For more information about external links, see Viewing Link Properties in the Links View, page 6-8. Table 2-9 describes the information that is displayed in the links view.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Status Indicators Table 2-9 Information Displayed in the Links View (continued) Field Name Description Z End-Point Element or site that is the destination of the link as a hyperlink to the inventory of the element or site. Link Type Type of link, such as Physical Layer, LAG, MPLS TE Tunnel, pseudowire (PW) or VPN.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Status Indicators Severity Severity indicates the operational health of the element. An element has only one severity value at any given time, and this value is displayed using a severity color. For more information about the colors used to display the severity (or propagated severity) of network elements and links, see Alarm Indicators, page 2-12.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Status Indicators When new tickets are accumulated, a label is displayed in the navigation pane and map, based on the following formula: n s [+] where: Symbol Description n The number of alarms with the highest severity that have the source as the network element and are part of the network element ticket(s).
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Status Indicators A managed VNE icon consists of a managed element icon and one or two overlay icons, or badges: • The managed element icon displays a symbol of the element, and the color of the symbol indicates the highest severity ticket that is not cleared for the element. An element icon is colored green if either of the following is true: – No ticket of any severity exists for the element.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Status Indicators Table 2-11 and Table 2-12 describe network element communication and investigation states and shows the related badge for each state. Table 2-11 VNE Communication States State Name Description Badge Agent Not Loaded The VNE is not responding to the gateway because it was stopped, or it was just created. This communication state is the equivalent of the Defined Not Started investigation state.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Status Indicators Table 2-12 VNE Investigation States (continued) State Name Description Badge Discovering The VNE is building the model of the device (the device type was found and is supported by Cisco Prime Network). A VNE remains in this state until all device commands are successfully executed at least once, or until there is a discovery timeout. Operational The VNE has a stable model of the device.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Toolbar Tickets Cisco Prime Network Vision displays an icon with a ticket to indicate the severity of the top-most alarm on the ticket.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Toolbar Table 2-13 Button Prime Network Vision Toolbar (continued) Name Function Show Links View Displays the links view in the Prime Network Vision content pane (the button toggles when selected or deselected). Overlay Tools Choose Overlay Type Chooses and displays an overlay of a specific type on top of the elements displayed in the content pane in a map view.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Menu Bar Table 2-13 Button Prime Network Vision Toolbar (continued) Name Function Find Previous Finds the previous instance of the search string entered in the Find in Map dialog box. Find Opens the Find in Map dialog box, enabling you to find an element in the map by its name or IP address. Find Next Finds the next instance of the search string entered in the Find in Map dialog box.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Menu Bar Note • Reports Menu, page 2-30 • Window Menu, page 2-30 • Help Menu, page 2-30 The functionality that a user can access in Prime Network Vision depends on the user role and the security level of the scopes assigned to the user. For more information, see User Roles Required for Working with Prime Network Vision Maps, page 5-2.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Menu Bar Table 2-14 File Menu Options (continued) File Menu Option Description Close Closes the selected map or tab. Exit Exits the Prime Network Vision application and saves the content pane. 1. This option is available only when a map is displayed in the content pane. Edit Menu Table 2-15 identifies the options available in the Prime Network Vision Edit menu.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Menu Bar Node Menu Table 2-17 describes the Node menu options. Note Most of the functionality available in this menu is available only when an element icon or an aggregation is selected in the navigation pane or a map. Table 2-17 Node Menu Options Node Menu Option Description Inventory Displays a dialog box that enables you to view the physical and logical inventory.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Menu Bar Table 2-18 Tools Menu Options (continued) Tools Menu Option Description Change and Config Displays the Prime Network Change and Configuration Management dashboard. Mgmnt For more information, see the Chapter 4, “Device Configurations and Software Images.” Command Jobs Displays all Command Builder jobs that have been scheduled and their details. For more information, see the Cisco Prime Network 4.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Menu Bar Table 2-20 Network Inventory Menu Options (continued) Network Inventory Menu Option Description VTP Domains Displays a list of the current of the VLAN Trunk Protocol (VTP) domains in the VTP Domains tab. For more information, see Viewing VLAN Trunk Group Properties, page 12-68. Virtual Machines Displays a list of the available virtual machines in the Virtual Machines tab.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Prime Network Vision Right-Click Menus If you right-click a specific area, link, network element, device, or alarm in a Prime Network Vision window, a context-sensitive right-click menu is displayed that contains options available for the selected item or items. Right-click menus are also available in many of the inventory and property windows.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Map Right-Click Menu The map right-click menu is displayed when you right-click anywhere on a map in the content pane and no elements are selected. Table 2-23 describes the map right-click menu options. Table 2-23 Map Right-Click Menu Options Option Description Go to Parent Moves up one level in the navigation pane and content pane to enable you to view different information.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Table 2-24 Element Right-Click Menu Options (continued) Option Description Commands Enables you to launch any of the commands that are included with Prime Network Vision. For more information on the available commands and how to implement them, see Configure Basic Device Settings: Name, DNS, NTP, RADIUS, TACACs, ACLs, page 1-5. Note Config Mgmnt Additional commands may be available for your devices.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Table 2-24 Element Right-Click Menu Options (continued) Option Description Launch external applications Starts an external application or tool that has been configured for access via the right-click menu. For more information, see the Cisco Prime Network 4.0 Customization Guide.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Table 2-24 Element Right-Click Menu Options (continued) Option Description Tools The Tools option contains the following choices: • CPU Usage—Displays memory and CPU usage information for a device or network element. • Ping—Pings the device from the client station. • Telnet—Communicates with the device using the Telnet window from the client station.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Aggregation Right-Click Menu The aggregation right-click menu is displayed when you right-click an aggregation in a map. Table 2-25 describes the aggregation right-click menu options.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus List View Right-Click Menu The list view right-click menu is displayed when you right-click an entry in the Network Elements tab in the list view table. For more information, see List View, page 2-12. Table 2-27 describes the list view right-click menu options.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Table 2-27 List View Right-Click Menu Options - Network Elements Tab (continued) Option Description Tools Contains the following submenu options: • CPU Usage—Displays memory and CPU usage information for a device or network element. • Ping—Pings the device from the client station. • Telnet—Communicates with the device using the Telnet window from the client station.
Chapter 2 Working with the Prime Network Vision Client Prime Network Vision Right-Click Menus Table 2-27 List View Right-Click Menu Options - Network Elements Tab (continued) Option Description Script names Launches available activation and configuration scripts. This includes the commands documented throughout this guide and those you create using Command Manager and Command Builder. A list of scripts is provided in Cisco Prime Network 4.0 Supported VNEs - Addendum.
Chapter 2 Working with the Prime Network Vision Client Adjusting the Prime Network Vision GUI Client Settings Ticket Right-Click Menu The Ticket right-click menu is displayed when you right-click a ticket in the ticket pane. The Ticket right-click menu enables you to view ticket properties and highlights the links or elements that are affected by a ticket. The Ticket menu also enables you to acknowledge, clear, and remove a ticket.
Chapter 2 Working with the Prime Network Vision Client Adjusting the Prime Network Vision GUI Client Settings Table 2-30 Options for Changing Prime Network Vision GUI Client Field Description Startup Load Workspace on Startup Open to content pane on login. Check the box if you do not want to view the content pane when you log in. Display Tab Preferences Map Labels Font Size Font size for map labels (26, 28, 30, 32, and 34; 30 is the default). Severity Show Severity Text (e.g.
Chapter 2 Working with the Prime Network Vision Client Filtering and Sorting Tabular Content Filtering and Sorting Tabular Content For tables with extensive data, you can view all of the information in a table cell by hovering your mouse cursor over the cell. These topics explain how to sort and filter tabular information. Sorting Tables Sorting a table lets you arrange existing data in various ways, while filtering a table only displays the information that matches the filter.
Chapter 2 Working with the Prime Network Vision Client Filtering and Sorting Tabular Content Filtering Tables Filtering can be extremely helpful when working with tables that contain many entries. Note If you load a table with many entries, (for example, thousands of entries), it can take a while for the complete table to load. The filtering options in the table toolbar are unavailable until the table has completely loaded.
Chapter 2 Working with the Prime Network Vision Client Filtering and Sorting Tabular Content Tip You can use the “Greater than” or “Less than” rule with a string for filtering. For example, if you want to include all interfaces above Ethernet0/0/3, you can select Greater than and enter the string Ethernet0/0/3 to view interfaces Ethernet0/0/4, Ethernet0/0/5, and so on. Step 4 Click to add another criterion for this filter. Step 5 Add additional criteria as required.
CH A P T E R 3 Viewing and Managing NE Properties The following topics describe the user access roles required to use Cisco Prime Network Vision (Prime Network Vision) and how to view network element physical and logical properties in any mapped network: Note • User Roles Required to Work with Prime Network Vision, page 3-1 • Information Available in Element Icons, page 3-3 • Viewing the Properties of a Network Element, page 3-6 • Inventory Window, page 3-9 • Checking VNE Connectivity and Commu
Chapter 3 Viewing and Managing NE Properties User Roles Required to Work with Prime Network Vision The following tables identify the tasks that you can perform: • Table 3-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 3-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements.
Chapter 3 Viewing and Managing NE Properties Information Available in Element Icons Table 3-2 Default Permission/Security Level Required for Prime Network Vision Functions - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View maps X X X X X View network element properties X X X X X View network element properties in logical and physical inventory X X X X X View port status and properties — X X X X View VNE properties X X X X X Ope
Chapter 3 Viewing and Managing NE Properties Information Available in Element Icons Table 3-3 Information Displayed in Element Icons by Size (continued) Icon Size Element Type Tiny (Dot) Normal Ethernet flow point Color representing the associated alarm severity Name Ethernet service EVC LSP Endpoint (Working or Protected) LSP Midpoint MPLS-TP Tunnel MPLS-TP Tunnel Endpoint Color representing the associated alarm severity Name Color representing the associated alarm severity Name Color
Chapter 3 Viewing and Managing NE Properties Information Available in Element Icons Table 3-3 Information Displayed in Element Icons by Size (continued) Icon Size Element Type Tiny (Dot) Normal Network element Color representing the associated alarm severity Name Pseudowire Pseudowire edge VLAN VPLS VPLS Forward VPN Color representing the associated alarm severity Color representing the associated alarm severity Color representing the associated alarm severity Color representing the associ
Chapter 3 Viewing and Managing NE Properties Viewing the Properties of a Network Element Viewing the Properties of a Network Element You can view the general information about a selected network element in the Prime Network Vision map view and view more detailed information by viewing the Properties window for the selected element.
Chapter 3 Viewing and Managing NE Properties Viewing the Properties of a Network Element Table 3-4 Properties and Inventory Windows Field Description General Tab Element icon Icon representing the element in Prime Network Vision and displaying the current color associated with the element operational health. For more information on severity colors, see Prime Network Vision Status Indicators, page 2-17.
Chapter 3 Viewing and Managing NE Properties Viewing the Properties of a Network Element Table 3-4 Properties and Inventory Windows (continued) Field Description Buttons VNE Details Displays the VNE’s general properties, from where you can edit the VNE’s properties, perform maintenance, configure polling rates, and identify IP addresses for which SNMP syslog and trap events are to be generated.
Chapter 3 Viewing and Managing NE Properties Inventory Window Table 3-5 Icon Network Element Badges (continued) Name Description Related Topic Reconciliation The element with this badge is associated Deleting a Business Element, page 7-7 with a network element that does not exist. For example, the device configuration has changed and a network problem exists. Some elements can be deleted only if their components, such as EFPs, VPLS forwards, or VRFs, display the reconciliation icon.
Chapter 3 Viewing and Managing NE Properties Inventory Window Table 3-6 Tasks Available from Inventory and Related Topics (continued) Task Related Topic Open the Prime Network Command Builder to create customized commands. Cisco Prime Network 4.0 Customization Guide Open the Prime Network Soft Properties Manager to extend the amount of information displayed. Cisco Prime Network 4.
Chapter 3 Viewing and Managing NE Properties Inventory Window Figure 3-2 Inventory Window 1 2 3 4 5 6 10 320084 9 8 7 1 Navigation pane 6 Content pane 2 Poll Now button (see Performing a Manual Device Poll, page 3-18) 7 Status bar 3 VNE Details button (see VNE Properties Window (VNE Status Button in the content pane of the Inventory Window), page 3-16) 8 Ticket and events pane 4 VNE Status button (see VNE Communication 9 Status (VNE Details Button in the content pane of the Inven
Chapter 3 Viewing and Managing NE Properties Inventory Window • Checking VNE Connectivity and Communication Status, page 3-16 • Working with Ports, page 3-23 All areas displayed in the inventory window are correlated; this means that selecting an option in one area affects the information displayed in the other areas. The information displayed in the inventory window varies according to the item selected in the navigation pane.
Chapter 3 Viewing and Managing NE Properties Inventory Window Communication and Investigation State Icons The navigation pane can also display a communication or investigation state icon next to the element icon in the navigation and content panes. For more information about communication and investigation state icons, see VNE Management States, page 2-19.
Chapter 3 Viewing and Managing NE Properties Inventory Window Figure 3-3 Device View Pane Device View Pane Toolbar The following tools for working with the device view pane: Icon Description Displays an enhanced view of the components within the device in a browse box as you move over the device view panel with the selection tool. Fits the entire view of the element in the device view panel. Cisco Prime Network 4.
Chapter 3 Viewing and Managing NE Properties Inventory Window Ticket and Events Pane The ticket and events pane is displayed at the bottom of the inventory window and contains the following tabs: • Tickets—Displays the tickets that are collected on the selected element, service, or component in the navigation pane. Table 9-3 on page 9-5 describes the information that is available in the Tickets tab.
Chapter 3 Viewing and Managing NE Properties Checking VNE Connectivity and Communication Status When displaying network and provisioning events, Prime Network Vision monitors the history size value defined in the Events tab of the Options dialog box (Tools > Options > Events). The default value is six hours and can be changed in Prime Network Administration.
Chapter 3 Viewing and Managing NE Properties Checking VNE Connectivity and Communication Status Figure 3-4 Note VNE Properties Window VNE status is not the same as device status. A device may be fully reachable and operating even though the VNE status is Down, Unreachable, or Disconnected. The Cisco Prime Network 4.0 Administrator Guide describes these properties in detail, but for a Prime Network Vision GUI Client user, probably the most important information is the VNE status.
Chapter 3 Viewing and Managing NE Properties Checking VNE Connectivity and Communication Status Figure 3-5 VNE Status Details Window The VNE Status Details window provides this information about the VNE: • Its management connectivity state, which has to do with how the VNE was configured • The protocols the VNE is using to communicate with the device and the status of each • Whether the device is generating syslogs or traps In the Management State area, if the Reduced Polling field is true and th
Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device Viewing the Physical Properties of a Device Each device that is managed by Prime Network is modeled in the same manner. The physical inventory reflects the physical components of the managed network element, as shown in Table 3-8.
Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device Fans and power supplies are displayed in physical inventory if they are field replacable units (FRUs). The manner in which the fans are displayed depends on whether the fans can be separated or not: • If the fans under the fan trays are inseparable, only the fan trays are represented. • If the fans under the fan trays can be separated, they are shown as separate items in physical inventory.
Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device 1 Poll Now button Poll the VNE and update the information as needed. For more information, see Performing a Manual Device Poll, page 3-18. 2 Show VC Table button Displays virtual circuit (VC) information for the selected port. For more information, see Viewing ATM VPI and VCI Properties, page 20-10. 3 4 Show Cross Connect button Displays cross-connect information for incoming and outgoing ports.
Chapter 3 Viewing and Managing NE Properties Viewing the Physical Properties of a Device Viewing Satellite Properties Prime Network provides satellite support for Cisco Aggregation Service Router (ASR) 9000 series network elements. Satellites are used to enhance performance bandwidth of Cisco ASR 9000 network elements. Each satellite is modeled as a chassis in the physical inventory. To view the satellite properties: Step 1 In Cisco Prime Network Vision, double-click the required device.
Chapter 3 Viewing and Managing NE Properties Working with Ports One or more satellites are connected to the host Cisco ASR 9000 series network element by using the physical ethernet links, which also act as inter-chassis links (ICLs) for connecting the satellites with the other chassis or satellites within the host. To view the satellite ICLs, choose the Satellite ICL container in the logical inventory of the device. The content pane displays a list of satellite ICLs with the following details.
Chapter 3 Viewing and Managing NE Properties Working with Ports Figure 3-8 shows an example of the Ports tab in the inventory window. Figure 3-8 Ports Tab in the Inventory Window Table 3-10 describes the information that is displayed in the Ports tab. Table 3-10 Ports Tab in the Inventory Window Field Description Location Location of the port in the device, using the format slot.module/port, such as 1.GigabitEthernet1/14. Type Port type, such as RJ45 or Pluggable.
Chapter 3 Viewing and Managing NE Properties Working with Ports Viewing a Port Configuration In addition to viewing logical inventory information from the logical inventory branch, you can view services provisioned on physical ports by clicking a physical port in the physical inventory branch. Information that is displayed includes: • Physical layer information. • Layer 2 information, such as ATM and Ethernet. • Subinterfaces used by a VRF.
Chapter 3 Viewing and Managing NE Properties Working with Ports The subinterface is a logical interface defined in the device; all of its parameters can be part of its configuration. Table 3-11 describes the information that can be displayed in the Subinterfaces table. Not all fields appear in all Subinterfaces tables. Table 3-11 Subinterfaces Table Field Description Address IP address defined in the subinterface. Mask Subnet mask. VLAN Type Type of VLAN, such as Bridge or IEEE 802.1Q.
Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Step 3 To disable alarms on one or more ports at the same time: a. In the inventory window, click the Ports tab. b. In the Ports table, select the required ports. You can select multiple ports by using the Ctrl and Shift keys. c. Right-click one of the selected ports, and choose Disable Sending Alarms. In response, the Sending Alarms field displays the value false for the selected ports.
Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Logical Inventory Window Logical inventory information is displayed in the inventory window as shown in Figure 3-10. Figure 3-10 Note Logical Inventory Information Displayed in the Inventory Window For more information about opening the inventory window, see Inventory Window, page 3-9. Cisco Prime Network 4.
Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Logical Inventory Navigation Pane Branches Table 3-12 describes the branches that appear in the logical inventory navigation pane. Table 3-12 Logical Inventory Navigation Pane Branches This branch... Provides information about...
Chapter 3 Viewing and Managing NE Properties Viewing the Logical Properties of a Network Element Table 3-12 Logical Inventory Navigation Pane Branches (continued) This branch... Provides information about... MLPPP Multilink Point-to-Point (MLPPP) configurations Modular OS Modular operating systems for Cisco IOX XR devices MPBGPs Properties associated with provider edge (PE) network elements.
Chapter 3 Viewing and Managing NE Properties Viewing Device Operating System Information Logical Inventory Content Pane Tabs Table 3-13 describes the tabs that are displayed in the logical inventory content pane when you select Logical Inventory, depending on the device configuration. Note Prime Network Vision does not display the tabs in Table 3-13 for devices that support multiple contexts.
Chapter 3 Viewing and Managing NE Properties Viewing Device Operating System Information To view operating system information for Cisco IOS, Cisco IOS XR, or Cisco IOS XE devices: Step 1 In Prime Network Vision, double-click the required device. Step 2 For a Cisco IOS device, view information about the operating system by clicking Logical Inventory and choose the Operating System tab. Table 3-14 describes the information that is displayed in the Operating System tab.
Chapter 3 Viewing and Managing NE Properties Viewing Device Operating System Information Figure 3-11 Modular OS Information in Logical Inventory Table 3-15 describes the information that is displayed for Cisco IOS XR system. Table 3-15 Modular OS Information in Logical Inventory Field Description Is K9Sec Whether or not the K9 security feature is enabled on the operating system: True or False Cw Family Cisco family, based on the device platform, such as CRS_IOS_XR or C12K_IOS_XR.
Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu Table 3-15 Modular OS Information in Logical Inventory (continued) Field Description OS Packages Table Package Info Information on the individual package and its version, such as disk0:hfr-admin-3.9.3.14 Package Description Description of the package, such as FPD (Field Programmable Device) Package. Composite Name Composite package name of the package with the date and time, such as: Tues Feb 8 20:37:07.
Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu These topics describe how to run activations: • Network Activation Window, page 3-35 • Running Activations, page 3-35 • Searching for Activations (Activation History), page 3-36 • Rolling Back an Activation, page 3-36 • Cloning an Existing Activation, page 3-37 • Deleting Activations, page 3-37 Network Activation Window Note Transaction Manager replaces the Prime Network Workflow and Activation feature
Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu Step 4 Step 5 Check your entries and preview your changes: a. Click the User Input tab and check all of the values you entered. b. Click the Preview Configuration tab, which displays and validates the CLI commands that will be run on the device. It also highlights any errors so that you can make corrections to your input. Run the activation.
Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu Step 1 From the Activation menu, choose Activation History. The Activation History window displays a list of recent activation attempts. Step 2 If necessary, search for the desired activation (see Searching for Activations (Activation History), page 3-36). Step 3 Select the activation and view its details. Activations can be rolled back if the Operation column displays Add and the State column displays Done.
Chapter 3 Viewing and Managing NE Properties Running an Activation from the Activation Menu Cisco Prime Network 4.
CH A P T E R 4 Device Configurations and Software Images Cisco Prime Network Change and Configuration Management (CCM) provides tools for managing the software images and device configuration files used by the devices in your network. CCM is also the launch point for the following Prime Network features: • Transaction Manager, which is used to manage and execute activations on groups of devices.
Chapter 4 Device Configurations and Software Images What is Change and Configuration Management? Configuration Management Configuration Management enables you to control and track changes that are made to a device configuration. It uses a change management feature to detect ongoing changes to devices in two ways: • When doing periodic archiving of device configurations. If CM detects a change in a configuration file, it will get the new version of the file from the device and copy it to the archive.
Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management Note All image management operations are performed only on completely managed devices. (This means the Communication State of the device must be Reachable and Investigation State of the device must be Operational.
Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management To disable port 8080, perform the same operation but use the disable argument. • The SCP port being used by a device must match the SCP port configured in the device VNE (the VNE is Prime Network's model of the device). If a device is not using the default SCP port, be sure that the VNE is also configured with the correct port.
Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management • Ensure reachability from Prime Network units to devices and vice versa. • Make sure you have performed all of the device configuration prerequisites for adding VNEs. These commands are described in the Cisco Prime Network 4.0 Administrator Guide. • Change and Configuration Management supports FTP for all config and image transfers.
Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management Caution FTP is not a secure mode of transfer. Use SCP/SFTP instead, for secure config and image transfers. – The TFTP source interface on the devices must be able to reach the unit. Otherwise, the configuration management jobs that require TFTP may fail.
Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management – How often are changes made to devices? 7. Specify the default mode of restoring configuration files to the devices using Restore Mode. 8. Configure the SMTP server and e-mail IDs to send notifications on the status of configuration management jobs to users. (You can also specify e-mail settings when you create a job.) 9.
Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management 4. Enable the warm upgrade facility to reduce the downtime of a device during planned Cisco IOS software upgrades or downgrades (in the Warm Upgrade area). 5. Configure the gateway storing directory to use when transferring images from an outside source into the image repository (from Cisco.com or from another file system). This is controlled from the File Locations area.
Chapter 4 Device Configurations and Software Images Set Up Change and Configuration Management Device Groups Setup Tasks You can create user-defined device groups for ease of performing operations. A static group contains a specific set of devices; new devices must be added manually. A dynamic group is populated according to membership rules; if newly-added devices match the rules, they are automatically added to the group.
Chapter 4 Device Configurations and Software Images Use the CCM Dashboard You can set up membership rules with parameters such as device name, range of device IP addresses, and the device element type. For example: Device Name equals 1800 IP Address between 10.77.214.107 Element Type equals Cisco 1801 Note • Step 4 And 10.77.214.171 IPv4 You can choose to include any one or a combination of these parameters in the rule by using the And/Or operator.
Chapter 4 Device Configurations and Software Images Use the CCM Dashboard Figure 4-2 CCM Dashboard Dashlet Provides information about: Top Families Four device families with the highest number of devices in the network. Smaller groups can be viewed by toggling to the tabular form. From here, you can distribute and activate software images to a selected family.
Chapter 4 Device Configurations and Software Images Device Configurations Use the following icons to toggle between different views in the Top Families, Configuration Sync Status, and Configuration Changes in the Last Week dashlets. Icon Description Displays the details in the form of a pie or bar chart. If you hover your mouse cursor over a section in the pie chart, a tooltip displays the information associated with that section. Displays the details in a tabular form.
Chapter 4 Device Configurations and Software Images Device Configurations Protect Configurations in the Archive Table 4-1 Configuration Information Displayed on Archived Configurations Page Field Description Device Name Name of device. Click the icon next to the device name to open a popup that displays device properties.
Chapter 4 Device Configurations and Software Images Device Configurations Assigning labels to configuration files is a clear, simple way to identify important configurations and convey critical information. You can manage labels by choosing Labels > Manage. • Adding a label adds it to the catalog where it is made available to all users. Add labels by clicking Add Row. • Deleting a label unassigns the label from configurations that are using it.
Chapter 4 Device Configurations and Software Images Device Configurations Figure 4-3 Compare Configurations Dialog Box You can compare any types of configurations as long as they run on the same operating system. However, you cannot compare a Cisco IOS configuration with Cisco IOS XR configuration. The following are typical scenarios for using the compare function: Note • Compare the latest and next-to-latest configuration to see the most recent change.
Chapter 4 Device Configurations and Software Images Device Configurations Step 3 You can choose to do the following: Device Type or OS Supported Function For Cisco IOS XR devices Compare > To Active Running or Compare > To Active Admin Cisco IOS device Compare > To Active Startup or Compare > To Active Running Cisco ASR 5000 series device Compare > To Active Boot or Compare > To Active Running All Compare > Selected Archives Copy a Configuration File to a Central Server You can export configur
Chapter 4 Device Configurations and Software Images Device Configurations Step 3 Click Export. The export job is created and you are redirected to the Job Manager page, where you can monitor the status of the job. Are Running and Startup Configs Mismatched? (Cisco IOS and Cisco Nexus) Cisco IOS and Cisco Nexus series devices contain a startup and running configuration file. The startup configuration is loaded when a device is restarted.
Chapter 4 Device Configurations and Software Images Device Configurations Figure 4-4 Configuration Synchronization - Out of Sync Devices Page Step 2 Click the Compare icon to launch the Compare Configuration window, which provides a side-by-side view of the two configurations and highlights the differences. Step 3 Choose the network elements you want to synchronize. This directs Prime Network to overwrite the startup configuration on the device with the configuration that is currently running.
Chapter 4 Device Configurations and Software Images Device Configurations • Cisco Nexus series devices: Startup and running configurations for all VDCs configured in the device. • Cisco 7600 series devices with an ACE card: Startup and running configurations of the ACE card.
Chapter 4 Device Configurations and Software Images Device Configurations Table 4-2 Method Ongoing Methods for Archiving Configuration Files (continued) Description • Event-Driven—Backs up device files when Prime Network receives a configuration change notification. Use this method if you consider every configuration file change to be significant. This is controlled by the Enable Event-triggered Config Archive setting on the Configuration Management Settings page.
Chapter 4 Device Configurations and Software Images Device Configurations Figure 4-5 Configuration Backup Page Step 3 To choose devices from a specific device group, click Select Groups. Click the hyperlinked device group name to view the list of devices that belong to the group. Step 4 Select the required device group in the Device Groups page and click OK. The devices that belong to the selected device group are highlighted in the Configuration Backup page.
Chapter 4 Device Configurations and Software Images Device Configurations Fix a Live Device Configuration (Restore) CCM performs the configuration restore operation in either overwrite or merge mode, as described in the following. As part of restore operation, the configuration files are backed up again after the restore procedure is complete. • Overwrite mode—CCM overwrites the existing configuration on the device with a configuration file from the archive.
Chapter 4 Device Configurations and Software Images Device Configurations If you selected all the entries in a page, and then deselected one or few options from the selection, and then move to the subsequent pages to select all the devices from the Devices (in the table headline), the selection in the previous page disappears. Before You Begin • Make sure you have installed Flash Player version 10 or higher to view the Configuration Restore page.
Chapter 4 Device Configurations and Software Images Device Configurations Note Step 4 Edited files are restored only in merge mode. If you are restoring to startup mode on the devices ASR 901, ASR 903, and MWR2941, the restore procedure is performed on overwrite mode. If you want to edit a file before restoring it, click Edit Config (edited files are restored only in merge mode). You can view the details of the selected configuration file in the Configuration Editor page as shown in Figure 4-7.
Chapter 4 Device Configurations and Software Images Device Configurations Note Step 8 You might be prompted to enter your device access credentials. This option is enabled if, from the Prime Network Administration > Global Settings > Security Settings > User Account Settings > Execution of Configuration Operations, you checked the option Ask for user credentials when running configuration operations. This is an enhanced security measure to restrict access to devices. Click Restore.
Chapter 4 Device Configurations and Software Images Software Images Figure 4-8 Configuration Change Logs The Configuration Change Logs page displays change information, sorted according to the latest time stamp. (For a description of common fields, see Device Configurations, page 4-12.) The date and time stamps are displayed according to the local time zone settings of the client.
Chapter 4 Device Configurations and Software Images Software Images • Clean Up the Repository, page 4-44 Add New Images to the Repository Images are copied to the storing directory specified on the Image Management Settings page. Prime Network verifies whether the file contents are different from the previous version in the repository. If there are no differences, the image is not added to the repository.
Chapter 4 Device Configurations and Software Images Software Images New Devices: Create an Image Baseline Use this method to create an image baseline—that is, import software images directly from existing devices to the Prime Network image repository. This is useful when you add devices from a new device series or family. This information is imported: Note • Cisco IOS devices: Currently-running images.
Chapter 4 Device Configurations and Software Images Software Images Step 8 If you have selected two or more devices, click one of the following to specify the operation mode: • Parallel Order—Imports images from all devices at the same time. • Sequential Order—Allows you to specify the order of the devices to import the images from. You can do so by moving the devices up and down in the Device Order box.
Chapter 4 Device Configurations and Software Images Software Images If appropriate, the images can be activated as part of the distribution job, and these tasks can also be performed: • Commit Cisco IOS XR (so that changes are saved across device reloads). • Perform a warm upgrade, where one Cisco IOS image can read in and decompress another Cisco IOS image and transfer control to this new image (thus reducing the downtime of a device during planned software upgrades and downgrades).
Chapter 4 Device Configurations and Software Images Software Images An upgrade analysis verifies that the device contains sufficient RAM or storage, the image is compatible with the device family, and the software version is compatible with the image version running on the device. Table 4-3 denotes the symbols used on the Distribution page.
Chapter 4 Device Configurations and Software Images Software Images Prime Network does not support TAR file operations on devices. If you have TAR files to import, you must extract the TAR file and then import the image from the device. TAR file operations are supported only Cisco Catalyst devices. Note Step 3 a. To choose devices of a specific device group, click Select Groups in the table header. Click the hyperlinked device group name to view the list of devices that belong to the group. b.
Chapter 4 Device Configurations and Software Images Software Images Note Check the report to verify whether the storage location has sufficient space for the image or package. If the space is insufficient, the distribution will fail. If there is insufficient memory, you can choose to clear the disk space while scheduling the distribution in the Schedule Distribution page.
Chapter 4 Device Configurations and Software Images Software Images Field Description Warm Upgrade (For Cisco IOS only) Activates the Warm Upgrade feature to reduce the device downtime during the distribution process. Note ISSU Step 8 You can perform a warm upgrade only on Cisco IOS devices 12.3(2)T or later, such as 12.4T, 15.0, 15.1T, and for ISR 800/1800/2800/3800 series and 1900/2900/3900 series.
Chapter 4 Device Configurations and Software Images Software Images Activate Cisco IOS Software Images To activate a Cisco IOS image on a network element: Step 1 Choose Images > Activate. Step 2 From the Cisco Devices tab, choose IOS by activation method (IOS by Images or IOS by Devices). It is often easier to start with devices due to the sometimes cryptic nature of software image names. In this example we start with devices. Step 3 Prime Network displays all managed devices.
Chapter 4 Device Configurations and Software Images Software Images If it cannot proceed, you will not be permitted to continue. Otherwise, click Next. Step 8 Enter the scheduling information in the Schedule Activation page. By default, jobs are scheduled to run as soon as possible. Note The time you specify here to schedule the activation job is the server time. Step 9 Enter the e-mail ID(s) to which to send a notification after the scheduled activation job is complete.
Chapter 4 Device Configurations and Software Images Software Images Step 7 You can choose to perform one of the following for each row in the table: • Edit—Modify the boot priority value, the image name, and the configuration file, if required. The modified boot priority value should be unique. • Delete—Delete the boot configuration priority. • Add Row—Add boot priorities to the existing list. CCM generates boot priority values based on the inputs provided.
Chapter 4 Device Configurations and Software Images Software Images • When upgrading the core router package (such as c12k-mini or comp-hfr-mini), the manageability package (such as c12k-mgbl or hfr-mgbl-p) must be upgraded at the same time to ensure that the router remains manageable after the reload. • Cisco IOS XR routers support the clear install rollback oldest x command, that allows you to manage the number of rollback points maintained on the router.
Chapter 4 Device Configurations and Software Images Software Images Activate, Deactivate, and Delete Cisco IOS XR Packages Note For Cisco IOS XR devices, we recommend that you do not commit the package change until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads.
Chapter 4 Device Configurations and Software Images Software Images Step 4 Enter the scheduling information. By default, jobs are scheduled to run as soon as possible. Note The time you specify here to schedule the activation job is the server time. Step 5 Enter the e-mail ID(s) to which to send a notification after the scheduled activation job is complete. For two or more users, enter a comma-separated list of e-mail IDs.
Chapter 4 Device Configurations and Software Images Software Images Synchronize All Satellites Without Performing an Activation To synchronize all satellites together without activation: Step 1 Choose Images > Activate > IOS-XR and the activation method (by Devices). Step 2 Choose the Cisco ASR 9000 device family and the Sync Satellites option from the Select Operations drop-down menu in the table header. Prime Network displays all managed Cisco ASR 9000 series devices having satellites.
Chapter 4 Device Configurations and Software Images Software Images Note We recommend that you do not commit package changes until the device runs with its configuration for a period of time, until you are sure the change is appropriate. In that way, the change is not yet persisted across device reloads. Before You Begin • Verify that the package to be committed is operating properly (for example, by doing a show status command).
Chapter 4 Device Configurations and Software Images Software Images • Make sure you have the permissions to perform the rollback operation. You will not be allowed to schedule a rollback job, if you do not have permissions. To roll back a Cisco IOS XR package: Step 1 Choose Images > Rollback. Prime Network displays all Cisco IOS XR devices. You can filter the results by using the Quick Filter option. Step 2 Choose the network elements.
Chapter 4 Device Configurations and Software Images Software Images Step 8 Enter the scheduling information. Note Step 9 Enter the e-mail ID(s) to which to send a notification after the scheduled rollback job is complete. For two or more users, enter a comma-separated list of e-mail IDs. A notification e-mail is sent based on the e-mail option specified in the Image Management Settings page. Note Step 10 The time you specify here to schedule the rollback job is the server time.
Chapter 4 Device Configurations and Software Images Configuration Audit Note In the Configuration Management and Image Management Settings pages, CCM does not support the following special characters: • For Password fields—>, <, ', /, \, !, :, ;, and " • For all other fields—`, ~, @, #, $, %, ^, &, *, (, ), +, =, |, {, }, [, ], ', ?, >, <, /, \, !, :, ;, and " Configuration Audit Note Starting Prime Network 4.0, Configuration Audit is being replaced by Compliance Audit.
Chapter 4 Device Configurations and Software Images Configuration Audit You can combine multiple different configurations into one policy. For example: #BGP Configuration Audit router bgp (.*) neighbor (.*) remote-as (.*) address-family ipv4 # Interface MEP check interface GigabitEthernet(.*) ethernet (.*) mep domain UP (.
Chapter 4 Device Configurations and Software Images Configuration Audit Figure 4-10 Create Configuration Policy-Showing Guidelines Edit, View, or Delete Configuration Policy In the Configuration Policies page, you can also do the following: • Select a policy and click Edit to modify the policy description and CLI commands. You cannot modify the policy name. Keep in mind the policy guidelines while modifying the CLI commands.
Chapter 4 Device Configurations and Software Images Configuration Audit Step 4 In the Schedule Audit page, provide a job name and the scheduling information for the configuration audit job. You can choose to run the audit job immediately or at a later point in time. A popup with the server time is available to assist you in setting up the time for scheduling the audit job. Step 5 Click Audit. You will be redirected to the Configuration Audit Jobs page.
Chapter 4 Device Configurations and Software Images Configuration Audit Figure 4-11 Step 2 Configuration Audit Job Details Click on the hyperlinked Status (Pass/Fail icon) in the Job Results table. Or, click the hyperlinked Success or Failure hyperlink in the Result field of the History table.
Chapter 4 Device Configurations and Software Images Compliance Audit The matching commands are displayed in green (see Figure 4-13), while the discrepancies are displayed in red (see Figure 4-12). For a failed job, the Audit Result section also displays the reason why the audit was not successful as shown in Figure 4-12.
Chapter 4 Device Configurations and Software Images Compliance Audit Using Compliance Audit, you can create policies that can contain multiple rules, and policies can be grouped together to create a policy profile which can be run on a set of devices, called audit of devices. There is no limit on the number of policies, profiles, rules, and conditions that you can create using Compliance Audit. It can scale up to 35,000 devices.
Chapter 4 Device Configurations and Software Images Compliance Audit Table 4-5 Default Permission/Security Level Required to Use Compliance Audit (continued) Task Administrator Configurator OperatorPlus Operator Viewer Executing a Fix job X X — — — X (For all users’ jobs) X (For jobs that the specific user has created). — — — Note To execute a fix job, the device-level role of the user must be Configurator or Administrator.
Chapter 4 Device Configurations and Software Images Compliance Audit Figure 4-14 Compliance Policy Page 1 Create Compliance Policy icon 5 New Rule icon 2 Edit Policy Description icon 6 Edit Rule icon 3 Import Policy as XML icon 7 Duplicate Rule icon. 4 Search field 8 Filter icon The following steps explain the procedure: You can either create a new policy or you can import an existing policy by clicking the Import icon. You can export existing policies as XML files to your local drive.
Chapter 4 Device Configurations and Software Images Compliance Audit Step 1 From the left navigation pane, select the policy to which you want to add rules. Step 2 From the work area pane, click the Create Rule icon. Step 3 Enter the following details. For sample rules, see Creating Rules—Samples, page 4-56. Table 4-6 New Rule - Fields Field Description Rule Information All information entered in this section is for your consumption.
Chapter 4 Device Configurations and Software Images Compliance Audit Table 4-6 New Rule - Fields (continued) Field Description Conditions and Actions—Conditions Details tab Condition Scope Details • Condition Scope—Choose the scope of the conditions from one of the below: – Configuration—Checks the complete running configuration – Previously Matched Blocks—Runs the conditions against blocks that have been defined in previous conditions.
Chapter 4 Device Configurations and Software Images Compliance Audit Table 4-6 New Rule - Fields (continued) Field Description New Conditions and Actions—Action Details tab (applicable for both Match Action and Does Not Match Action Select Action Select one of the following actions that Compliance Audit must perform upon detecting a violation: • Continue—If the condition is met or not met, the rule continues to run based on the condition number specified in the field.
Chapter 4 Device Configurations and Software Images Compliance Audit Field Value Does Not Match Action Raise a violation and exit this rule Violation Text DNS Server must be configured as either 1.2.3.4 or 2.3.4.5. Problem This policy checks if at least two NTP servers are configured on the device for NTP server redundancy. The following condition checks if the command ntp server appears at least twice. Solution The following settings have to be made in the appropriate sections.
Chapter 4 Device Configurations and Software Images Compliance Audit Figure 4-15 Policy Profile Page 1 Create Policy Profile icon 3 Run Compliance Audit icon 2 Edit Policy Profile Description icon 4 Add Compliance Policy icon Follow the procedure below to create a new policy profile: Step 1 From the left navigation pane, click the Create New Policy Profile icon. Enter name and description of the policy profile. Step 2 Choose a policy profile from the left navigation pane.
Chapter 4 Device Configurations and Software Images Compliance Audit Step 3 Step 4 The Schedule Audit page appears. Enter the schedule details. Against Choose Configuration option, choose the configuration that you want to be applied: • Use Latest Archived Configuration—If you choose this option, the latest Backup Configuration available in NCCM is used. If the backup configuration is not available, the device is not audited and is marked against non-audited devices.
Chapter 4 Device Configurations and Software Images Compliance Audit Table 4-7 Compliance Audit Violation Details- Fields Field Description Job Details and Violations Summary Audited/Non-Audited Devices This displays the number of audited and non-audited devices. For more details on devices, click the hyperlinked count of audited and non-audited devices. Non-audited devices include the count of the following.
Chapter 4 Device Configurations and Software Images Global Settings and Administration Global Settings and Administration This topic contains the following sections: • Change Configuration Managemennt Global Settings, page 4-61 • Change Image Management Global Settings, page 4-66 • Check the Processes, page 4-68 • Manage Jobs, page 4-68 • User Authentication and Authorization, page 4-69 Change Configuration Managemennt Global Settings To open the Configurations global settings page, choose Confi
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-8 Configuration Archive Global Settings (continued) Field Description Minimum Age to Purge Age (in days) at which configurations should be purged (between 5-360). Configuration Change Purge Settings Purge Change Logs after The age in days at which configuration change notifications (Change Logs) that are sent by devices should be purged. The default is 30 days and the range is 5-360.
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-8 Configuration Archive Global Settings (continued) Field Description Enable Initial Config Syncup Allows CM to fetch the configuration files from the network devices and archive it whenever a new device is added to Prime Network. If this setting is enabled: • CM performs the configuration file fetch operation whenever the Prime Network gateway is restarted.
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-8 Configuration Archive Global Settings (continued) Field Description Device Access Credentials For enhanced security, and to prevent unauthorized access to devices, you might be asked to enter device credentials.
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-8 Configuration Archive Global Settings (continued) Field Description Exclude Commands (Device Selector) Selected devices to which the exclude commands should be applied (that is, the commands will not be considered when comparing any type of device configuration files). The current selection is highlighted in green. All exclude commands applied to that selection will be listed below the device selector.
Chapter 4 Device Configurations and Software Images Global Settings and Administration Configuration Export File Type for Device Families The following table provides the types of configuration files exported for different types of devices.
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-9 Image Management Global Settings (continued) Field Description File Locations Full pathname of directories where images are stored when they are being imported into the Prime Network image repository, or when they are being transferred out of the repository to devices. New directories must be empty and have the proper permissions (read, write, and execute permissions for users).
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-9 Image Management Global Settings (continued) Field Description Proxy Settings Details about proxy server to use when importing images from Cisco.com Vendor Credentials HTTP Proxy HTTP proxy server to use for downloading images from Cisco.com. Port Port address to use for downloading images from Cisco.com. Usernames and passwords that can be used to download images from Cisco.com.
Chapter 4 Device Configurations and Software Images Global Settings and Administration • Cancel stops all future instances of a job. To stop a job and resume it later, use Suspend and Resume • To view the history of a job, choose a job and view the history from the History tab at the bottom of the page. You cannot view history of multiple jobs at the same time; choose only one job at a time. Messages that can be used for debugging are saved in PRIME_NETWORK_HOME/XMP_Platform/logs/JobManager.log.
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-10 GUI-Based Access Roles Required to Use CCM (continued) Function Viewer Operator OperatorPlus Configurator Administrator Creating policy profiles X X X X — Executing audit job X X X X — Viewing audit job results X (user’s jobs) X (user’s X X — jobs) (OperatorPlus (Configurator jobs) jobs) Executing a Fix job X X — — — X X — — — Define configuration policies X X Schedule co
Chapter 4 Device Configurations and Software Images Global Settings and Administration Table 4-11 Device Scope-Based Roles Required to Use CCM (continued) Function Viewer Operator Operator Plus Configurator Administrator Compare files in archive X X X X X X X X X Restore files from archive to devices X X Edit configuration files before restoring them to devices X X X X Distribute images X X Activate and deactivate images X X Commit image changes X X Rollback images X X
Chapter 4 Device Configurations and Software Images Global Settings and Administration Cisco Prime Network 4.
CH A P T E R 5 Working with Prime Network Vision Maps The topological map is the main tool used by Cisco Prime Network Vision (Prime Network Vision) to display the links and relationships between the network elements and aggregations.
Chapter 5 Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps This topic identifies the roles that are required to work with Prime Network Vision maps. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account.
Chapter 5 Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps Table 5-1 Default Permission/Security Level Required for Working with Prime Network Vision Maps - Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator Add elements to a map — — X X X Remove elements from a map — — X X X Resize elements in a map X X X X X Group and ungroup aggregations — — X X X Rename aggregations X
Chapter 5 Working with Prime Network Vision Maps User Roles Required for Working with Prime Network Vision Maps Table 5-2 Default Permission/Security Level Required for Working with Prime Network Vision Maps - Element in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Apply a background image — — — X X Create maps — — X X X Define a map layout X X X X X Delete maps — — X X X Open maps X X X X X Preview and print maps X X X X X Rename ma
Chapter 5 Working with Prime Network Vision Maps Opening and Closing Maps Table 5-2 Default Permission/Security Level Required for Working with Prime Network Vision Maps - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator X X X X X X X X X X Hide or view an overlay X X X X X Remove an overlay X X X X X Open the CPU Usage Graph — — X X X Use Ping and Telnet to communicate with devices — — — X X Link-Related Task Filter
Chapter 5 Working with Prime Network Vision Maps Creating and Deleting Maps Creating and Deleting Maps You can create maps that cover specific network segments, customer networks, or any other mix of network elements required. Network maps provide a graphic display of active faults and alarms, and serve as access points for activating services. When you create a map, it is saved in the database and made available to other users if they have sufficient access and security privileges.
Chapter 5 Working with Prime Network Vision Maps Creating and Deleting Maps Aggregations Aggregations are user-defined groups of elements. An aggregation can contain network elements, services, other aggregations, and so forth. Figure 5-2 shows an example of an aggregation. Figure 5-2 Map with Aggregation (Thumbnail View) When you delete an aggregation, the member devices are not deleted from Prime Network; only the aggregation definition is deleted.
Chapter 5 Working with Prime Network Vision Maps Creating and Deleting Maps Figure 5-3 Map with Overlay To create an overlay, see Working with Overlays, page 5-21. Deleting Maps from the Database If another client is using a map that you are deleting, Prime Network Vision displays a message to those clients advising them that the map is being closed and deleted from the database.
Chapter 5 Working with Prime Network Vision Maps Adding and Removing NEs from Maps Adding and Removing NEs from Maps When you add an element to a map, the map is automatically saved in the Prime Network Vision database If the element you want to add is outside of your scope, it is not displayed if you enter a search string. You can display all NEs by selecting Show All in Step 2, but devices outside your scope will be displayed with a lock icon.
Chapter 5 Working with Prime Network Vision Maps Adding and Removing NEs from Maps Figure 5-5 Step 2 Add Element Dialog Box In the Add element dialog box, do one of the following: If you are working with a very large number of network elements, keep these items in mind: • Search for the elements you want to add to the map. For example, you can search Ethernet Services by the system name, NEs element type, pseudowires by their role, and so forth.
Chapter 5 Working with Prime Network Vision Maps Managing Maps Step 4 Click OK. If you selected a large number of elements (for example, more than 25 VLANs or VPLS instances), the action may take a while to complete. The NEs are added to the map and are displayed in the navigation pane and content area. In addition, any associated tickets are displayed in the ticket pane.
Chapter 5 Working with Prime Network Vision Maps Managing Maps Selecting Map Viewing Options Table 5-3 describes the tools that you can use to view and manipulate maps in the Prime Network Vision map pane. Table 5-3 Button Prime Network Vision Map Viewing Options Name Function Layout Map Defines how a topology should be displayed: Circular, hierarchical, orthogonal, or symmetric. The default is circular. When you choose a map layout, the elements align accordingly, using animation by default.
Chapter 5 Working with Prime Network Vision Maps Managing Maps Figure 5-6 Step 3 Manage Map Background Dialog Box Enter the required information as described in Table 5-4. Table 5-4 Manage Map Background Options Field Description Select Image Applies the selected image to the current map background: 1. Choose Select Image. 2. Click Browse. 3. In the Open dialog box, select the desired image and click OK. The name of the selected image is displayed in the Manage Map Background dialog box. 4.
Chapter 5 Working with Prime Network Vision Maps Managing Maps Using the Overview Window The Prime Network Vision Overview window enables you to display the entire network map or any part of the map that you require in the map pane. The Overview window also enables you to see all the changes and alarms taking place in the network. To open the network Overview window do either of the following: • Click Overview in the main toolbar. • Choose View > Overview from the main menu.
Chapter 5 Working with Prime Network Vision Maps Finding NEs, Services, and Links, and Elements Affected by Tickets Saving Maps By default, Prime Network Vision saves basic map information whether or not you manually save the map. This default information includes element additions and removals, link additions and removals, aggregations, and disaggregations.
Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Working with Aggregations Prime Network Vision enables you to group network elements and display them as an aggregation. Aggregations can contain network elements, services, other aggregations, and so forth. Note You cannot aggregate service entities that exist within a service. For example, you cannot aggregate VRFs that exist within a VLAN.
Chapter 5 Working with Prime Network Vision Maps Working with Aggregations To display an aggregation thumbnail: Step 1 Select the existing aggregation in the map pane. Step 2 Open the thumbnail by right-clicking the aggregation, and choosing Show Thumbnail. The thumbnail is displayed in the map pane as shown in Figure 5-8. Figure 5-8 Aggregation Thumbnail When a thumbnail is opened, neighboring nodes are moved aside by default to allow room for the thumbnail to expand.
Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Table 5-6 describes the options available when working with aggregation thumbnails. Table 5-6 Aggregation Thumbnail Options If you want to... Do this... Rearrange the icons in the thumbnail Click and drag the required icons to arrange them as needed. Resize an icon Select the icon to be resized, and then either click and drag the gray border or right-click a selected icon and choose Resize.
Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Ungrouping Aggregations Aggregations can be ungrouped. If the aggregation that you ungroup contains nested aggregations, the nested aggregations move up one level, and the original aggregation is removed. If an element in the aggregation that you ungroup also exists at the parent level, the element is represented only once after the aggregation is ungrouped. As a result, no elements are represented twice at the same level.
Chapter 5 Working with Prime Network Vision Maps Working with Aggregations Figure 5-9 Multichassis Devices in Map View Viewing Inter Rack Links Inter Rack Links (IRLs) are used to represent connectivity between the cluster hosts, Cisco ASR 9000 network elements. Figure 5-10 Multiple Chassis in a Cluster To view the cluster IRLs: Step 1 In Prime Network Vision, double-click the cluster device to open the Inventory Window for the device.
Chapter 5 Working with Prime Network Vision Maps Working with Overlays Figure 5-11 ICL Connecting a Satellite with a Chassis To view the satellite ICLs: Step 1 In Prime Network Vision, double-click the satellite device to open the Inventory Window for the device. Step 2 Choose the Satellite ICL container in the logical inventory of the cluster device.
Chapter 5 Working with Prime Network Vision Maps Working with Overlays Step 2 From the toolbar, choose Choose Overlay Type > overlay-type where overlay-type is one of the following options: Overlay Option Description Ethernet Service Applies an Ethernet service overlay to the map. MPLS-TP Tunnel Applies and MPLS-TP tunnel overlay to the map. Network Clock Applies a network clock overlay to the map. None Removes any existing overlays on the map.
Chapter 5 Working with Prime Network Vision Maps Working with Overlays Table 5-8 Overlay Type Search Fields Overlay Type • EVC Terminating EFPs • Name • System Name • Description • Name • System Name Network Clock • Name Pseudowire • Description • Is Multisegment Pseudowire • Name • Pseudowire Role • Pseudowire Type • System Name • EFD Name • EFD System Name • ID • Name • System Name • Name • System Defined Name • VPN ID • Description • Name Ethernet Serv
Chapter 5 Working with Prime Network Vision Maps Working with Overlays • To view all available overlays, choose Show All. The available overlays that meet the specified search criteria are displayed in the Select Overlay dialog box in table format. The dialog box also displays the date and time at which the list was generated. To update the list, click Refresh. Step 4 Select the overlay that you want to apply to the map.
Chapter 5 Working with Prime Network Vision Maps Filtering Links in a Map Filtering Links in a Map The links filter enables you to filter the links displayed in the map view and the links view. You can quickly select the types of links to be filtered by selecting from a predefined set of link types in the list, or by manually configuring a customized set of link types. To filter links, do either of the following: • Create a new map, select a filter, and then add the devices to the map.
Chapter 5 Working with Prime Network Vision Maps Filtering Links in a Map Figure 5-14 Link Filter Dialog Box The Link Filter dialog box displays a list of all the types of links that you can filter in the map view and links view. Note Step 3 By default all link types are selected in the Link Filter dialog box. That is, all links are displayed in the map view and links view. Select the required option from the Group drop-down list: • All—All the links are displayed in the map view and links view.
Chapter 5 Working with Prime Network Vision Maps Opening the CPU Usage Graph Step 6 In the Create Map dialog box, enter a name for the new map and click OK. An empty new map is displayed in the navigation pane and content area, and the Link Filter Applied button is displayed in the to indicate that the links have been filtered. Step 7 Add the required elements to the map. For more information, see Creating and Deleting Maps, page 5-6.
Chapter 5 Working with Prime Network Vision Maps Communicating with Devices Using Ping and Telnet Communicating with Devices Using Ping and Telnet Prime Network Vision enables you to communicate with devices in the following ways: • Pinging a Device, page 5-28 • Telneting a Device, page 5-28 Pinging a Device Prime Network Vision enables you to ping a device to verify that the device is responding.
CH A P T E R 6 Working with Links The following topics describe how to view information about static and dynamic links using the Cisco Prime Network Vision (Prime Network Vision) user interface: • User Roles Required to Work with Links, page 6-1 • What Are Dynamic and Static Links?, page 6-3 • Link Discovery and Flickering Ethernet Topology Links, page 6-3 • Viewing Link Properties, page 6-4 • Viewing Link Impact Analysis, page 6-12 • Adding Static Links, page 6-15 • Filtering Links Using the
Chapter 6 Working with Links User Roles Required to Work with Links Table 6-1 Default Permission/Security Level Required for Working with Links - Element Not in User’s Scope Task Viewer 1 Operator X 1 OperatorPlus X 1 Configurator X Administrator 1 X View link properties in Map view X View link properties in Links view X2 X2 X2 X2 X View link properties in the Link Properties window — — — — X View link impact analysis — — — — X Add static links — — — — X Filter links
Chapter 6 Working with Links What Are Dynamic and Static Links? What Are Dynamic and Static Links? Dynamic links are the physical and logical links that exist between elements in the network. These links are discovered by Prime Network using various protocols (such as STP, CDP, and LLDP). The ongoing process of autodiscovery maintains this topological information. Property information is provided for links that are: • Between two devices.
Chapter 6 Working with Links Viewing Link Properties Viewing Link Properties In maps, you can view a link only if both ends of the link are in your scope. However, Prime Network Vision provides an option that allows users to view links and any associated tickets if only one end of the link is in your scope. For more information about this option, see the Cisco Prime Network 4.0 Administrator Guide.
Chapter 6 Working with Links Viewing Link Properties Table 6-3 Link Properties in Prime Network Vision Maps (continued) Link Characteristic Description Example Link Widths Normal Contains links of the same group. Available groups are: Wide • Business • GRE • MPLS-TP • Pseudowire • VLAN • All others Aggregated links that contain links of different groups. When viewing a map at a low zoom level, aggregated links cannot be distinguished in the GUI.
Chapter 6 Working with Links Viewing Link Properties To view link properties: Step 1 Hover your mouse cursor over the required link in a map. A link tooltip is displayed as shown in Figure 6-1. Figure 6-1 Link Tooltip in Prime Network Vision The tooltip contains the following information about the link: • Link endpoints, identified by the element or service name. • The number of links represented by the line on the map. Examples of tooltips are: Step 2 • 169.254.12.34 <--> 169.254.56.
Chapter 6 Working with Links Viewing Link Properties Figure 6-2 Link Quick View Example 1 Number of links represented by the single link in the map. In this example, 29 links. 2 Link endpoints. 3 List of all links represented by the link in the map with the following information, as appropriate: 4 • Type of link, such as Physical, MPLS, or Tunnel. For a complete list of the types of links and their abbreviations, see Link Icons, page A-11.
Chapter 6 Working with Links Viewing Link Properties Viewing Link Properties in the Links View The links shown in a map represent many other links as described in Viewing Link Properties in Prime Network Vision Maps, page 6-4. By using the links view, you can view a list of all links represented in a map and their status. To display the links view in the Prime Network Vision window, click Show Links View in the main toolbar. Figure 6-3 shows an example of the links view.
Chapter 6 Working with Links Viewing Link Properties Table 6-4 describes the information that is displayed in the links view. Table 6-4 Links View Content Field Description Context Name of the map or aggregation containing the link. The links view can include multiple contexts. This field can be empty for either of the following reasons: • One side of the link is not included in the map. • The link is filtered out of all contexts.
Chapter 6 Working with Links Viewing Link Properties For more information about filtering links using the collection method, see Filtering Links Using the Collection Method, page 6-17. Viewing Link Properties in the Link Properties Window The link properties window contains general information about the selected link, details of the link connection, and technology-specific information appropriate for the link.
Chapter 6 Working with Links Viewing Link Properties The information displayed in the link properties window changes according to the ports or subports selected in the link list pane. Link List Pane In the link properties window, the link list pane displays a list of the links that are represented by a single link on the map. Each link has a single entry in the link list pane. When an entry is selected in the link list pane, the information displayed in the properties pane is updated.
Chapter 6 Working with Links Viewing Link Impact Analysis • T1 • VRF IP addresses are displayed in IPv4 or IPv6 format, as appropriate. Depending on the type of link, the following areas might be displayed: • Affected Parties—Enables you to view all elements potentially affected by the link. For more information, see Viewing Link Impact Analysis, page 6-12. • Labels—Enables you to view all LSPs on an Ethernet link. For more information, see Viewing LSPs Configured on an Ethernet Link, page 18-11.
Chapter 6 Working with Links Viewing Link Impact Analysis To calculate impact analysis: Step 1 Select a map or aggregation in the navigation pane, and click Show Links View in the main toolbar. The links view is displayed in the content pane. Step 2 In the table toolbar, click Link Filter. The Link Filter dialog box is displayed. For information about the Link Filter dialog box, see Filtering Links in a Map, page 5-25. Step 3 In the Filter dialog box: a. In the Match drop-down list, choose All. b.
Chapter 6 Working with Links Viewing Link Impact Analysis Step 5 Click Calculate Affected. The total number of potentially affected parties is displayed in the Affected Parties area. Step 6 Click Show Affected. The Affected Parties window is displayed as shown in Figure 6-6. Figure 6-6 Affected Parties Window Step 7 To view the potentially affected destinations if a link were go to down, click an entry in the Source table.
Chapter 6 Working with Links Adding Static Links Adding Static Links Prime Network Vision enables you to create static links that exist only on the VNE level. Static links are useful for visualization and network correlation because Prime Network Vision allows correlation flows to go through the links, as if they were real physical or logical links. Static link properties are not updated because the links do not really exist in the network.
Chapter 6 Working with Links Adding Static Links Figure 6-7 Create Static Link Window Step 3 Select the required port on both the A Side device and the Z Side device. Step 4 Click Create to validate the connection and create the new link. A success message is displayed. A warning message is displayed if any of the following apply: • A validation check fails. • The operation status of one port is Up and the other port is Down. • The selected ports are not of the same type.
Chapter 6 Working with Links Filtering Links Using the Collection Method Step 6 Click Yes. The ports are connected, and a link is created between the selected ports. A warning message is displayed if any of the following conditions exist: • One of the validation checks fails. • The operation status of one port is Up and the other port is Down. • The ports selected are not of the same type. • The Layer 2 technology type is not the same. • One of the ports is part of another link.
Chapter 6 Working with Links Selecting a Link Selecting a Link Prime Network Vision enables you to select a link listed in the links view and highlight the link in the map in the content pane. To select and highlight a link in a map: Step 1 In the Links view, right-click the required link and choose Select Link in Map. The link is displayed in blue in the map.
CH A P T E R 7 Labeling NEs Using Business Tags A business tag is a string that is meaningful to the business, and which can be used to label a component of a network element for use in Prime Network screens and reports. Business tags are normally applied to a business element, which is a construction or organization of certain network elements and their properties into a logical entity. This provides users with the ability to track them in a way that makes sense from a business perspective.
Chapter 7 Labeling NEs Using Business Tags Using Chinese Characters By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 4.0 Administrator Guide.
Chapter 7 Labeling NEs Using Business Tags Attaching and Detaching Business Tags • Generate a list of business tags. • Edit the details of a business tag. • Write business tag notes. • Remove business tags. • Create aggregations. • Export a business tag through a northbound interface. See the following documents for more information about these features: • Configuring your system to use Chinese characters— Cisco Prime Network 4.0 Installation Guide.
Chapter 7 Labeling NEs Using Business Tags Searching for Business Tags and Viewing Their Properties • Type—Choose the type of business tag: Subscriber, Provider Connection, or Label. Note • Step 3 If you select Label, the name of the network object changes to display the business tag name if the Replace name with Business Tag option is selected in the Options dialog box (Tools > Options).
Chapter 7 Labeling NEs Using Business Tags Searching for Business Tags and Viewing Their Properties Figure 7-2 Find Business Tag Dialog Box Table 7-3 describes the fields in the Find Business Tag dialog box. Table 7-3 Icon Find Business Tag Dialog Box Fields Name Description Find Business Tag Finds the business tag according to a name, key, or type entered in the Find Business Tag dialog box. Clear Search Clears the search information entered in fields in the Find Business Tag dialog box.
Chapter 7 Labeling NEs Using Business Tags Searching for Business Tags and Viewing Their Properties Table 7-3 Icon Find Business Tag Dialog Box Fields (continued) Name Description Detach Business Tag Removes the selected business tag from the element. Help Displays online help for Cisco Prime Network Vision and Cisco Prime Network Events. Input Fields Unique Key Enter the key you are searching for. Name Enter a full or partial entry of the name you are searching for.
Chapter 7 Labeling NEs Using Business Tags Renaming a Business Element Renaming a Business Element The following caveats apply when renaming a business element: • Except for network VLANs, the original name of the business element is not saved, so you cannot revert to the original name. • Renaming a business element affects all users who have the business element loaded in their service view maps. To rename business elements in service view maps, right-click the business element and choose Rename.
Chapter 7 Labeling NEs Using Business Tags Deleting a Business Element Cisco Prime Network 4.
CH A P T E R 8 Tracking Faults Using Prime Network Events The following topics describe how to use Cisco Prime Network Events (Prime Network Events) to view and manage faults: • User Roles Required to Work with Prime Network Events, page 8-1 • Launching Prime Network Events, page 8-1 • Setting Up Your Events View, page 8-2 • Viewing Events and Tickets in Cisco Prime Network Events, page 8-2 • Working with Cisco Prime Network Events, page 8-10 User Roles Required to Work with Prime Network Events
Chapter 8 Tracking Faults Using Prime Network Events Setting Up Your Events View Setting Up Your Events View The Prime Network Events Options dialog box enables you to change various aspects of the event display in Prime Network Events. To set up your events view, choose Tools > Options from the main menu. Table 8-1 lists the available options.
Chapter 8 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Note Cisco Prime Network Events displays active events only. It does not display events that have been archived. To see archived events, use Prime Network’s reporting functionality. For more information, see the Cisco Prime Network Operations Reports User Guide. Prime Network Events displays events for the last two hours by default.
Chapter 8 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Table 8-2 Icon Severity Indicators (continued) Color Severity Yellow Minor Green Cleared, Normal, or OK Icon Color Severity Dark blue Indeterminate Event Types and Categories Events are grouped in tabs according to type. Each tab displays basic information about the events, including severity, event ID, time, and description.
Chapter 8 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Table 8-3 Audit Events Column Description Command Name Audit-specific command name, prefaced by, for example, Get, Update, or Find. Command Signature Actual command run by Prime Network, such as GetEventViewerProperties. Command Parameters Command parameters issued with the command identified in the Command Name column. Originating IP IP address of the client that issued the command.
Chapter 8 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events System Events System events are related to the everyday working of the internal system and its components, such as alarm thresholds, disk space and AVMs. The System tab displays the following parameters Table 8-6 System Tab Column Description Severity Icon indicating the severity of the alarm on the event (the color and type of alarm are displayed in the Properties window Severity field).
Chapter 8 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Syslogs Syslogs are received from the devices by the VNEs, and syslog events are generated. The Syslog tab displays the following parameters that specifically relate to syslog events. Table 8-8 Syslog Tab Column Description Element Type The type of element that triggered the root event, e.g., Cisco 7606. Alarm ID Hyperlinked identifier of the alarm associated with the event.
Chapter 8 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events V2 Traps The V2 Trap tab displays the following parameters that relate specifically to V2 traps: Table 8-10 V2 Trap Tab Column Description Element Type The type of element that triggered the root event, e.g., Cisco 7606. Alarm ID Identifier of the alarm associated with the event, hyperlinked to the Alarm Properties window.
Chapter 8 Tracking Faults Using Prime Network Events Viewing Events and Tickets in Cisco Prime Network Events Table 8-11 V3 Trap Tab (continued) Column Description Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 8-12 Ticket Tab (continued) Column Description Acknowledged Whether the ticket is acknowledged or has been modified: Yes, No, or Modified. If a ticket changes after it has been acknowledged, it is marked as Modified. If an acknowledged ticket is deacknowledged, the status changes from Yes to No in this column. Creation Time Date and time that the ticket was created.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events To view event properties: Step 1 Select the required tab for the specific event type. Step 2 Select an event and choose View > Properties from the main menu. The event properties are displayed for the selected event, either in the lower portion of the Cisco Prime Network Events window or in a separate window as shown in Figure 8-2. The Details tab is displayed by default.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 8-13 Details Tab for Events (continued) Field Description Device Time The time zone of the device. Note Category Nature Alarm ID This information is available only for Cisco ASR5000 devices. The category of the fault, which can be any one of the following: • Communications—Associated with procedures and/or processes required to convey information from one point to another.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 8-14 Advanced Tab Field Description Duplication Count For network events, the duplication count is calculated by the VNE and pertains only to flapping events. The duplication count represents the number of noncleared events aggregated by the flapping event. Reduction Count For network events, the reduction count is calculated by the VNE and pertains only to flapping events.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 8-18 Trap Tab Field Description Version SNMP version: version-1, version-2c, or version-3. Community String Community that the device sends in the Protocol Data Unit (PDU). Error Status Error status: No Error, Too Big, No Such Name, Bad Value, Read Only, and Gen Err. Values Table Translated OID String representation of the OID. For example, 1.3.6 is translated into iso.org.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Figure 8-3 Ticket Properties Window - Details Tab Table 8-19 describes the information that is displayed in the Details tab in the Ticket Properties window. Table 8-19 Ticket Properties Window - Details Tab Field Description Buttons Acknowledge Acknowledges that the ticket is being handled. For more information, see Acknowledging/Deacknowledging a Ticket, page 9-15.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 8-19 Ticket Properties Window - Details Tab (continued) Field Description Description Description of the ticket. Last Modification Time Date and time (per the database) that the ticket was last updated. Updates can result from either manual or automatic operations. Location Hyperlink to the entity that triggered the event.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Step 3 As required, review additional properties for the ticket. Table 8-20 identifies the additional tabs that are displayed in the Ticket Properties window and links to the relevant information. Table 8-20 Ticket Properties Window - Additional Tabs Tab Description History Contains the history of the ticket, including all the events. For more information, see History Tab, page 9-11.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 8-21 shows the refresh buttons. Table 8-21 Button Cisco Prime Network Events Refresh Buttons Name Function Refresh Now Manually refreshes the events list. Auto Refresh Automatically refreshes the events list. The Auto Refresh icon toggles to indicate whether auto refresh is on or off. This icon indicates auto refresh is on. To manually refresh a list, choose View > Refresh from the main menu.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Defining Filters To define a filter: Step 1 Choose Edit > Filter from the main menu. The criteria that you can use for filtering differs for events and tickets. For example, Figure 8-4 shows the Filter Events dialog box for service events. For an example of the Ticket Filter dialog box, see Figure 9-2.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Table 8-22 Cisco Prime Network Events Filter Events Options (continued) Field Description Location Network elements to include. This field is not displayed for Audit events. Time Beginning and ending dates and times to apply to the filter. Network Events Advanced Options Alarm ID Alarm identifier to apply to the filter. Causing Event ID Identifier of the causing event to apply to the filter.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Exporting Displayed Data Cisco Prime Network Events enables you to export the currently displayed data from the Cisco Prime Network Events table according to the criteria defined in the Cisco Prime Network Events Options dialog box. You can then import and view at a later time. To export a table to a file: Step 1 Choose File > Export.
Chapter 8 Tracking Faults Using Prime Network Events Working with Cisco Prime Network Events Cisco Prime Network 4.
CH A P T E R 9 Working with Tickets in Prime Network Vision These topics describe how to work with tickets in Prime Network Vision: • What are Tickets?, page 9-1 • User Roles Required to Work with Tickets in Prime Network Vision, page 9-2 • Viewing Tickets and Network Events for Elements in a Map, page 9-3 • Viewing Ticket Properties, page 9-9 • Managing Tickets, page 9-15 • Impact Analysis in Prime Network, page 9-17 What are Tickets? A ticket represents the complete hierarchy of correlated a
Chapter 9 Working with Tickets in Prime Network Vision User Roles Required to Work with Tickets in Prime Network Vision User Roles Required to Work with Tickets in Prime Network Vision This topic identifies the roles that are required to work with tickets in Prime Network Vision.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Table 9-1 Default Roles/Permissions Required for Working with Tickets in Prime Network Vision (continued) Task Viewer Operator OperatorPlus Configurator Administrator View ticket properties X X X X X View tickets X X X X X 1. In addition, the security level for the device scope must be OperatorPlus or higher for the device that holds the root alarm for a ticket.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Figure 9-1 Prime Network Vision Window 1 Menu bar 5 Status bar 2 Toolbar 6 Ticket pane 3 Inventory and map tabs 7 Hide/Display ticket pane 4 Content pane 8 Navigation pane Managing Tickets in the Tickets Tab Table 9-2 describes the functions that are available from the Tickets tab in the ticket pane.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Table 9-2 Ticket Pane Available Functions (continued) Function Related Documentation Locate the elements or links affected by the ticket Finding Affected Elements, page 9-15 in the map or links view. Remove a ticket. Removing a Ticket, page 9-16 View all tickets or only the filtered tickets of a selected element. Filtering Tickets by Network Element, page 9-6 View tickets.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Table 9-3 Ticket Information Displayed in the Ticket Pane (continued) Field Name Description Acknowledged Whether the ticket is acknowledged or has been modified: Yes, No, or Modified. If the ticket is acknowledged, this field also displays the user who acknowledged the ticket; for example, Yes(root). Creation Time Date and time (per the database) that the ticket was created.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Tickets and Network Events for Elements in a Map Filtering Tickets by Criteria Prime Network Vision enables you to define a filter for the tickets displayed in the ticket pane according to various criteria. For example, tickets can be filtered according to the number of affected parties or acknowledged tickets. To define a ticket filter: Step 1 Click Ticket Filter in the ticket pane toolbar.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Tickets and Network Events for Elements in a Map c. Supply the specific information to apply to the filter, such as the time, a string, or one or more IP addresses. Table 9-4 Prime Network Ticket Filter Options Field Description Severity Severity to be included in the filter. General Ticket ID Ticket identifier to be included or excluded when filtering. Description String in the ticket description to include or exclude.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Ticket Properties Viewing Ticket Properties In Prime Network Vision, open the Ticket Properties window in one of the following ways: • Open the required map and then double-click the required ticket identifier in the ticket pane. • Open the required map, right-click a ticket in the ticket pane, and choose Properties. Figure 9-3 shows the Ticket Properties window.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Ticket Properties Details Tab Table 9-5 describes the information that is displayed in the Details tab about the ticket. Table 9-5 Event Properties Window - Details Tab Field Description Ticket ID Ticket identifier. Severity Severity propagated from all the correlated alarms. Description Description of the ticket. Last Modification Time Date and time (per the database) that the ticket was last updated.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Ticket Properties History Tab The History tab enables you to display the history of the ticket, including all the events. Table 9-6 describes the information that is displayed in the History tab. Table 9-6 Ticket Properties Window - History Tab Field Description Severity Severity bell icon, colored according to the severity of the alarm. Event ID Event identifier of the specific alarm.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Ticket Properties Table 9-7 Ticket Properties Window - Affected Parties Tab Field Description Source Table Location Hyperlinked entry to the port with the affected parties. Key Unique value taken from the affected element’s business tag key, if it exists. Name Subinterface (site) name or business tag name of the affected element, if it exists. Type Business tag type.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Ticket Properties Note The Affected Parties dialog box occasionally displays entries that start with the word Misconfigured. Entries that start with Misconfigured indicate that the flow has stopped unexpectedly between the source and destination points. An unexpected termination point can be a routing entity, bridge, or VC switching entity.
Chapter 9 Working with Tickets in Prime Network Vision Viewing Ticket Properties • Reduction Count: – For network events, the reduction count is calculated by the VNE and pertains only to flapping events. The reduction count represents the number of events that are aggregated by the flapping event. – For tickets, reduction count is the sum of reduction counts of all the events that are associated to the ticket.
Chapter 9 Working with Tickets in Prime Network Vision Managing Tickets Managing Tickets The following topics describe how to manage tickets: • Finding Affected Elements, page 9-15 • Acknowledging/Deacknowledging a Ticket, page 9-15 • Clearing a Ticket, page 9-15 • Removing a Ticket, page 9-16 • Clearing and Removing Tickets, page 9-16 You can acknowledge, clear, remove, or clear and remove a ticket only if both of the following conditions are true: Note • The default permission for your acco
Chapter 9 Working with Tickets in Prime Network Vision Managing Tickets After a ticket is cleared, it remains open for one hour (default) before it is archived. Incoming events can be correlated to the ticket during this time, effectively re-opening the ticket. An administrator can lock tickets so that they remain cleared and no new events can be correlated to them.
Chapter 9 Working with Tickets in Prime Network Vision Impact Analysis in Prime Network To clear and remove one or more tickets, select the required tickets in the ticket pane, and then right-click and choose Clear and Remove. Note When Prime Network detects a large ticket (with more than 150 associated events), a system event is generated requesting the administrator to clear and remove the ticket. If this is not done within 15 minutes, the ticket will be automatically archived.
Chapter 9 Working with Tickets in Prime Network Vision Impact Analysis in Prime Network Initially, Prime Network might identify the services as either potentially or real affected. As time progresses and more information is accumulated from the network, Prime Network updates the information to indicate which of the potentially affected parties are real or recovered. The indications for these states are available through both the API and in the GUI.
Chapter 9 Working with Tickets in Prime Network Vision Impact Analysis in Prime Network Accumulating the Affected Parties in the Correlation Tree If two or more alarms that are part of the same correlation tree report on the same affected pair of edgepoints and have different affected severities, the recurring affected pairs are displayed only once in the Affected Parties tab. If different affected severities are reported for the same pair, the pair is marked with the highest severity.
Chapter 9 Working with Tickets in Prime Network Vision Impact Analysis in Prime Network Cisco Prime Network 4.
CH A P T E R 10 Working with Reports Cisco Prime Network (Prime Network) provides a Report Manager that enables you to schedule, generate, view, and export reports of the information managed by Prime Network. You can save the generated reports in any of the following formats: PDF, CSV, HTML, XLS, and XML. In addition to a variety of standard reports for events and inventory, you can define reports as required for your environment.
Chapter 10 Working with Reports User Roles Required to Manage Reports The following tables identify the tasks that you can perform: • Table 10-1 identifies whether you can generate a report if a selected element is not in one of your assigned scopes. • Table 10-2 identifies whether you can generate a report if a selected element is in one of your assigned scopes. • Table 10-3 identifies the tasks you can perform on the reports that you generate.
Chapter 10 Working with Reports User Roles Required to Manage Reports Table 10-3 Default Permission/Security Level Required for Working with Reports You Generate Task Viewer Operator OperatorPlus Configurator Administrator Schedule reports X X X X X Cancel reports X X X X X Delete reports X X X X X Export reports X X X X X Rename reports X X X X X Save reports X X X X X Report Tasks Set report preferences for purging and sharing — — — — X 1 1 1 1 X X
Chapter 10 Working with Reports Using the Report Manager Table 10-5 Default Permission/Security Level Required for Working with Report Folders (continued) Task Viewer Operator OperatorPlus Configurator Administrator View report folder properties X X X X X View report type properties X X X X X 1. You cannot perform this action on system-generated folders, such as the Events Reports folder.
Chapter 10 Working with Reports Using the Report Manager Figure 10-2 shows an example of a generated report with a pie chart.
Chapter 10 Working with Reports Using the Report Manager Menu Options Table 10-6 describes the menu options available in the Report Manager window. Table 10-6 Report Manager Menu Options Option Description File Menu Exit Exits the Report Manager window. Tools Menu Change User Password Enables you to change the password used when logging into the Prime Network client application suite. The change takes effect the next time you log into the application.
Chapter 10 Working with Reports Using the Report Manager Table 10-7 Icon Report Manager Toolbar Buttons (continued) Name Description Rename Renames a folder that you created. Delete Deletes one or more folders that you created. Delete Report Deletes one or more selected reports. View Displays the selected report in HTML format. Navigation Tree The navigation pane displays a tree-and-branch representation of report folders and types of reports.
Chapter 10 Working with Reports Using the Report Manager Figure 10-3 Reports Manager Content Pane Table 10-8 describes the information displayed in the content pane for each report. Table 10-8 Reports Manager Content Pane Information Attribute Description Name Name of the report. Double-click the report to view the report in HTML format. Description Brief description of the report. Creation Time Date and time when the report was generated. Type Report type.
Chapter 10 Working with Reports Using the Report Manager Table 10-8 Reports Manager Content Pane Information (continued) Attribute Description Public Availability of the report to other users: Data Source • True—The report is available to all users. • False—The report is available to only the user who generated the report and the administrator. Source of the report data.
Chapter 10 Working with Reports Using the Report Manager Navigation Pane Reports Table 10-10 describes the options available when you right-click a report in the navigation pane. Table 10-10 Report Manager Navigation Pane Report Right-Click Options Option Description Run Displays the Run Report dialog box so you can run a report of this type specifically for your environment and adds the generated report to the table in the content pane.
Chapter 10 Working with Reports Report Categories Table 10-11 Report Manager Content Pane Report Right-Click Options (continued) Option Description Cancel This option is displayed only while the selected report is being generated or queued. Cancels the report that is being generated or is queued. Show Only Selected Rows Displays only the rows that you select. Show All Rows Displays all table rows that meet the current filtering criteria.
Chapter 10 Working with Reports Report Categories Table 10-12 Standard Events Report Types (continued) Report Name Description Data Source Database Monitoring Fault Database For regular time intervals: • Number of active tickets • Number of active alarms • Number of active events • Number of unconnected events • Number of auto-archive candidates • Number of notifications • Biggest Ticket ID • Number of event count in the biggest ticket • Actionable Event rate per second • Number
Chapter 10 Working with Reports Report Categories Table 10-12 Standard Events Report Types (continued) Report Name Description Data Source Event Reduction Statistics Fault Database For the specified devices and time period: • Names of those tickets with: – The root cause in the device list – The ticket creation time within the specified period • For each ticket type identified: – Number of tickets of that type – Fewest number of correlated events – Highest number of correlated events – Average nu
Chapter 10 Working with Reports Report Categories Table 10-12 Standard Events Report Types (continued) Report Name Description Data Source Most For each day in the specified time period: Common • Specified number of most common tickets, service events, syslogs, and traps Daily Events • Number of each type of ticket, service event, syslog, and trap Fault Database • If selected, a pie chart presenting the events by percentage in a graphical format Most Common Syslogs Most common syslog messages an
Chapter 10 Working with Reports Report Categories Table 10-13 Detailed Network Events Report Types Report Name Description Data Source Detailed Event Count (By Device) For each device, the following information for the specified time period: Fault Database • For syslogs: – Syslog severities – Number of syslogs per severity – Syslog type – Number of each syslog type • For traps: – Trap severities – Number of traps per severity – Trap type – Number of each trap type • For tickets: – Ticket seve
Chapter 10 Working with Reports Report Categories Table 10-13 Detailed Network Events Report Types (continued) Report Name Description Data Source Detailed Tickets For each ticket of the specified severities, time period, and device: Fault Database Detailed Traps • Ticket severity • Ticket identifier • Last modification time • Root event time • Description • Entity that caused the alarm • Whether or not the ticket is acknowledged • Ticket creation time • Event count • Affected
Chapter 10 Working with Reports Report Categories Table 10-14 Detailed Non-Network Events Report Types Report Name Description Detailed Audit Events For each audit event included in the report for the specified time period, severities, Fault Database and search criteria: Detailed Provisioning Events Detailed Security Events • Event severity • Event identifier • Timestamp • Description • Command name • Command signature • Command parameters • Originating IP address • Username Data
Chapter 10 Working with Reports Report Categories Table 10-14 Detailed Non-Network Events Report Types (continued) Report Name Description Detailed System Events For each system event included in the report for the specified time period, severities, Fault Database and search criteria: • Event severity • Event identifier • Timestamp • Description • Location Data Source Inventory Reports Table 10-15 describes the standard inventory report types provided by Prime Network Vision and the data
Chapter 10 Working with Reports Report Categories Table 10-15 Report Name Standard Inventory Report Types (continued) Description Data Source IOS-XR Software For each device included in the report: Package • Device name Summary • Element type • IP address • Serial number • Cisco IOS XR software version • For each software package installed on the device: Network elements – Storage location – Software package name – Module name – Software package state: Active or Inactive Modules Summary (By
Chapter 10 Working with Reports Report Categories Network Service Reports Table 10-16 describes the standard network service report types provided by Prime Network Vision and the data source.
Chapter 10 Working with Reports Report Categories Table 10-16 Standard Network Service Report Types (continued) Report Name Description Data Source Network Pseudowire Detailed For each network pseudowire in the report: Fault Database • Pseudowire name • Pseudowire type • Business tag assigned to the pseudowire • Maps containing the pseudowire • Pseudowire details • Type of pseudowire, such as pseudowire edge, Ethernet flow point, or switching entity You can filter report content by spe
Chapter 10 Working with Reports Generating Reports Table 10-16 Standard Network Service Report Types (continued) Report Name Description Data Source VPLS Summary For each VPLS or H-VPLS instance in the report: Fault Database • VPLS or H-VPLS name • Business tag assigned to the VPLS or H-VPLS instance • Maps containing the VPLS or H-VPLS instance You can filter report content by specifying part or all of the: • VPLS or H-VPLS name • Business tag • Map name Generating Reports You can ge
Chapter 10 Working with Reports Generating Reports Report Generation Canceled If a report is canceled before it completes, the State column contains the word Canceled. Click Canceled to view the reason for the cancellation. A window is displayed with the cause of the cancellation, such as The report was canceled by user or The report was canceled by the system to prevent system overload.
Chapter 10 Working with Reports Generating Reports Figure 10-4 Step 4 Events Report - Run Report Dialog Box In the Run Report dialog box, specify the report settings as follows: • For standard events reports, use the information in Table 10-17. • For detailed network reports, use the information in Table 10-18. • For detailed non-network reports, use the information in Table 10-19. Cisco Prime Network 4.
Chapter 10 Working with Reports Generating Reports Table 10-17 Events Report - Run Report Dialog Box Fields Option Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration.
Chapter 10 Working with Reports Generating Reports Table 10-17 Events Report - Run Report Dialog Box Fields (continued) Option Description Device Selection Select Devices Note • You can add only those devices that are within your scope. • A user with the Administrator role can select unmanaged devices (by IP address) for reports that run on the Event Archive. Select devices to include in the report: 1. Click Select Devices. 2. Click Add. 3.
Chapter 10 Working with Reports Generating Reports Table 10-18 Option Detailed Network Events Reports - Run Report Dialog Box Fields Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration.
Chapter 10 Working with Reports Generating Reports Table 10-18 Detailed Network Events Reports - Run Report Dialog Box Fields (continued) Option Description Device Selection Select Devices Note • You can add only those devices that are within your scope. • A user with the Administrator role can select unmanaged devices (by IP address) for reports that run on the Event Archive. • The Detailed Event Count (by device) report accepts a maximum of 1000 devices.
Chapter 10 Working with Reports Generating Reports Table 10-18 Detailed Network Events Reports - Run Report Dialog Box Fields (continued) Option Description Detailed Traps Report—Additional Report Specifications Traps Detailed Description In the Description Contains field, enter the string that the trap must contain to be included in the report. Long Description This option is enabled if you choose Fault DB for the data source. 1.
Chapter 10 Working with Reports Generating Reports Table 10-19 Detailed Non-Network Events Reports - Run Report Dialog Box Fields Option Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report. Report Security This field is displayed only if report sharing is enabled in Prime Network Administration.
Chapter 10 Working with Reports Generating Reports Table 10-19 Detailed Non-Network Events Reports - Run Report Dialog Box Fields (continued) Option Description Detailed Provisioning Events Report—Additional Report Specifications Description Contains Enter the string that the trap must contain to be included in the report. User Name Contains Enter the string that the username must contain to be included in the report.
Chapter 10 Working with Reports Generating Reports Figure 10-5 Step 4 Inventory Report - Run Report Dialog Box Enter the required information in the Run Report dialog box as described in Table 10-20. Table 10-20 Inventory Report - Run Report Dialog Box Fields Field Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report.
Chapter 10 Working with Reports Generating Reports Table 10-20 Inventory Report - Run Report Dialog Box Fields (continued) Field Description Report Security This field is displayed only if report sharing is enabled in Prime Network Administration. Indicate the level of security for the report by clicking the appropriate option: • Private—The report can be viewed and used only by the report creator and the administrator.
Chapter 10 Working with Reports Generating Reports Generating Network Service Reports If you generate a detailed network service report on a large-scale setup, a message is displayed in the Run Report dialog box recommending that you apply a filter to limit the size of the report. To generate a network service report using Report Manager: Step 1 In Prime Network Vision, Prime Network Events, or Prime Network Administration, choose Reports > Report Manager.
Chapter 10 Working with Reports Generating Reports Step 4 Enter the required information the Run Report dialog box as described in Table 10-21. Table 10-21 Network Service Report - Run Report Dialog Box Fields Field Description Report Settings Report Name Enter a unique name for the report, from 1 to 150 characters in length. Report names cannot include the following characters: ;?<>/:\"#*|. Description Enter a brief description of the report.
Chapter 10 Working with Reports Generating Reports Table 10-21 Network Service Report - Run Report Dialog Box Fields (continued) Field Description Network Pseudowire Reports—Report Contents Define Filter Check the Define Filter check box to enter criteria that must be matched for inclusion in the report. You can specify match criteria in any or all of the following fields.
Chapter 10 Working with Reports Generating Reports Step 6 Click OK. The report appears in the table in the content pane with a state of Running, if the report is scheduled to run immediately, or Scheduled, if the report is scheduled to run at a later point in time. When the report is complete, the state changes to Done. You can view the reports when the state is Done. Occasionally, some report formats require additional time for generation.
Chapter 10 Working with Reports Scheduling Reports Generating Reports from Prime Network Vision Prime Network Vision enables you to run reports on selected devices from the map and list views. Note You can generate reports only for devices that are within your scope. To generate a report from Prime Network Vision: Step 1 In Prime Network Vision, select the required devices in the map or list view.
Chapter 10 Working with Reports Managing Reports Step 5 Click the Scheduling tab. By default, the Run Now option is selected and the report is scheduled to run immediately. Step 6 To schedule the report for a later date/time: a. Select the Schedule Job radio button. The scheduling options Once and Recurring are enabled. b. To generate the report once, select the Once radio button and specify the date and time when you want the report to be generated. c.
Chapter 10 Working with Reports Managing Reports To change the maximum number of concurrent reports, use the runRegTool command (located in ANAHOME/Main) as follows: ./runRegTool.sh -gs 127.0.0.1 set 0.0.0.0 site/reports/reports-setting/reports-running-settings/maxRunningReports value where value is the new maximum number of concurrent reports. You do not need to restart any AVMs after entering this command. For more information on the runRegTool command, see the Cisco Prime Network 4.
Chapter 10 Working with Reports Managing Reports Figure 10-7 Step 4 Most Common Daily Events Report Example Save the report as required. Renaming Reports You can rename: • Any report type that you defined. • Any generated report that you have access to. You cannot rename any of the Prime Network standard report types.
Chapter 10 Working with Reports Managing Reports Step 3 Step 4 In the Edit dialog box, enter a new name for the report type in the Report Name field, using the following conventions: • The name can contain 1 to 150 characters. • The name cannot include the following characters: ;?<>/:\"#*|. Click OK. The navigation pane is refreshed and the report type is displayed with the new name. Renaming a Generated Report To rename a report: Step 1 Choose Reports > Report Manager.
Chapter 10 Working with Reports Managing Reports Limiting Access to a Report To limit access to a report that you generated and subsequently shared: Step 1 Choose Reports > Report Manager. Step 2 Locate the required report. Step 3 In the content pane, right-click the report that you want to limit access to, then choose Unshare. The report can be viewed and used by only you and the administrator.
Chapter 10 Working with Reports Managing Reports Viewing Report Properties The Report Properties dialog box enables you to view the report settings and to modify some of them. To view report properties, and optionally change the name, description, or access: Step 1 Choose Reports > Report Manager. Step 2 Locate the required report. Step 3 In the content pane, right-click the selected report, then choose Properties. The Report Properties dialog box is displayed, as shown in Figure 10-8.
Chapter 10 Working with Reports Defining Report Types Defining Report Types You can modify any of the report types provided by Prime Network so that it better suits your needs and environment. This is extremely beneficial if you generate a particular type of report for specific devices or events on a regular basis. To define a report type: Step 1 Choose Reports > Report Manager. Step 2 In the navigation pane, right-click the existing report type, then choose Define Report of This Type.
Chapter 10 Working with Reports Managing Report Folders Step 6 To move the new folder to another folder, or to the top level in the folder hierarchy: a. Right-click the folder, then choose Move. b. In the Move To dialog box, select the location where you want the folder to reside. c. Click OK. The folder is displayed in the new location. Moving Folders Prime Network enables you to move folders that you have created in Report Manager.
Chapter 10 Working with Reports Managing Report Folders Deleting Folders You can delete folders that you have created in Report Manager if they are empty. You cannot delete the following folders: • Events Reports • Detailed Network Events • Detailed Non-Network Events • Inventory Reports • Network Service Reports • User-created folders that contain other folders or report types To delete a report folder: Step 1 Choose Reports > Report Manager.
Chapter 10 Working with Reports Managing Report Folders Figure 10-9 Folder Properties Table 10-22 describes the information that is displayed in each tab, depending on the folder’s contents. Table 10-22 Folder Properties Window Field Description Report Folders Tab Name Name of the folder included in the selected folder. Report Types Tab Name Name of the report type included in the selected folder. Description Description of the report type included in the selected folder.
Chapter 10 Working with Reports Managing Report Folders Viewing Report Type Properties To view report type properties: Step 1 In the navigation pane, right-click the required report type, then choose Properties. The information that is displayed depends on whether the report type is one that you defined or one provided by Prime Network: Step 2 • Prime Network-provided report type—The Report Type Properties window is displayed with the report name and description. Click Run to generate the report.
Chapter 10 Working with Reports Managing Report Folders Cisco Prime Network 4.
CH A P T E R 11 Using Cisco PathTracer to Diagnose Problems Cisco PathTracer enables you to view a network path between two network objects.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Cisco PathTracer Overview By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 4.0 Administrator Guide.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer In MPLS and Carrier Ethernet environments, Cisco PathTracer can trace paths across: • Carrier Supporting Carrier (CSC) configurations—A path trace along a CSC flow follows the path from the customer CE through the customer carrier VPN, across the customer backbone carrier VPN, back to the customer carrier VPN, and to the destination CE.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer To view a specific path, you must specify an initial point and a destination, such as an IP or MAC address. If you specify VC or DLCI information, which ends in a router, Cisco PathTracer finds the next hop according to the destination IP address. If you do not specify a destination IP or MAC address, Cisco PathTracer uses the default gateway in the router.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Table 11-3 Cisco PathTracer Right-Click Menu Options (continued) Element Pseudowire endpoint Location • Map view or navigation pane • Inventory window Site Map view Switching entity Map view Virtual connection Inventory window: VLAN • Cross Connect window • VC Table window • Navigation pane • Map view Starting a Path Trace You can start a path trace in the following ways: • From the Map View, page 11-5 •
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer The next step depends on your choice in Step 1: • If you choose PathTracer > From Here to Destination, the Path Information dialog box is displayed (Figure 11-1). Continue with Step 2. • If you choose PathTracer > Start Here, continue with Step 3. Figure 11-1 Step 2 Path Information Dialog Box To specify a destination: a. In the Path Information dialog box, enter the required information, as described in Table 11-4.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Step 5 In the toolbar, click Cisco PathTracer. • If you select one or more paths in the paths pane, each selected path is displayed in its own window with the Layer 1, Layer 2, Layer 3, and Business Tag tabs. • If you select nothing in the Paths pane, each path found is displayed in its own window with the Layer 1, Layer 2, Layer 3, and Business Tag tabs.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer • Using a Pseudowire, page 11-12 • Using an MPLS-TP Tunnel Endpoint, page 11-13 Using an Ethernet Flow Point A network VLAN is required for you to start a path trace using an Ethernet flow point. To launch a path trace from an Ethernet flow point: Step 1 In the Cisco Prime Network Vision navigation pane or map pane, expand the required network VLAN.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Using an IP Interface Both IPv4 and IPv6 addresses are supported as valid path trace sources and destinations as illustrated in the following procedure. To launch a path trace from an IP interface: Step 1 In logical inventory, right-click the required IP interface (Logical Inventory > Routing Entities > Routing Entity > ip-interface). The right-click menu displays IPv4 and IPv6 options.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Figure 11-4 IP Interface Path Trace Launch Point - Path Information Dialog Box Step 3 In the Destination IP field, enter the IPv4 or IPv6 address. Step 4 To limit the number of hops for the path trace, check the Stop trace after check box, and enter the maximum number of hops for the path trace. Step 5 Click OK. The Cisco PathTracer window appears, displaying the resulting path trace.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Figure 11-5 VLAN Bridge Path Trace Launch Point Step 2 If you choose From Here to Destination in Step 1, the Path Information dialog box is displayed. Specify the required destination using the information in Table 11-4. Step 3 If you choose Start Here, navigate to the destination, right-click it, and choose End Here.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Using an Ethernet Port To launch a path trace from an Ethernet port: Step 1 In physical inventory, right-click the required port (Physical Inventory > Chassis > slot > subslot > port) and choose one of the following options as shown in Figure 11-6: • PathTracer > From Here to Destination • PathTracer > Start Here Figure 11-6 Step 2 Ethernet Port Path Trace Launch Point Depending on your choice in Step 1, specify the requ
Chapter 11 Using Cisco PathTracer to Diagnose Problems Launching Path Tracer Figure 11-7 Path Information Dialog Box for a Network Pseudowire Step 3 Specify the destination using the information in Table 11-4. Step 4 To limit the number of hops for the path trace, check the Stop trace after check box, and enter the maximum number of hops for the path trace. The Cisco PathTracer window appears, displaying the resulting path trace.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Figure 11-8 MPLS-TP Tunnel Endpoint Path Trace Launch Step 3 Specify the destination using the information in Table 11-4. Step 4 To limit the number of hops for the path trace, check the Stop trace after check box, and enter the maximum number of hops for the path trace. The Cisco PathTracer window appears, displaying the resulting path trace.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer The Cisco PathTracer window enables you to: • View multiple paths for a selected source and destination either sequentially or simultaneously. • View individual paths with networking layer details. • Save a map with multiple paths to a file. • Run Cisco PathTracer again, using the same trace or with a different limit number of hops.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer • Path Trace Pane, page 11-18 • Right-Click Menu Options, page 11-19 Menus Table 11-5 describes the options available in the Cisco PathTracer menus. Table 11-5 Cisco PathTracer Window Menu Options Option Description File Menu Run Again Offers the following options for running Cisco PathTracer again for the same source and destination: • Change Hop Count—Enables you to enter a new hop count.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Toolbar Table 11-6 describes the options available in the Cisco PathTracer toolbar. Table 11-6 Button Cisco PathTracer Toolbar Options Function Displays the previous path in the path trace pane. Displays the next path in the path trace pane. Clears the path selection made in the path trace pane. Opens the Cisco PathTracer details window.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Trace Tabs The discovered path trace is initially displayed in the path trace pane with a tab that displays the date and time when Prime Network started the path tracing process (snapshot time). If you load a saved path from a file or run the displayed path trace again, the opened or refreshed path is displayed in a new tab with a refreshed path map for each run or file.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Traces in Cisco PathTracer Right-Click Menu Options You can right-click network elements in the path trace window and choose items from a right-click menu. The right-click menu is context sensitive depending on the view and the element selected. Table 11-7 describes the right-click menu options that are available for elements selected in the Cisco PathTracer window.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Table 11-7 Cisco PathTracer Element Right-Click Menu Options (continued) Option Description Topology Enables you to add: • A static link between two devices. • A static topology between a device and an unmanaged network. • A tunnel to a VPN. Launch external applications Starts an external application or tool that has been configured for access via the right-click menu.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Figure 11-10 Cisco PathTracer Details Window 1 Menu bar 5 Details pane 2 Toolbar 6 Layer and Business tabs 3 Path trace pane 7 Status bar 4 Hide/display path trace pane The Cisco PathTracer details window contains the following components: • Menus, page 11-22 • Cisco PathTracer Details Window Toolbar, page 11-22 • Path Trace Pane, page 11-23 • Details Pane, page 11-25 Cisco Prime Network 4.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Menus Table 11-8 describes the Cisco PathTracer details window menu options. Table 11-8 Cisco PathTracer Details Window Menus Option Description File Menu Close Closes the Cisco PathTracer window. View Menu Show All Displays all the information in the tabs. Hide All Hides all the information in the tabs. Tools Menu Export to File Exports the currently displayed data to a CSV file.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Path Trace Pane The path trace pane in the Cisco PathTracer details window displays information related to the tab selected in the details pane. For example, if you choose the Layer 2 tab in the details pane, Layer 2 information is displayed in the path trace pane. Similarly, if you choose an element or link in the path trace pane, the related parameters are highlighted in the details pane.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Table 11-10 Cisco PathTracer Element Right-Click Menu Options (continued) Option Description Tools Contains the following choices: • CPU Usage—Displays memory and CPU usage information for a device or network element. • Ping—Pings the device from the client station. • Telnet—Communicates with the device using the Telnet window from the client station.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing Path Trace Details Table 11-10 Cisco PathTracer Element Right-Click Menu Options (continued) Option Description Management Contains the following submenu options: VNE Tools • Command Builder—Defines commands and scripts using the Prime Network Command Builder tool (Configurator security level required).
Chapter 11 Using Cisco PathTracer to Diagnose Problems Saving and Opening Cisco PathTracer Map Files Saving and Opening Cisco PathTracer Map Files Prime Network enables you to export multiple-path trace maps that are displayed in the Cisco PathTracer window to an XML file. You can view the data later to assess whether anything has changed. Saving Cisco PathTracer Map Files To save Cisco PathTracer map files: Step 1 Open the Cisco PathTracer window as described in Launching Path Tracer, page 11-3.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Rerunning a Path and Comparing Results Step 3 In the Export Table to File dialog box, navigate to the directory where you want to save the Cisco PathTracer counter values. Step 4 In the File name field, enter a name for the file in which to save the counter values. Step 5 Click Save. Cisco PathTracer starts saving the counter values to the specified file.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Viewing L2TP Path Information Cisco PathTracer uses the VLAN tags of the Ethernet header and the port configuration to trace the path from one interface to another over the network. Among other things, you can: • View a Layer 2 path across a LAN domain with all the VLAN tag information. • For each network element, view the relevant parameters for each interface on all layers along the path.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Table 11-11 Layer 2 Tab Information for L2TP Tunnels (continued) Field Description Tunnel Remote ID Remote tunnel identifier. Tunnel ID Local tunnel identifier. Tunnel Name Name of the subscriber and the tunnel identifier. Session ID Session identifier. Traffic > L2TPSession Number of traffic packets passing through the L2TP tunnel.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Cisco PathTracer MPLS Start and Endpoints You can open Cisco PathTracer by right-clicking a starting point and entering the required destination IP address. Table 11-12 lists the Cisco PathTracer starting points.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Using Cisco PathTracer for CSC Configurations Cisco PathTracer traces a CSC flow from the customer CE through the customer carrier VPN, across the customer backbone carrier VPN, back to the customer carrier VPN, and to the destination CE. To launch a path trace for a CSC configuration: Step 1 In a map, double-click the required CE device.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Using Cisco PathTracer for Layer 3 VPNs Cisco PathTracer uses VRF routing and label switching information to trace the path from one VRF interface to another. If you choose a launch point and destination from the right-click menu, you can open the Cisco PathTracer for Layer 3 VPNs. The Cisco PathTracer window shows the VPN topology map.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Table 11-14 describes the Layer 2 properties that can be displayed in the Layer 2 tab specifically for VPNs. Table 11-14 Cisco PathTracer Layer 2 Properties for VPNs Field Description Top Label Details of the outer MPLS label. Label Stack Details of the inner MPLS label. MAC Address MAC address. Tunnel ID Tunnel identifier.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Layer 2 and Layer 3 path trace information is displayed in the Cisco PathTracer details window when a path is traced over MPLS TE tunnels. To view Layer 2 path information, choose the Layer 2 tab and then View > Show All. The path information is displayed in the active tab. Table 11-15 describes the Layer 2 properties that can be displayed in the Layer 2 tab specifically for MPLS TE tunnels.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Table 11-15 Cisco PathTracer Layer 2 Properties for MPLS TE Tunnels (continued) Field Description Tunnel Burst Kbps Burst flow specification (in Kb/s) for this tunnel. Tunnel Average Rate Kbps Tunnel average rate in Kb/s. Tunnel Affinity Mask Tunnel affinity bits that should be compared to the link attribute bits. Cisco Prime Network 4.
Chapter 11 Using Cisco PathTracer to Diagnose Problems Using Cisco PathTracer in MPLS Networks Cisco Prime Network 4.
CH A P T E R 12 Monitoring Carrier Ethernet Services The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Carrier Ethernet services: • User Roles Required to Work with Carrier Ethernet Services, page 12-2 • Viewing CDP Properties, page 12-6 • Viewing Link Layer Discovery Protocol Properties, page 12-8 • Viewing Spanning Tree Protocol Properties, page 12-10 • Viewing Resilient Ethernet Protocol Properties (REP), page 12-14 • Viewing HSRP Prop
Chapter 12 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services • Configuring IS-IS, page 12-121 User Roles Required to Work with Carrier Ethernet Services This topic identifies the roles that are required to work with to Carrier Ethernet services in Prime Network Vision.
Chapter 12 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services Table 12-1 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator View Ethernet flow domains X X X X X View Ethernet LAG properties — — — — X View Ethernet service properties X X X X X View EVC service properties — — — — X View IP SLA respon
Chapter 12 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services Table 12-1 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator Working with Overlays Apply overlays X X X X X Display or hide overlays X X X X X Remove overlays X X X X X View pseudowire tunnel links in VPLS overlays — — — — X View REP
Chapter 12 Monitoring Carrier Ethernet Services User Roles Required to Work with Carrier Ethernet Services Table 12-2 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator View associated network VLAN service links and VLAN mapping properties X X X X X View CDP properties X X X X X View EFD properties X X X X X View EFP cross-connect properties X X X
Chapter 12 Monitoring Carrier Ethernet Services Viewing CDP Properties Table 12-2 Default Permission/Security Level Required for Working with Carrier Ethernet Services - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator View VPLS core or access pseudowire X endpoint properties X X X X View VPLS instance properties X X X X X View VSI properties X X X X X Apply overlays X X X X X Display or hide overlays X X X X X Remove overla
Chapter 12 Monitoring Carrier Ethernet Services Viewing CDP Properties Figure 12-1 CDP in Logical Inventory Table 12-3 describes the CDP instance properties that are displayed. Table 12-3 CDP Properties in Logical Inventory Field Description Process Process name; in this case, Cisco Discovery Protocol Process Status Process status: Running or Disabled. CDP Holdtime Specifies the amount of time a receiving device should hold the information sent by a device before discarding it.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Link Layer Discovery Protocol Properties In Physical Inventory To view CDP on a Layer 2 port: Step 1 In Prime Network Vision, double-click the device with the Layer 2 port with the CDP information you want to view. Step 2 In the inventory window, select the required port under Physical Inventory.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Link Layer Discovery Protocol Properties Figure 12-2 LLDP in Logical Inventory Table 12-4 describes the properties that are displayed for LLDP. Table 12-4 Link Layer Discovery Protocol Properties Field Description Process Process; in this case, Link Layer Discovery Protocol Process Status Process status: Running or Disabled. LLDP Hold Time LLDP advertised hold time in seconds.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties Table 12-4 Link Layer Discovery Protocol Properties (continued) Field Description LLDP Neighbors Table Local Port Local port. Local Port ID Local port identifier. Local Port Name Local port name. Remote System Name Remote system name. Remote Chassis ID Remote chassis identifier. Remote Port ID Remote port identifier. Remote Port Name Remote port name.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties Figure 12-3 STP in Logical Inventory Table 12-5 describes the properties that are displayed for STP. Table 12-5 STP Properties Field Description Process Process; in this case, Spanning Tree Protocol. Process Status Process status: Running or Disabled. Bridge Hello Time Hello message keepalive interval (in seconds) when the port is the root. Hello Time Current hello time (in seconds).
Chapter 12 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties Table 12-5 STP Properties (continued) Field Description STP Instance Info Table Step 4 STP Instance ID STP instance name. VLAN IDs VLAN identifiers. Bridge Priority Bridge priority. STP Root Port Hyperlinked entry to the STP port in logical or physical inventory. Root Cost Root cost value for this bridge. Designated Root MAC address of the designated root.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Spanning Tree Protocol Properties Table 12-6 STP Instance Information Properties (continued) Field Description Max Age Current maximum age (in seconds). STP Protocol Specification Specific STP protocol type or variant used for this instance, such as Rapid PvSTP. Is Root Whether or not the port is the root: True or False. Ports Info Table STP Port Hyperlinked entry to the STP port in physical inventory.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Resilient Ethernet Protocol Properties (REP) Table 12-7 MSTP Properties in Logical Inventory Field Description MST Force Version Force version used: MST, PVSTP, RSTP, STP, or Unknown. MST Cfg ID Rev Level Revision level used by the selected device and negotiated with other devices. MST Cfg ID Name MSTP instance name. MST Max Instances Maximum number of MSTP instances.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Resilient Ethernet Protocol Properties (REP) Step 2 In the inventory window, choose Logical Inventory > Resilient Ethernet Protocol. Figure 12-4 shows an example of REP in logical inventory. Figure 12-4 REP in Logical Inventory Table 12-8 describes the information that is displayed for REP. Table 12-8 REP Properties Field Description Process Process name; in this case, Resilient Ethernet Protocol.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Resilient Ethernet Protocol Properties (REP) Figure 12-5 REP Segment Properties Table 12-9 describes the information that is displayed for REP segments. Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Resilient Ethernet Protocol Properties (REP) Table 12-9 REP Segment Properties Field Description Segment ID Segment identifier. Segment Complete Whether the segment is complete; that is, that no port in the segment is in a failed state: True or False. Segment Ports Table Port Hyperlinked entry to the port in physical inventory.
Chapter 12 Monitoring Carrier Ethernet Services Viewing HSRP Properties Viewing HSRP Properties Hot Standby Router Protocol (HSRP) is a protocol that provides backup to a router in case of failure. Using HSRP, several routers are connected to the same Ethernet network segment and work together to present the appearance of a single virtual router.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Access Gateway Properties Table 12-10 HSRP Group Properties Field Description Group Number Number of the HSRP group associated with the interface. Version Version of the HSRP group. Port Name Port on which the HSRP is configured. Priority Value that determines the role each HSRP router plays. Values are 1 through 254, with higher numbers having priority over lower numbers. Coupled Router The partnet router.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Access Gateway Properties Figure 12-7 Access Gateway in Logical Inventory Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Access Gateway Properties Table 12-11 describes the information that is displayed for an access gateway. Table 12-11 Access Gateway Properties in Logical Inventory Field Description Group Name Access gateway group name. Group Type Group type: MSTAG or REPAG. Interface Properties Interface Hyperlink to the interface in physical inventory on which access gateway is configured. Config Name Name of the MSTP region.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Access Gateway Properties Figure 12-8 Access Gateway Instance in Logical Inventory Table 12-12 describes the information that is displayed for an access gateway instance. Table 12-12 Access Gateway Instance Properties Field Description Interface Key Hyperlink to the interface in physical inventory on which access gateway is configured. Config Name Name of the MSTP region.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Table 12-12 Access Gateway Instance Properties (continued) Field Description Hello Time Current hello time (in seconds) Port Active Whether or not the port is active: True or False. Instances Table Instance ID Access gateway instance identifier. VLAN IDs VLAN identifiers. Cost Path cost for this instance. Bridge Priority Priority associated with current bridge.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups To view properties for Ethernet link aggregation groups: Step 1 In Prime Network Vision, double-click the device with the link aggregation group you want to view. Step 2 In the inventory window, choose Logical Inventory > Ethernet Link Aggregation. The link aggregation properties are displayed as shown in Figure 12-9.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Step 3 To view properties for a specific aggregation, double-click the group identifier. The information that is displayed depends on the type of aggregation: Table 12-14 • For Ethernet Channel aggregations, see Table 12-14. • For IEEE 802.3 AD aggregations, see Table 12-15. LAG Ethernet Channel Properties Field Description Group Number Aggregation group number.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Table 12-14 LAG Ethernet Channel Properties (continued) Field Description Operational State Operational state of the subinterface: Up or Down. VLAN ID VLAN identifier. Inner VLAN CE-VLAN identifier. IP Interface IP interface configured as part of the subinterface, hyperlinked to the routing entity or VRF in logical inventory. VRF Name VRF associated with the subinterface.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Table 12-15 LAG IEEE 802.3 AD Properties Field Description Group Number Aggregation group number. Bandwidth Aggregation bandwidth. Control Protocol Aggregation control protocol: Manual, Link Aggregation Control Protocol (LACP), or Port Aggregation Protocol (PagP). MAC Address Aggregation MAC address. Administrative State Aggregation administrative status: Up or Down.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Link Aggregation Groups Table 12-15 LAG IEEE 802.3 AD Properties (continued) Field Description Subinterfaces Table Address IP address of the subinterface. Mask Subnet mask applied to the IP address. VLAN Type Type of VLAN, such as Bridge or IEEE 802.1Q. Operational State Operational state of the subinterface: Up or Down. VLAN ID VLAN identifier. Inner VLAN CE-VLAN identifier.
Chapter 12 Monitoring Carrier Ethernet Services Viewing mLACP Properties Table 12-15 LAG IEEE 802.3 AD Properties (continued) Field Description Dot3ad Agg Port Actor Admin Key Administrative key for the local port. Dot3ad Agg Port Actor Port Number assigned to the local aggregation port. Dot3ad Agg Port Partner Oper Port Number assigned to the aggregation port by the partner. Dot3ad Agg Port Actor Oper Key Operational for the local port.
Chapter 12 Monitoring Carrier Ethernet Services Viewing mLACP Properties Table 12-16 describes the information displayed in the ICCP Redundancy Groups table. Table 12-16 ICCP Redundancy Groups in Logical Inventory Field Description Group Number ICCP group identifier. Peer Monitoring Option Method used to monitor the peer: BFD or IP Reachability Monitoring. Member IP Address IP address of the neighbor PoA device. Member Device Name Name of the neighbor PoA device.
Chapter 12 Monitoring Carrier Ethernet Services Viewing mLACP Properties Table 12-17 describes the information available in the ICCP Redundancy Group Properties window. Table 12-17 ICCP Redundancy Group Properties Window Field Description Group Number ICCP group identifier. Peer Monitoring Option Method used to monitor the peer: BFD or IP Reachability Monitoring. Member IP Address IP address of the neighbor PoA device. Member device name Name of the neighbor PoA device.
Chapter 12 Monitoring Carrier Ethernet Services Viewing Provider Backbone Bridge Properties Viewing Provider Backbone Bridge Properties Provider backbone bridges (PBBs), specified by IEEE 802.1ah-2008, provide a way to increase the number of service provider supported Layer 2 service instances beyond the number supported by QinQ and VPLS. PBB adds a backbone VLAN tag and backbone destination and source MAC addresses to encapsulate customer Ethernet frames and create a MAC tunnel across core switches.
Chapter 12 Monitoring Carrier Ethernet Services Viewing EFP Properties Table 12-18 describes the information displayed for PBB. Table 12-18 PBB Properties in Logical Inventory Field Description Name Identifier of the bridge as follows: • For Cisco 7600 devices, the identifier of the MAC tunnel created. • For Cisco ASR 9000-series devices, the identifier is a combination of the bridge group and the bridge domain on the B-Bridge component.
Chapter 12 Monitoring Carrier Ethernet Services Viewing EFP Properties Figure 12-13 shows an example of the EFP Properties window. Figure 12-13 EFP Properties Window Table 12-19 describes the information displayed in the EFP Properties window. Table 12-19 EFP Properties Window Field Description EFP ID Identifier for the EFP. VLAN Match Criteria Match criteria configured on the EFP for forwarding decisions. Split Horizon Group Split horizon group to which the EFP is associated.
Chapter 12 Monitoring Carrier Ethernet Services Viewing EFP Properties Step 2 Click the hyperlink entry in the Binding field to view the related properties in logical inventory. In this example, clicking the hyperlink displays the relevant bridge in logical inventory, as shown in Figure 12-14. Figure 12-14 Bridge Associated with EFP in Logical Inventory Table 12-20 describes the information displayed for an EFP associated with a bridge.
Chapter 12 Monitoring Carrier Ethernet Services Viewing EFP Properties Table 12-20 EFP Associated with a Bridge in Logical Inventory (continued) Field Description EFPs Table Step 3 EFP ID EFP identifier. Operational State EFP operational state: Up or Down. VLAN VLAN associated with this EFP. Inner VLAN CE-VLAN identifier. Translated VLAN Translated, or mapped, VLAN identifier. Translated Inner VLAN Translated, or mapped, inner VLAN identifier.
Chapter 12 Monitoring Carrier Ethernet Services Viewing EFP Properties Figure 12-15 EFPs Tab in Physical Inventory Table 12-21 describes the information displayed in the EFPs tab. Table 12-21 EFPs Tab Field Description EFP ID EFP identifier. Operational State EFP operational state. VLAN VLAN identifier. Inner VLAN CE-VLAN identifier. Translated VLAN Translated VLAN identifier. Translated Inner VLAN Translated CE-VLAN identifier.
Chapter 12 Monitoring Carrier Ethernet Services Connecting a Network Element to an EFP Connecting a Network Element to an EFP You can add and connect network elements to an EFP under an existing aggregation for VLAN, VPLS, Pseudowire, and Ethernet Service. To connect network elements to an EFP: Step 1 Select an EFP node under the VLAN/VPLS/Pseudowire/Ethernet Service aggregation node and choose File > Add to Map > Network Element.
Chapter 12 Monitoring Carrier Ethernet Services Understanding EFP Severity and Ticket Badges Figure 12-16 • EFP Severity and Ticket Badges Based on Underlying Service Instance If the Ethernet flow point element represents a VLAN interface for a regular switch port, the severity and ticket badges are based on the corresponding port, as shown in Figure 12-17. Figure 12-17 EFP Severity and Ticket Badges Based on Corresponding Port Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Viewing EVC Service Properties Viewing EVC Service Properties Certain EVC service properties are configured as port attributes. These attributes determine the degree of service transparency and protect the service provider’s network from protocol control traffic.
Chapter 12 Monitoring Carrier Ethernet Services Viewing EVC Service Properties Figure 12-18 EVC Port Properties in Physical Inventory Table 12-22 describes the information displayed for these properties. Table 12-22 EVC Port Properties in Physical Inventory Field Description Storm Control and Monitoring Properties Area Storm Control Status of storm control on the port: Enabled or Disabled.
Chapter 12 Monitoring Carrier Ethernet Services Viewing and Renaming Ethernet Flow Domains Table 12-22 EVC Port Properties in Physical Inventory (continued) Field Description Security Properties Areas Port Security Status of security on the port: Enabled or Disabled. MAC Address Limit Maximum number of MAC addresses allowed on the interface.
Chapter 12 Monitoring Carrier Ethernet Services Viewing and Renaming Ethernet Flow Domains To view Ethernet flow domains: Step 1 In Prime Network Vision, choose Network Inventory > Ethernet Flow Domains. The Ethernet Flow Domain List window is displayed with the domain name, the system-defined domain name, and a brief description for each Ethernet flow domain as shown in Figure 12-19. Figure 12-19 Step 2 Ethernet Flow Domain List Properties Window To rename an Ethernet flow domain: a.
Chapter 12 Monitoring Carrier Ethernet Services Viewing and Renaming Ethernet Flow Domains Figure 12-20 Ethernet Flow Domain Properties Window Table 12-23 describes the information displayed in the Ethernet Flow Domain Properties window. Note Not all fields are available in all tables. The table contents depend on the domain type, such as FastEthernet. Table 12-23 Ethernet Flow Domain Properties Window Field Description Domain Name Name of the selected domain.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Working with VLANs The following topics provide information and procedures for working with VLANs. The Vision GUI client supports a VLAN overlay which, when applied, highlights the network elements and links that a VLAN (and its associated VLANs) traverse. The overlay displays STP and REP link and port information. Using overlays is described in Displaying VLANs By Applying VLAN Overlays to a Map45, page 12-61.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Understanding VLAN Elements The following concepts are important to understand when working with the representation of edge EFPs inside VLANs: • VLAN Elements in Prime Network Vision, page 12-46 • VLANs, page 12-46 • Switching Entities, page 12-46 • Ethernet Flow Points, page 12-47 VLAN Elements in Prime Network Vision Table 12-24 describes the icons that Prime Network Vision uses to represent VLAN elements.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Ethernet Flow Points An Ethernet flow point (EFP) can represent a port that is configured for participation in a specific VLAN. If you right-click an EFP in Prime Network Vision and then choose Inventory, the inventory window is displayed with the corresponding port selected in Physical Inventory.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-22 • Termination Point EFP Inside a VLAN Edge EFPs—A subset of EFPs that exist inside a switching entity but that are not connected to other EFPs and that represent edge EFPs in the context of the VLAN. In Prime Network Vision, edge EFPs are displayed directly under the VLAN at the same level as their switching entities and are connected to their corresponding switching entities by a dotted link, as shown in Figure 12-23.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-23 Edge EFP Inside a VLAN An edge EFP can be displayed both inside and outside of its switching entity, as shown (highlighted with a red outline) in Figure 12-24: Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-24 Edge EFPs Displayed Inside and Outside of Switching Entities You can delete EFPs and switching entities that have a reconciliation icon by right-clicking them and choosing Delete. After all switching entities and EFPs are deleted from a network VLAN, the empty network VLAN is automatically deleted from Prime Network Vision after a few minutes.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Step 2 Choose File > Add to Map > VLAN. The Add VLAN to map dialog box is displayed as shown in Figure 12-25. Figure 12-25 Step 3 Add VLAN Dialog Box In the Add VLAN dialog box, do either of the following: • Choose a search category, enter a search string, then click Go to narrow the VLAN display to a range of VLANs or a specific VLAN. The search condition is “contains.” Search strings are case-insensitive.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-26 VLANs in Map View After you add a VLAN to a map, you can use Prime Network Vision to view its switching entities and Ethernet flow points. For more information, see: • Viewing and Renaming Ethernet Flow Domains, page 12-42 • Viewing EFP Properties, page 12-33 You can view additional information about REP and STP in logical inventory, VLAN domain views, and VLAN overlays.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs When removing VLANs from maps, keep the following in mind: • Removing a VLAN affects other users who are working with the same map view. • This option does not change the business configuration or database. • You cannot remove virtual routers or sites from the map without removing the VLAN. To remove a VLAN, in the Prime Network Vision navigation pane or map view, right-click the VLAN and choose Remove from Map.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-27 VLAN Mappings Tab in Physical Inventory Table 12-25 describes the information that is displayed in the VLAN Mappings table. Table 12-25 VLAN Mappings Table Field Description Direction Whether the VLAN mapping is defined in the incoming or outgoing direction: In or Out. VLAN Customer-side VLAN identifier. Inner VLAN Used for two-to-one mappings, the customer-side inner VLAN identifier.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Working with Associated VLANs Prime Network Vision discovers associations between network VLANs and displays the information in Prime Network Vision. Network VLAN associations are represented by VLAN service links, and can be any of the tag manipulation types described in Table 12-26.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-28 Add Associated VLAN Window In this example, the selected network VLAN has one associated VLAN: VLAN-1742. Table 12-27 describes the information displayed in the Add Associated VLAN table. Table 12-27 Step 3 Add Associated VLAN Table Field Description Name Name of the VLAN. ID VLAN identifier. EFD Name Name of the Ethernet flow domain. EFD System Name Name that Prime Network assigns to the EFD.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Viewing Associated Network VLAN Service Links and VLAN Mapping Properties After you add an associated network VLAN, you can: • View the associated network VLAN service links in Prime Network Vision in the thumbnail view. • View VLAN mapping properties in the Link Properties window. To view associated network VLAN service links and VLAN mapping properties: Step 1 Select the required network VLAN in the map view.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs If VLAN tag manipulation is configured on the link, the VLAN Mapping Properties area in the Link Properties window displays the relevant information. For example, in Figure 12-30, the VLAN Mapping Properties area shows that a one-to-one VLAN mapping for VLAN tag 1709 to VLAN tag 709 is configured on GigabitEthernet1/1/1 on c7-sw8 on the egress direction.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-31 VLAN Elements and Devices in Prime Network Vision The elements are configured as follows: • Port GigabitEthernet1/1/2 on element c7-sw10 is connected to port GigabitEthernet1/1/2 on element c7-sw8 by an Ethernet topology link. • Port GigabitEthernet1/1/2 on element c7-sw10 is a trunk port associated with VLAN-1704 which is configured on element c7-sw10.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-32 Links Between VLAN Elements and Devices 1 The Ethernet topological link between port GigabitEthernet1/1/2 on VNE c7-sw10 and GigabitEthernet1/1/2 on VNE c7-sw8. 2 The VLAN link between GigabitEthernet1/1/2@c7-sw10 EFP and GigabitEthernet1/1/2@c7-sw8 EFP. 3 Another view of the VLAN link (link 2), shown as a link between GigabitEthernet1/1/2@c7-sw10 EFP and GigabitEthernet1/1/2@c7-sw8 EFP.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Displaying VLANs By Applying VLAN Overlays to a Map45 You can create an overlay of a specific VLAN on top of the physical network elements displayed in a map view. The overlay highlights the network elements and links that the selected VLAN and its associated VLANs traverse. Network elements and links that are not part of the VLAN are dimmed in the map view.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-33 Note VLAN Overlay Example The overlay is a snapshot taken at a specific point in time. As a result, the information in the overlay might become stale. To update the overlay, click Refresh the Last Selected Overlay in the toolbar. The VLAN overlay service also supports multi-chassis devices.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Viewing VLAN Service Link Properties See the following topics for information on viewing VLAN service link properties: • Viewing REP Properties for VLAN Service Links, page 12-64 • Viewing STP Properties for VLAN Service Links, page 12-67 • Viewing Associated Network VLAN Service Links and VLAN Mapping Properties, page 12-57 Viewing REP Information in VLAN Domain Views and VLAN Overlays You can view REP segment and port information i
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Table 12-28 Item REP Icons and Badges in VLAN Domain Views and Overlays (continued) Description VLAN Domain View VLAN Overlay Multiple links with badges icon—Indicates that one or more link is represented by the visual link and at least The multiple links icon is displayed The multiple links icon is displayed one of the links contains a in the domain view if more than one in a VLAN overlay view if either of badge.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Figure 12-34 VLAN Service Link Properties Window with REP Information Table 12-29 describes the information that is displayed for REP for each end of the link. Table 12-29 REP Properties in VLAN Service Link Properties Window Field Description Segment ID REP segment identifier. Port Type Port type: Primary Edge, Secondary Edge, or Intermediate.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Viewing STP Information in VLAN Domain Views and VLAN Overlays You can view STP segment and port information in Prime Network Vision in the map view. The icons displayed depend on whether you view the STP information in the VLAN domain view or in a VLAN overlay. Table 12-30 describes the icons and badges used to represent STP link and port information.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Viewing STP Properties for VLAN Service Links To view STP properties for a VLAN service link, open the Link Properties window in one of the following ways: • Double-click the VLAN service link. • Right-click the VLAN service link, and choose Properties. Figure 12-36 shows an example of the Link Properties window with STP information.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Viewing VLAN Trunk Group Properties VTP is a Layer 2 multicast messaging protocol that manages the addition, deletion, and renaming of VLANs on a switched network-wide basis. Prime Network Vision displays VTP information in the logical inventory. VTP information is shown only for Cisco devices that support VTP, and support is provided only for VTP Version 1 and 2.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Table 12-32 describes the information that is displayed in the VTP Domain Properties window. Table 12-32 VTP Domain Properties Window Field Description Managed Element Managed element name, hyperlinked to VTP in logical inventory. Operating Mode VTP operating mode: • Server—Allows VLAN creation, modification, and deletion, and specification of other configuration parameters for the entire VTP domain. Server is the default mode.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Table 12-33 Step 4 VTP Properties in Inventory (continued) Field Description Configuration Revision 32-bit number that indicates the level of revision for a VTP packet. Authentication Whether or not VTP authentication is enabled: True or False. When finished, press Ctrl + F4 to close each VTP properties window.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Table 12-34 describes the information that is displayed. Depending on the bridge configuration, any of the tabs might be displayed for the selected bridge. Table 12-34 VLAN Bridge Properties Field Description Name VLAN bridge name. Type VLAN bridge type. MAC Address VLAN bridge MAC address. VLAN ID VLAN bridge VLAN identifier. STP Instance STP instance information, hyperlinked to the STP entry in logical inventory.
Chapter 12 Monitoring Carrier Ethernet Services Working with VLANs Table 12-34 VLAN Bridge Properties (continued) Field Description Allowed VLANs List of the VLANs allowed on this VLAN interface. VLAN Encapsulation Admin Type VLAN administration encapsulation type, such as IEEE 802.1Q. EFPs Tab EFP ID EFP identifier. Operational State EFP operational state. VLAN VLAN identifier. Inner VLAN CE-VLAN identifier. Translated VLAN Translated VLAN identifier.
Chapter 12 Monitoring Carrier Ethernet Services Understanding Unassociated Bridges These commands are applicable only for Cisco ASR 5000 series network elements. Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials.
Chapter 12 Monitoring Carrier Ethernet Services Understanding Unassociated Bridges Figure 12-39 Step 3 Add Unassociated Bridge Dialog Box In the Add Unassigned Bridge to domain dialog box, select the required bridge and click OK. The map is refreshed and displays the newly added bridge as shown in Figure 12-40. Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Flow Point Cross-Connects Figure 12-40 Unassociated Bridge in Prime Network Vision Working with Ethernet Flow Point Cross-Connects Prime Network Vision automatically discovers Ethernet flow point (EFP) cross-connects, also known as locally switched EFPs. Prime Network Vision also identifies changes in already identified EFP cross-connects, such as cross-connect deletions or changes.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Flow Point Cross-Connects Adding EFP Cross-Connects To add an EFP cross-connect to a map: Step 1 In Prime Network Vision, select the map to which you wish to add the cross-connect. Step 2 Open the Add EFP Cross-Connect dialog box in one of the following ways: Step 3 • Choose File Add to Map > Cross Connect. • In the toolbar, click Add to Map and choose Cross Connect.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Flow Point Cross-Connects Figure 12-41 Local Switching Table in Logical Inventory Table 12-36 describes the information displayed for the EFP cross-connects in the Local Switching Table. Table 12-36 EFP Cross-Connect Properties in Local Switching Table Field Description Key Entry key for the cross-connect group. Entry Status Status of the cross-connect: Down, Unresolved, or Up.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Working with VPLS and H-VPLS Instances Virtual Private LAN Service (VPLS) is a Layer 2 VPN technology that provides Ethernet-based multipoint-to-multipoint communication over MPLS networks. VPLS allows geographically dispersed sites to share an Ethernet broadcast domain by connecting sites through pseudowires.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Adding VPLS Instances to a Map You can add the VPLS instances that Prime Network Vision discovers to maps as required. To add a VPLS instance to a map: Step 1 In Prime Network Vision, select the required map or domain. Step 2 Open the Add VPLS Instance to map dialog box in either of the following ways: Step 3 • In the toolbar, choose Add to Map > VPLS. • In the menu bar, choose File > Add to Map > VPLS.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 12-42 VPLS Instance in Prime Network Vision Map The VPLS instance information is saved with the map in the Prime Network database. Applying VPLS Instance Overlays An VPLS instance overlay allows you to isolate the parts of a network that are being used by a specific VPLS instance. To apply a VPLS instance overlay: Step 1 In Prime Network Vision, choose the map in which you want to apply an overlay.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 12-43 Select VPLS Instance Overlay Dialog Box Step 3 Select the required VPLS instance for the overlay. Step 4 Click OK. The elements being used by the selected VPLS instance are highlighted in the map while the other elements are dimmed, as shown in Figure 12-44. Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 12-44 VPLS Instance Overlay in Prime Network Vision Step 5 To hide and view the overlay, click Hide Overlay/Show Overlay in the toolbar. The button toggles depending on whether the overlay is currently displayed or hidden. Step 6 To remove the overlay, choose Choose Overlay Type > None.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances The callout window displays the following information for each link represented by the selected link: Step 2 • Link details and direction. • Details of the sites using the link and the interlinks. To view the pseudowire link details, double-click the yellow callout window. The details about the link are displayed in the Link Details window as shown in Figure 12-46.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Viewing VPLS Instance Properties To view the properties of a VPLS instance in Prime Network Vision, open the VPLS Instance Properties window in either of the following ways: • In the navigation pane or the map pane, right-click the VPLS instance and choose Properties. • In the navigation pane or the map pane, select the VPLS instance and choose Node > Properties.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Table 12-37 VPLS Instance Properties (continued) Field Description VPN ID VPN identifier for the VSI. Access Pseudowires Tab Name Pseudowire name. Port VSI on which the pseudowire is configured, hyperlinked to the entry in logical inventory. Local Router IP Local router IP address on which the pseudowire is configured. Tunnel ID Virtual circuit identifier of the pseudowire.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 12-48 VPLS Forward in Prime Network Vision Navigation Pane If you right-click the VPLS forward and choose Inventory, the inventory window is displayed. If you right-click the VPLS forward and choose Properties, the VSI Properties window is displayed. The information displayed is the same for both options. VSI properties are displayed as shown in Figure 12-49.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Table 12-38 describes the information that is displayed for the selected VSI. Table 12-38 VSI Properties in Logical Inventory Field Description VSI Name VSI name. VPN ID VPN identifier used in an MPLS network to distinguish between different VPLS traffic. VSI Mode VSI mode: Point-to-Point (default) or Multipoint. Discovery Mode VSI discovery mode: Manual, BGP, LDP, RADIUS, DNS, MSS/OSS, or Unknown.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Figure 12-51 VPLS Tunnel Properties Window Table 12-39 describes the information that is displayed for pseudowire endpoint properties. Table 12-39 Tunnel Properties Window Field Description Port VSI on which the pseudowire is configured, hyperlinked to the VSI in logical inventory. Peer Hyperlinked entry to the pseudowire endpoint peer pseudowires in logical inventory.
Chapter 12 Monitoring Carrier Ethernet Services Working with VPLS and H-VPLS Instances Viewing VPLS Access Ethernet Flow Point Properties The ports that represent the attachment circuits to VPLS instances are displayed under VPLS instances in the Prime Network Vision navigation pane. To view the properties for the Access Ethernet Flow Points configured for a VPLS instance, right-click the required interface in the navigation pane, and choose Inventory. (See Figure 12-52.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires • List of the configured subinterfaces on the port. For more information on the Subinterfaces table, see Viewing a Port Configuration, page 3-25. • List of the configured EFPs on the port. For more information on the EFPs table, see Viewing EFP Properties, page 12-33. • List of VLAN mappings configured on the port. For more information about the VLAN Mappings table, see Viewing VLAN Mappings, page 12-53.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires • In the menu bar, choose File > Add to Map > Pseudowire. Figure 12-54 shows an example of the Add Pseudowire dialog box. Figure 12-54 Step 3 Add Pseudowire Dialog Box In the Add Pseudowire dialog box, do either of the following: • To search for specific elements: a. Choose Search. b. To narrow the display to a range of pseudowire or a group of pseudowires, enter a search string in the search field. c. Click Go.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Step 4 In the Add Pseudowire dialog box, select the pseudowires that you want to add. You can select and add multiple pseudowires by pressing Ctrl while selecting individual pseudowires or by pressing Ctrl +Shift to select a group of pseudowires. Step 5 Click OK. The pseudowire is displayed in the navigation pane and in the content area. In addition, any associated tickets are displayed in the ticket pane. See Figure 12-55.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-56 Pseudowire Components in Prime Network Vision Maps The pseudowire information is saved with the map in the Prime Network database. Viewing Pseudowire Properties To view pseudowire properties: Step 1 In Prime Network Vision, select the required map or domain. Step 2 To view pseudowire endpoint properties configured on an element: a.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-57 Pseudowire Properties Window Table 12-40 describes the information presented in the Pseudowire Properties window. Table 12-40 Step 4 Pseudowire Properties Window Field Description Name Name of the pseudowire. Multisegment Pseudowire Whether or not the pseudowire is multisegment: True or False. System Name Internal or system-generated name of the pseudowire.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Table 12-41 Step 7 Contained Current CTPs Table Field Description Local Interface The name of the subinterface or port, hyperlinked to the interface in physical inventory. ID The tunnel identifier, hyperlinked to Pseudowires Tunnel Edges table in logical inventory. Peer The peer tunnel identifier, hyperlinked to the peer pseudowire tunnel in logical inventory.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Step 1 In the require map, double-click the required device configured for pseudowire. Step 2 In the inventory window, choose Logical Inventory > Pseudowire. Step 3 In the Tunnel Edges table, right-click the required interface and choose Commands > Show > Display Pseudowire. Step 4 In the Display Pseudowire dialog box, do either of the following: • To view the command before running it, click Preview.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-58 Step 2 Pseudowire Redundancy Service Badge in a Map To view additional details, in the map, double-click the element with the redundancy service badge. The PTP Layer 2 MPLS Tunnel Properties window is displayed as shown in Figure 12-59 and shows that the selected pseudowire has a Secondary role in a redundancy service.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-60 Pseudowire Redundancy Service in Logical Inventory The entries indicate that the selected tunnel edge has a Secondary role in the first VC and a Primary role in the second VC. For more information about the Pseudowires Tunnel Edges table, see Table 18-27. Applying Pseudowire Overlays A pseudowire overlay allows you to isolate the parts of a network that are used by a specific pseudowire.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-61 Select Pseudowire Overlay Dialog Box Step 3 Select the required pseudowire for the overlay. Step 4 Click OK. The elements being used by the selected pseudowire are highlighted in the map while the other elements are dimmed, as shown in Figure 12-62. Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-62 Pseudowire Overlay in Prime Network Vision Step 5 To hide and view the overlay, click Hide Overlay/Show Overlay in the toolbar. The button toggles depending on whether the overlay is currently displayed or hidden. Step 6 To remove the overlay, choose Choose Overlay Type > None. Monitoring the Pseudowire Headend A pseudowire (PW) is an emulation of a point-to-point connection over a packet-switching network (PSN).
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-63 Pseudowire Deployment Over Core Network PW CE1 CE1 PE1 PE2 PE2 CE2 CE2 Figure 12-64 CE L2 PE 243510 PE1 Pseudowire Deployment Over Access Network P1 L2 PE PE S-PE CE-2 Global IP/MPLS Cor Network Access Network PW AC 320494 AC A pseudowire headend (PW-HE) virtual interface originates as a PW on an access node and terminates on a Layer 3 service instance on the service provider router.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-65 PW-HE Interface Layer3 Peering CE L2 A-PE P1 S-PE Global IP/MPLS Cor Network AC 320493 MPLS Access Network PW The PW-HE interface is treated like any existing L3 interface and operates on one of the following nodes: • Bridged interworking (VC type 5 or 4) node—PW will carry customer Ethernet frames with IP payload.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Figure 12-66 PW-HE Configuration Details Table 12-42 displays the PW-HE interface details. Cisco Prime Network 4.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Table 12-42 PW-HE Interface Details Field Description Interface Name The unique name to identify the PW-HE interface.
Chapter 12 Monitoring Carrier Ethernet Services Working with Pseudowires Viewing PW-HE Generic Interface List To view the PW-HE generic interface list: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > PW-HE Generic Interface List. The list of generic interfaces configured in Prime Network are displayed in the content pane.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Services Working with Ethernet Services Ethernet services are created when the following business elements are linked to one another: • Network VLAN and bridge domain are linked through a shared EFP. • Network VLAN and VPLS instance are linked through either of the following: – A shared, standalone EFP. – A shared switching entity.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Services b. To narrow the display to a range of Ethernet services or a group of Ethernet services, enter a search string in the search field. c. Click Go. For example, if you choose Name and enter EFP1, the network elements that have names beginning with EFP1 are displayed. • To view all available Ethernet services, choose Show All and click Go.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Services The Ethernet service information is saved with the map in the Prime Network database. Applying Ethernet Service Overlays An Ethernet service overlay allows you to isolate the parts of a network that are being used by a specific Ethernet service. To apply an Ethernet service overlay: Step 1 In Prime Network Vision, choose the map in which you want to apply an overlay.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 12-69 Ethernet Service Overlay in Prime Network Vision Step 5 To hide and view the overlay, click Hide Overlay/Show Overlay in the toolbar. The button toggles depending on whether the overlay is currently displayed or hidden. Step 6 To remove the overlay, choose Choose Overlay Type > None.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 12-70 Ethernet Service Properties Window Table 12-44 describes the information that is displayed for an Ethernet service. Table 12-44 Ethernet Service Properties Window Field Description Name Ethernet service name. System Name Name that Prime Network Vision assigns to the Ethernet service. EVC Name of the EVC associated with the Ethernet service, hyperlinked to the EVC Properties window.
Chapter 12 Monitoring Carrier Ethernet Services Working with Ethernet Services Figure 12-71 EVC Properties Window Table 12-45 describes the information that is displayed in the EVC Properties window. The tabs that are displayed depend on the services included in the EVC.
Chapter 12 Monitoring Carrier Ethernet Services Viewing IP SLA Responder Service Properties Table 12-45 EVC Properties Window (continued) Field Description Network VLANs Tab Name VLAN name. ID VLAN identifier. EFD Name Name of the Ethernet flow domain. EFD System Name Name that Prime Network Vision assigns to the EFD. System Name VLAN system name. Description Brief description of the VLAN. Network Pseudowires Tab Name Pseudowire name.
Chapter 12 Monitoring Carrier Ethernet Services Viewing IP SLA Responder Service Properties Figure 12-72 IP SLA Responder in Logical Inventory Table 12-46 describes the properties displayed for IP SLA Responder service. Table 12-46 IP SLA Responder Properties in Logical Inventory Field Description IP SLA Responder Status Status of the IP SLA Responder: Up or Down. IP SLA TWAMP Responder Status of the IP SLA TWAMP responder: Up or Down.
Chapter 12 Monitoring Carrier Ethernet Services Viewing IS-IS Properties Viewing IS-IS Properties Intermediate System-to-Intermediate System (IS-IS) protocol is a routing protocol developed by the ISO. It is a link-state protocol where IS routers exchange routing information based on a single metric to determine network topology. It behaves in a manner similar to OSPF in the TCP/IP network. IS-IS networks contain end systems, intermediate systems, areas, and domains. End systems are user devices.
Chapter 12 Monitoring Carrier Ethernet Services Viewing IS-IS Properties Table 12-47 describes the information that is displayed in this window and the Processes table. Table 12-47 IS-IS Properties in Logical Inventory - Processes Table Field Description Version Version of IS-IS that is implemented. Processes Table Step 3 Process ID Identifier for the IS-IS process. System ID Identifier for this Intermediate System.
Chapter 12 Monitoring Carrier Ethernet Services Viewing IS-IS Properties Table 12-48 describes the information that is displayed for the selected IS-IS process. Table 12-48 IS-IS Process Properties in Logical Inventory Field Description Process Unique identifier for the IS-IS process. System ID Identifier for this Intermediate System. IS Type Level at which the Intermediate System process is running: Level 1, Level 2, or Level 1-2. Manual Area Address Address assigned to the area.
Chapter 12 Monitoring Carrier Ethernet Services Viewing OSPF Properties Viewing OSPF Properties Prime Network Vision supports the following versions of OSPF: • OSPFv1 • OSPFv2 • OSPFv3 Using Prime Network Vision you can view OSPF properties for: • OSPF processes, including the process identifier and OSPF version. • OSPF network interfaces, such as the area identifier, network type, and status. • OSPF neighbors, including the neighbor identifier, neighbor interface address, and status.
Chapter 12 Monitoring Carrier Ethernet Services Viewing OSPF Properties Table 12-49 OSPF Processes in Logical Inventory Field Description OSPF Process Details Process ID Unique process identifier. Router ID Router IP address. OSPF Version OSPF version: v1, v2, or v3. SPF Timers Schedule Delay Number of milliseconds to wait after a change before calculating the shortest path first (SPF). Min Hold Time Minimum number of milliseconds to wait between two consecutive SPF calculations.
Chapter 12 Monitoring Carrier Ethernet Services Configuring REP and mLACP Configuring REP and mLACP The following commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. For details on the software versions Prime Network supports for these network elements, see the Cisco Prime Network 4.0 Supported Cisco VNEs.
Chapter 12 Monitoring Carrier Ethernet Services Using Pseudowire Ping and Show Commands Using Pseudowire Ping and Show Commands The Ping Pseudowire and Display Pseudowire commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. Additional commands may be available for your devices.
Chapter 12 Monitoring Carrier Ethernet Services Configuring IS-IS Configuring IS-IS In order to enable IS-IS for IP on a Cisco router and have it exchange routing information with other IS-IS enabled routers, you must perform these two tasks: • Enable the IS-IS process and assign area • Enable IS-IS for IP routing on an interface You can configure the router to act as a Level 1 (intra-area) router, as Level 1-2 (both a Level 1 router and a Level 2 router), or as Level 2 (an inter-area router only).
Chapter 12 Monitoring Carrier Ethernet Services Configuring IS-IS Command Navigation Description Create ISIS Interface ISIS > System > right-click Process ID in content pane > Commands > Configuration > Modify ISIS Interface ISIS > expand System > select a Process > select Interfaces tab> right-click on a Interface Name > Commands > Configuration > Use these command to create or modify an IS-IS routing process and assign it to a specific interface, rather than to a network.
CH A P T E R 13 Monitoring Carrier Grade NAT Properties Carrier Grade NAT is a large-scale Network Address Translation (NAT) that provides translation of millions of private IPv4 addresses to public IPv4 addresses. These translations support subscribers and content providers with a bandwidth throughput of at least 10 Gbps full-duplex. Carrier Grade NAT addresses the IPv4 address completion problem.
Chapter 13 Monitoring Carrier Grade NAT Properties User Roles Required to View Carrier Grade NAT Properties User Roles Required to View Carrier Grade NAT Properties This topic identifies the roles that are required to view Carrier Grade NAT properties in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account.
Chapter 13 Monitoring Carrier Grade NAT Properties Viewing Carrier Grade NAT Properties in Logical Inventory The Carrier Grade NAT properties are displayed in logical inventory as shown in Figure 13-1. Figure 13-1 Carrier Grade NAT in Logical Inventory Table 13-3 describes the Carrier Grade NAT properties that are displayed. Table 13-3 Carrier Grade NAT Properties in Logical Inventory Field Description CGN Name Name of the Carrier Grade NAT service.
Chapter 13 Monitoring Carrier Grade NAT Properties Viewing Carrier Grade NAT Properties in Logical Inventory Table 13-3 Carrier Grade NAT Properties in Logical Inventory (continued) Field Description Address Pools Tab Inside VRF Hyperlinked entry to the inside VRF in logical inventory. For more information about VRF properties in logical inventory, see Viewing VRF Properties, page 18-27. Address Family Type of IP address in this pool: IPv4 or IPv6.
Chapter 13 Monitoring Carrier Grade NAT Properties Viewing Carrier Grade NAT Properties in Physical Inventory You can also display pool utilization by right-clicking a VNE and choosing Commands > Show > Pool Utilization. Table 13-4 Carrier Grade NAT Statistics in Logical Inventory Statistic Name Description Inside to outside drops port limit Number of packets dropped because the port limit has been exceeded exceeded.
Chapter 13 Monitoring Carrier Grade NAT Properties Configuring CG NAT Service Figure 13-2 Carrier Grade NAT Properties in Physical Inventory The field CGN Service is displayed, and the entry is hyperlinked to the associated Carrier Grade NAT service in logical inventory. Configuring CG NAT Service The following commands can be launched from the inventory by right-clicking the appropriate node and selecting Commands. The table below lists the configuration commands and the supported network elements.
Chapter 13 Monitoring Carrier Grade NAT Properties Configuring CG NAT Service Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
Chapter 13 Monitoring Carrier Grade NAT Properties Configuring CG NAT Service Cisco Prime Network 4.
CH A P T E R 14 Monitoring DWDM Properties The Cisco IP over dense wavelength division multiplexing (IPoDWDM) solution enables the convergence of the IP and DWDM core networks of the service providers. It increases service flexibility, operational efficiency and reliability while lowering operating expenses (OpEx) and capital expenditures (CapEx). Cisco Prime Network discovers and displays the following DWDM attributes in the Physical Inventory tree of the Cisco Prime Network Vision: • DWDM controllers.
Chapter 14 Monitoring DWDM Properties User Roles Required to View DWDM Properties • For element-based tasks (tasks that do affect elements), authorization is based on the default permission that is assigned to your account. That is, whether the element is in one of your assigned scopes and whether you meet the minimum security level for that scope. For more information on user authorization, see the Cisco Prime Network 4.0 Administrator Guide.
Chapter 14 Monitoring DWDM Properties Viewing DWDM in Physical Inventory Viewing DWDM in Physical Inventory Prime Network Vision enables you to monitor a variety of DWDM properties in physical inventory, including forward error correction (FEC), G.709 status, and performance monitoring parameters. To view DWDM properties in physical inventory: Step 1 In a Prime Network Vision map, double-click the device on which DWDM is configured.
Chapter 14 Monitoring DWDM Properties Viewing DWDM in Physical Inventory Table 14-3 describes the information displayed for DWDM. Table 14-3 DWDM Properties in Physical Inventory Field Description Location Physical interface using the format rack/slot/module/port where: • rack is the chassis number of the rack. • slot is the physical slot number of the line card. • module is the module number. A physical layer interface module (PLIM) is always 0.
Chapter 14 Monitoring DWDM Properties Viewing G.709 Properties Table 14-3 DWDM Properties in Physical Inventory (continued) Field Description PM 15-min Settings Click to view 15-minute performance monitoring properties. For more information, see Viewing Performance Monitoring Configuration, page 14-11. PM 24-hour Settings Click to view 24-hour performance monitoring properties. For more information, see Viewing Performance Monitoring Configuration, page 14-11. Viewing G.
Chapter 14 Monitoring DWDM Properties Viewing G.709 Properties Figure 14-2 DWDM G709 Properties Window Figure 14-3 shows the tabs that are displayed in the G709 Info Properties window for Cisco 7600 series devices. For Cisco 7600 series devices: • The ODU Alert Counters tab is displayed. • The ODU TTI and OTU TTI tabs are not displayed. Cisco Prime Network 4.
Chapter 14 Monitoring DWDM Properties Viewing G.709 Properties Figure 14-3 DWDM G709 Properties Window for Cisco 7600 Series Devices Table 14-4 describes the fields that are displayed above the tabs in the G709 Info Properties window. Table 14-4 DWDM G709 Properties Window Field Description Location Physical interface using the format rack/slot/module/port where: • rack is the chassis number of the rack. • slot is the physical slot number of the line card. • module is the module number.
Chapter 14 Monitoring DWDM Properties Viewing G.709 Properties Table 14-4 DWDM G709 Properties Window (continued) Field Description OTU Alarms OTU Alarm Reporting Enabled for The types of alarms enabled for reporting: • AIS—Alarm indication signal (AIS) alarms. • BDI—Backward defect indication (BDI) alarms. • BEI—Backward error indication (BEI) alarms. • BIP—Bit interleaved parity (BIP) alarms. • FECMISMATCH—FEC mismatch alarms. • IAE—Incoming alignment error (IAE) alarms.
Chapter 14 Monitoring DWDM Properties Viewing G.709 Properties Table 14-4 DWDM G709 Properties Window (continued) Field Description OTU Alerts OTU Alert Reporting Enabled for The types of alerts enabled for reporting: • SD-BER—Section Monitoring (SM) bit error rate (BER) is in excess of the signal degradation (SD) BER threshold. • SF-BER—SM BER is in excess of the signal failure (SF) BER threshold. • PM-TCA—Performance monitoring (PM) threshold crossing alert (TCA).
Chapter 14 Monitoring DWDM Properties Viewing G.709 Properties Table 14-5 G709 Properties Window Tabs (continued) Field Description OTU Alert Counters Tab Type Type of OTU alert, such as SD-BER or SF-BER. Threshold Threshold set for the type of alert. Counter Number of alerts reported for each alert type. A value of -1 indicates that no value has been set up. ODU Alarm Counters Tab Type Type of ODU alarm, such as AIS or BDI. Counter Number of alarms reported for each alarm type.
Chapter 14 Monitoring DWDM Properties Viewing Performance Monitoring Configuration Table 14-5 G709 Properties Window Tabs (continued) Field Description ODU Alert Counters Tab This tab is displayed only for Cisco 7600 series devices. Step 5 Type Type of OTU alert, such as SD-BER or SF-BER. Threshold Threshold set for the type of alert. Counter Number of alerts reported for each alert type. A value of -1 indicates that no value has been set up.
Chapter 14 Monitoring DWDM Properties Viewing Performance Monitoring Configuration Figure 14-4 Client DWDM PM Settings Properties Window Table 14-6 describes the information displayed above the tabs in the Client DWDM PM Settings Properties window and in each of the tabs. Table 14-6 Client DWDM PM Settings Properties Window and Tabs Field Description Interval Type The performance monitoring interval, either 15 minutes or 24 hours.
Chapter 14 Monitoring DWDM Properties Viewing Performance Monitoring Configuration Table 14-6 Client DWDM PM Settings Properties Window and Tabs (continued) Field Description Optics PM Settings Tab Type Optics performance monitoring parameter being tracked: • LBC—Laser bias current. • OPR—Optical power on the unidirectional port. • OPT—Transmit optical power in dBm. Max Threshold Maximum threshold configured for the parameter.
Chapter 14 Monitoring DWDM Properties Viewing Performance Monitoring Configuration Table 14-6 Client DWDM PM Settings Properties Window and Tabs (continued) Field Description OTN PM Settings Tab Type OTN performance monitoring parameter being tracked: • bbe-pm-fe—Far-end path monitoring background block errors (BBE-PM). Indicates the number of background block errors recorded in the optical transport network (OTN) path during the performance monitoring time interval.
Chapter 14 Monitoring DWDM Properties Configuring and Viewing DWDM Table 14-6 Field Type (cont.) Client DWDM PM Settings Properties Window and Tabs (continued) Description • ses-pm-fe—Far-end path monitoring severely errored seconds (SES-PM). Indicates the severely errored seconds recorded in the OTN path during the performance monitoring time interval. • ses-pm-ne—Far-end path monitoring severely errored seconds (SES-PM). • ses-sm-fe—Far-end section monitoring severely errored seconds (SES-SM).
Chapter 14 Monitoring DWDM Properties Configuring and Viewing DWDM Additional commands may be available for your devices. New commands are often provided in Prime Network Device Packages, which can be downloaded from the Prime Network software download site. For more information on how to download and install DPs and enable new commands, see the information on “Adding Additional Device (VNE) support” in the Cisco Prime Network 4.0 Administrator Guide.
Chapter 14 Monitoring DWDM Properties Configuring and Viewing DWDM Command Navigation Input Required and Notes G.709 TTI Configure > Optical channel unit type: ODU or OTU TTI type: Expected or sent TTI string type: ASCII or hex TTI string Option: Set or reset TTI string G.709 Wrapper Option: Disable or enable G.
Chapter 14 Monitoring DWDM Properties Configuring and Viewing DWDM Command Navigation Input Required and Notes PM Optics Data Configure > PM interval: 15-min or 24-hour Optics alarm type: • lbc—Laser bias current • opr—Optical power on the unidirectional port • opt—Transmit optical power in dBm Maximum TCA option: Enable or disable Maximum threshold option: Choosing Set configures the value on the device; Reset is the default. If you select blank, the threshold value is not used.
CH A P T E R 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties The following topics describe how you can use Cisco Prime Network Vision (Prime Network Vision) to monitor Ethernet operations, administration, and maintenance (OAM) tools: • User Roles Required to View Ethernet OAM Tool Properties, page 15-1 • Ethernet OAM Overview, page 15-2 • Viewing Connectivity Fault Management Properties, page 15-3 • Viewing Ethernet LMI Properties, page 15-10 • Viewing Link OAM
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Ethernet OAM Overview Table 15-1 Default Permission/Security Level Required for Viewing Ethernet OAM Tool Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator View CFM properties — — — — X View Ethernet LMI properties — — — — X View Link OAM properties — — — — X Using CFM Configure and Enable Commands — — — X X Using E-LMI Configure —
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties • Ethernet Local Management Interface—Ethernet Local Management Interface (Ethernet LMI) operates between the customer edge (CE) and the user-facing provider edge (U-PE) devices. Ethernet LMI allows you to automatically provision CEs based on EVCs and bandwidth profiles. See Viewing Ethernet LMI Properties, page 15-10 and Configuring E-LMI, page 15-20.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties • Continuity check—Multicast heartbeat messages exchanged periodically among MEPs. They allow MEPs to discover other MEPs within a domain and allow maintenance intermediate points (MIPs) to discover MEPs. Continuity check messages (CCMs) are confined to a domain and S-VLAN.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 15-1 CFM in Logical Inventory Table 15-3 describes the information displayed for CFM. Table 15-3 CFM Properties Field Description Cache Size CFM traceroute cache size in number of lines. Hold Time Configured hold time (in minutes) that is used to indicate to the receiver the validity of traceroute and loopback messages transmitted by the device.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 15-2 CFM Maintenance Intermediate Points Tab Table 15-4 describes the information that is displayed in the Maintenance Intermediate Points table. Table 15-4 Step 4 CFM Maintenance Intermediate Point Properties Field Description Interface Interface configured as a MIP, hyperlinked to its entry in physical inventory.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 15-3 CFM Maintenance Domain Properties Table 15-5 describes the information that is displayed for CFM maintenance domains. Table 15-5 CFM Maintenance Domain Properties Field Description Maintenance Domain Name Name of the domain. Level Level at which the domain is managed: 0-7. ID Optional maintenance domain identifier.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Figure 15-4 shows the information displayed for the maintenance association endpoints. Figure 15-4 CFM Maintenance Association - Endpoint Properties Table 15-6 describes the information that is displayed for CFM maintenance associations and MIPs.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Connectivity Fault Management Properties Table 15-6 Step 6 CFM Maintenance Association Properties (continued) Field Description Interface Interface on which the MEP is configured, hyperlinked to the respective EFP, VSI or interface in inventory. Continuity Check Status CFM continuity check status: MEP Active, MEP Inactive, MEP Enabled, MEP Disabled, or Unknown.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Table 15-7 describes the information presented for remote MEPs. Table 15-7 CFM Remote Maintenance End Points Table Field Description MEP ID Remote MEP identifier. Level Level at which the remote MEP is managed: 0-7. Status Status of the remote MEP, such as MEP Active. MAC Address MAC address of the remote MEP. Local MEP ID Numeric identifier assigned to the local MEP.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Figure 15-6 Ethernet LMI in Logical Inventory Table 15-8 describes the information displayed for Ethernet LMI. Table 15-8 Ethernet LMI Properties in Logical Inventory Field Description Globally Enabled Whether or not Ethernet LMI is enabled globally: True or False. Mode Ethernet LMI mode: CE or PE. Device EVCs Tab EVC Name Name of the EVC.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Table 15-8 Ethernet LMI Properties in Logical Inventory (continued) Field Description ELMI Interfaces Tab Step 3 Interface Name Hyperlinked entry to the interface in physical inventory. For more information, see Step 4 in this procedure. T391 Frequency at which the customer equipment sends status inquiries. The range is 5-30 seconds, with a default of 10 seconds.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Ethernet LMI Properties Table 15-9 Device EVC Properties in Logical Inventory Field Description EVC Name Name of the EVC. EVC Type Type of EVC: Point-to-point or Multipoint. EVC Status EVC status: Active, Inactive, Not Defined, or Partially Active. Maintenance Association Hyperlinked entry to the maintenance association in CFM in logical inventory.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Viewing Link OAM Properties Link OAM is an optional sublayer implemented in the OSI Data Link Layer between the Logical Link Control and MAC sublayers. Link (802.3AH) OAM (L-OAM) can be implemented on any full-duplex point-to-point or emulated point-to-point Ethernet link.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Figure 15-8 shows an example of Link OAM properties in logical inventory. Figure 15-8 Link OAM Properties in Logical Inventory Table 15-11 describes the information displayed for Link OAM. Table 15-11 Link OAM Properties in Logical Inventory Field Description Table Types Type of table. In this case, it is OAM.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Step 3 To view detailed information about an entry in the table, double-click the required entry. The Link OAM Data Properties window is displayed as shown in Figure 15-9. Figure 15-9 Link OAM Data Properties Window Table 15-12 describes the information that is displayed in the Link OAM Data Properties window.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Viewing Link OAM Properties Table 15-12 Link OAM Data Properties Window (continued) Field Description Dying Gasp Action Action that occurs when an unrecoverable condition is encountered. Critical Event Action Action that occurs when an unspecified vendor-specific critical event occurs. Mode Mode of the interface: Active or Passive.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Configuring CFM Figure 15-10 Link OAM Administrative Status in Physical Inventory Configuring CFM CFM provides capabilities for detecting, verifying, and isolating connectivity failures in networks with bridges operated by multiple independent organizations, each with restricted management access to each other's equipment.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Configuring CFM Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Configuring E-LMI Command Description MEP > Configure CFM MEP Use this command to configure maintenance endpoints (MEPs), which have the following characteristics: • Per-maintenance domain (level) and service (S-VLAN or EVC) • At the edge of a domain, define the boundary • Within the bounds of a maintenance domain, confine CFM messages • When configured to do so, proactively transmit CFM continuity check
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Configuring L-OAM Command Description Enable > Global E-LMI Enable Ethernet LMI globally. Note Not supported on Cisco IOS XR. Enable On Interface If E-LMI is disabled globally, you can use this command to enable E-LMI on specific interfaces. Configure MultiPoint To MultiPoint or Point To Point EVC UNI count indicates the range of the Unified network interface(UNI) is 2 to 1024; the default is 2.
Chapter 15 Monitoring Ethernet Operations, Administration, and Maintenance Tool Properties Configuring L-OAM Command Description Enable E-LMI On Interface Interface name (if E-LMI is disabled globally, you can use this command to enable E-LMI on specific interfaces) Configure OAM Parameter on Interface Configure OAM parameters, like maximum and minimum transmission rate of OAM PDU , OAM client mode and remote loopback ability on an interface.
CH A P T E R 16 Monitoring Y.1731 IPSLA Configuration The following topics provide an overview of the Y.1731 technology and describe how to view and monitor Y.1731 configurations in Prime Network Vision: • Y.1731 Technology: Overview, page 16-1 • User Roles Required to Work with Y.1731 Probes, page 16-2 • Working with Y.1731 IPSLA Configurations, page 16-2 Y.1731 Technology: Overview Y.
Chapter 16 Monitoring Y.1731 IPSLA Configuration User Roles Required to Work with Y.1731 Probes User Roles Required to Work with Y.1731 Probes This topic identifies the roles that are required to work with Y.1731 probes. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account.
Chapter 16 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Figure 16-1 Y.1731 Probes Content Pane Table 16-2 describes the fields that are displayed in the content pane. Table 16-2 Y.1731 Content Pane Field Name Description Profile Name The name of the profile created for performance monitoring of the SLA configuration. Source MEP The maintenance endpoint (MEP) interface ID where the probe is getting initiated.
Chapter 16 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Step 3 Right-click on a probe and choose Properties to view its properties. Additionally, the following information is displayed in the Probe Properties window for a Cisco CPT device. Table 16-3 describes the additional fields that are displayed for a Cisco CPT device in the Probe Properties window.
Chapter 16 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Command Navigation Description Configure Probe EndPoint Association Right-click Y1731 Probes Use this command to configure endpoint node > Commands > Confi association for a probe. guration Configure Profile Use this command to configure a new profile for the probe. Create On Demand Probe Configuration Use this command to create an on demand probe configuration.
Chapter 16 Monitoring Y.1731 IPSLA Configuration Working with Y.1731 IPSLA Configurations Cisco Prime Network 4.
CH A P T E R 17 IPv6 and IPv6 VPN over MPLS Cisco Prime Network (Prime Network) supports IPv6 for: • Gateways, clients, and units using IPv6. • Communications between VNEs and devices in IPv6 environments, whether the device management IP address is IPv4 or IPv6.
Chapter 17 IPv6 and IPv6 VPN over MPLS User Roles Required to Work with IPv6 and 6VPE User Roles Required to Work with IPv6 and 6VPE This topic identifies the roles that are required to work with IPv6 and 6VPE in Prime Network Vision. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account.
Chapter 17 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information Table 17-3 describes where IPv6 information appears in logical and physical inventory. Table 17-3 IPv6 Information in Inventory Inventory Location Description Logical Inventory 6rd Tunnels The Tunnel Edges table displays IPv6 addresses and the IPv6 prefixes that are used to translate IPv4 addresses to IPv6 addresses. For more information, see Viewing 6rd Tunnel Properties, page 18-46.
Chapter 17 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information Table 17-3 IPv6 Information in Inventory (continued) Inventory Location Description Physical Inventory Port IPv6 addresses appear in the Subinterfaces tab and interface properties popup window. The IP addresses that appear depend on whether the interface has only IPv4 addresses, only IPv6 addresses, or both IPv4 and IPv6 addresses, as shown in Table 17-4.
Chapter 17 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information Figure 17-1 Port with IPv4 and IPv6 Addresses Figure 17-2 shows a port with only IPv6 addresses provisioned. In this example, the lowest IPv6 address is shown in the subinterface table, and all IPv6 addresses are shown in the interface properties window. Cisco Prime Network 4.
Chapter 17 IPv6 and IPv6 VPN over MPLS Viewing IPv6 Information Figure 17-2 Port with IPv6 Addresses Cisco Prime Network 4.
CH A P T E R 18 Monitoring MPLS Services The following topics describe how to view and manage aspects of Multiprotocol Label Switching (MPLS) services using Cisco Prime Network Vision (Prime Network Vision), including the MPLS service view, business configuration, and maps. The topics also describe the device inventory specific to MPLS VPNs, including routing entities, label switched entities (LSEs), BGP neighbors, Multiprotocol BGP (MP-BGP), VRF instances, pseudowires, and TE tunnels.
Chapter 18 Monitoring MPLS Services User Roles Required to Work with MPLS Networks For more information on user authorization, see the Cisco Prime Network 4.0 Administrator Guide. The following tables identify the tasks that you can perform: • Table 18-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 18-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes.
Chapter 18 Monitoring MPLS Services User Roles Required to Work with MPLS Networks Table 18-1 Default Permission/Security Level Required for Working with MPLS Networks Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator Display or hide VPN overlays X X X X X Remove VPN overlays X X X X X Table 18-2 Default Permission/Security Level Required for Working with MPLS Networks Element in User’s Scope Task Viewer Operator OperatorPlus Configurat
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Table 18-2 Default Permission/Security Level Required for Working with MPLS Networks Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator View port configurations X X X X X View pseudowire end-to-end emulation tunnels X X X X X Working with MPLS-TP Tunnels MPLS-Transport Profile (MPLS-TP) is considered to be the next generation transport for those using SONET/SDH TDM technologies a
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Adding an MPLS-TP Tunnel Prime Network Vision automatically discovers MPLS-TP tunnels, endpoints, and midpoints and enables you to add MPLP-TP tunnels to maps. To add an MPLS-TP tunnel to a map: Step 1 In Prime Network Vision, display the map to which you want to add the MPLS-TP tunnel. Step 2 Do either of the following: • From the File menu, choose Add to Map > MPLS-TP Tunnel.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 18-1 MPLS-TP Tunnel in Prime Network Vision Map If an LSP is in lockout state, it is displayed with the lock badge ( ).
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels For more information about LSP redundancy service, see Viewing LSP Endpoint Redundancy Service Properties, page 18-14. Viewing MPLS-TP Tunnel Properties Prime Network Vision discovers and displays MPLS-TP attributes in the MPLS-TP branch in logical inventory as described in this topic. Additional information about MPLS-TP tunnel properties are available in the following branches: • Routing Entities—See Viewing Routing Entities, page 18-31.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Table 18-3 MPLS-TP Tunnel Properties in Logical Inventory Field Description Global ID Globally unique Attachment Interface Identifier (AII) for MPLS-TP derived from the Autonomous System Number (ASN) of the system hosting the PEs. Router ID MPLS-TP source node identifier for this element in the form of an IPv4 address.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Table 18-3 MPLS-TP Tunnel Properties in Logical Inventory (continued) Field Description LSP Mid Points Tab LSP ID Step 3 LSP identifier, derived from both endpoint identifiers and using the format src-node-ID::src-tunnel-number::dest-node-ID::dest-tunnel-number where: • src-node-ID represents the identifier of the node originating the signal exchange. • src-tunnel-number represents source tunnel identifier.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 18-4 MPLS-TP Tunnel Properties Window Table 18-4 describes the information available in the top portion of the MPLS-TP Tunnel Properties window. For information about the tabs that are displayed, see Table 18-3. Table 18-4 MPLS-TP Tunnel Properties Window Field Description Tunnel ID Unique tunnel identifier. Peer Tunnel ID Unique identifier of peer tunnel. Bandwidth (kbps) Configured bandwidth (in Kb/s) for the tunnel.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Table 18-4 MPLS-TP Tunnel Properties Window (continued) Field Description Protect LSP Number Number assigned to the protected LSP. By default, the working LSP number is 0 and the protected LSP number is 1. BFD Template BFD template associated with this MPLS-TP tunnel. Working LSP BFD State Configured state of the working LSP BFD template: Up or Down.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 18-5 Step 3 Link Properties Window with All Labels Button Click Labels. The All Labels window is displayed as shown in Figure 18-6 with the LSP sources and destinations. Cisco Prime Network 4.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 18-6 Step 4 All Labels Table To identify a specific path, click an outgoing label in the Source table. The corresponding in label is selected in the Destination table. Viewing MPLS-TE and P2MP-MPLS-TE links in a map Using the link filter available in Prime Network, you can view only the MPLS-TE and P2MP-MPLS-TE links in a map.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Step 6 In the Link Properties window, the type of link is displayed in the Link Type field, which can be either MPLS-TE and P2MP MPLS-TE based on the link that you have selected. Additional details about the link such as the MPLS TE tunnel, operational status of the tunnel, TE tunnel type are displayed in the Label Switching section.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 18-8 LSP Endpoint Properties Window Table 18-5 describes the information displayed in the LSP Endpoint Properties window. Table 18-5 LSP Endpoint Properties Window Field Description LSP Type Indicates whether the LSP is active (Working) or backup (Protected).
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels Figure 18-9 LSP End Points Tab in Logical Inventory Applying an MPLS-TP Tunnel Overlay You can select and display an overlay of a specific MPLS-TP tunnel on top of the devices displayed in a map view. The overlay is a snapshot of the network that visualizes the flows between the sites and tunnel peers.
Chapter 18 Monitoring MPLS Services Working with MPLS-TP Tunnels The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” Prime Network Vision displays MPLS-TP tunnels that have “net” in their names whether net appears at the beginning of the name, the middle, or at the end: for example, Ethernet. • Step 4 Choose Show All to display all MPLS-TP tunnels. Select the MPLS-TP tunnel overlay you want to apply to the map.
Chapter 18 Monitoring MPLS Services Viewing VPNs Viewing VPNs Figure 18-11 shows a VPN displayed in the Prime Network Vision map view. In this example, the VPN is selected in the navigation pane, so the VPN details, such as virtual routers and IP interfaces, are not shown in the map view. Figure 18-11 VPN in Prime Network Vision Map View 1 VPN in the navigation tree 4 VPN in the map view 2 Sites 5 VPN links 3 Virtual routers Cisco Prime Network 4.
Chapter 18 Monitoring MPLS Services Viewing VPNs Figure 18-12 shows a VPN with details, including virtual routers and sites, in the Prime Network Vision map view. Figure 18-12 VPN in Prime Network Vision Map View with VRFs and Sites 1 Virtual routers 2 Sites The Prime Network Vision navigation pane displays the VPN business elements in a tree-and-branch representation. Each business element is represented by an icon in a color that reflects the highest alarm severity.
Chapter 18 Monitoring MPLS Services Viewing VPNs Table 18-6 shows the VPN icons in the Prime Network Vision map view. Table 18-6 Icon VPN Icons in Prime Network Vision Map View Description Root (map name) or aggregation VPN Virtual router Site The highest level of the navigation pane displays the root or map name. The branches display the VPN and aggregated business elements as well as their names.
Chapter 18 Monitoring MPLS Services Managing VPNs Table 18-7 Displaying Additional VPN Properties (continued) Object Option For Additional Information Site Double-click a site to view the IP Interface Properties window Viewing Site Properties, page 18-27 Link Double-click a link to view the link properties window. The properties that are depend on the link type.
Chapter 18 Monitoring MPLS Services Managing VPNs For more information about loading the newly created VPN in the service view map, see Adding a VPN to a Map, page 18-22. Adding a VPN to a Map You can add a VPN to a map view if the VPN was previously created by a user or discovered by Prime Network Vision and are not currently displayed in the map. Note Adding a VPN affects other users if they are working with the same map.
Chapter 18 Monitoring MPLS Services Managing VPNs Removing a VPN from a Map You can remove one or more VPNs from the current active map. This change does not affect other maps. Removing a VPN from a map does not remove it from the Prime Network Vision database. The VPN will appear in the Add VPN dialog box, so you can add it back to the map at any time. When removing VPNs from maps, keep the following in mind: • Removing a VPN affects other users if they are working with the same map view.
Chapter 18 Monitoring MPLS Services Working with VPN Overlays Working with VPN Overlays The following topics describe: • Applying VPN Overlays, page 18-24 • Managing a VPN Overlay Display in the Map View, page 18-25 • Displaying VPN Callouts in a VPN Overlay, page 18-25 Applying VPN Overlays You can select and display an overlay of a specific VPN on top of the devices displayed in a map view. The overlay is a snapshot of the network that visualizes the flows between the sites and tunnel peers.
Chapter 18 Monitoring MPLS Services Working with VPN Overlays Managing a VPN Overlay Display in the Map View After a VPN overlay is applied to a map, you can manage its display by using the overlay tools in the main toolbar: • To display the overlay, click Show Overlay on the main toolbar. • To hide an active overlay, click Hide Overlay on the main toolbar. Note • The Show Overlay button is a toggle. When clicked, the overlay is displayed. When clicked again, the overlay is hidden.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services To display or hide the callouts: Step 1 In the Prime Network Vision window, display the map view with the VPN overlay. Step 2 Right-click the required link in the map view and choose Show Callouts. Step 3 To hide the callouts, right-click the link in the map view that is displaying the callouts and choose Hide Callouts.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Viewing Site Properties Prime Network Vision enables you to view site properties, including the interfaces that are configured on the PE device. The displayed properties reflect the configuration that Prime Network Vision automatically discovered for the device. To view site properties, in the Prime Network Vision navigation pane or map view, right-click the required site and choose Properties.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services The VRF properties window is displayed as shown in Figure 18-14. Figure 18-14 VRF Properties The VRF Properties window contains the VRF routing table for the device. The table is a collection of routes that are available or reachable to all the destinations or networks in the VRF. The forwarding table also contains MPLS encapsulation information. Table 18-9 describes the information displayed in the VRF Properties window.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-9 VRF Properties (continued) Field Description IPv6 Tab Export Route Targets IPv6 export route targets contained by the VRF. Import Route Targets IPv6 import route targets contained by the VRF. Route Maps Route maps for the VRF. Routing Tables Destination Destination of the specific network. Prefix Length Length of the network prefix in bits. Next Hop Next routing hop.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-9 VRF Properties (continued) Field Description Rate Limits If a rate limit is configured on an IP interface, the limit is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface, meaning the access list is a rate limit access list. IP interface traffic is measured and includes the average rate, normal burst size, excess burst size, conform action, and exceed action.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Viewing VRF Egress and Ingress Adjacents Prime Network Vision enables you to view the exporting and importing neighbors by displaying the VRF egress and ingress adjacents. In addition, you can view the connectivity between the VRFs for the route targets and view their properties. For example, if VRF A retrieved route target import X, you can view all VRFs that export X as a route target whether it is in the same or another VPN.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Figure 18-15 Routing Entity Table Table 18-12 describes the information that is displayed in the Routing Entity table. Table 18-12 Routing Entity Table Field Description Name Name of the routing entity. IP Interfaces Tab Name Site name. IP Address IP address of the interface. Mask Network mask. State State of the subinterface: Up or Down.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-12 Routing Entity Table (continued) Field Description VRRP Group If a VRRP group is configured on an IP interface, the information is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface. Note Double-clicking a row displays the properties of the IP interface.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Viewing the ARP Table To view the ARP table: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP. Table 18-13 describes the information that is displayed in the ARP table. Table 18-13 ARP Table Field Description MAC Interface MAC address. Interface Interface name.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services To view the NDP table: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP Entity. Step 3 Click the NDP Table tab. Figure 18-16 shows an example of the NDP Table tab. Figure 18-16 NDP Table in Logical Inventory Table 18-14 describes the information displayed for NDP. Cisco Prime Network 4.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-14 NDP Table Field Description MAC Interface MAC address. Interface Interface name. IP Address Interface IPv6 address. Type Entry type: • ICMP (Incomplete)—Address resolution is being performed on the entry. A neighbor solicitation (NS) message has been sent to the solicited-node multicast address of the target, but the corresponding neighbor advertisement (NA) message has not yet been received.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-15 describes the information that is displayed in the Rate Limits tab of the IP Interface Properties dialog box. Table 18-15 Rate Limits Information Field Description Type Rate limit direction, either Input or Output. Max Burst Excess burst size in bytes. Normal Burst Normal burst size in bytes. Bit Per Second Average rate in bits per second.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Figure 18-17 VRRP Properties in IP Interface Properties Window Table 18-16 describes the information in the VRRP Groups tab. Table 18-16 VRRP Group Properties Field Description Group Number Number of the VRRP group associated with the interface. Priority Value that determines the role each VRRP router plays and what happens if the master virtual router fails.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Viewing Label Switched Entity Properties Logical inventory can display any or all of the following tabs for label switched entities, depending on the configuration: • Label Switching Table—Describes the MPLS label switching entries used for traversing MPLS core networks. • LDP Neighbors—Details all MPLS interface peers that use the Label Distribution Protocol (LDP).
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-17 Label Switching Properties in Logical Inventory (continued) Field Description MPLS TE Properties Whether or not traffic engineering (TE) properties are configured on the interface: Discovery Protocols • Checked—MPLS TE properties are configured on the interface. • Unchecked—MPLS TE properties are not configured on the interface. Discovery protocols used on the interface.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-17 Label Switching Properties in Logical Inventory (continued) Field Description Out Label Outgoing label, if not a tail segment. Average Bandwidth (Kbps) Current bandwidth (in Kb/s) used to automatically allocate the tunnel’s bandwidth. LSP ID LSP identifier. Burst (Kbps) Tunnel bandwidth burst rate, in Kb/s. Peak (Kbps) Tunnel bandwidth peak rate, in Kb/s.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Step 3 Double-click an entry in any of the tables to view additional properties for that entry. Table 18-18 Additional Properties Available from Label Switching in Logical Inventory Double-click an entry in this tab... To display this window...
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-19 MLDP Database Properties Dialog Box Field Description LSM ID The unique ID assigned to a LSP. Tunnel Type The tunnel type. FEC Root The root IP address of the MDT. Opaque Value The stream information that uniquely identifies the tree to the root.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-20 Peer ID Properties Dialog Box Field Description Peer ID The IP address of the MLDP peer. Capabilities The capabilities supported by the LDP LSR. MLDP GR Indicates whether graceful restart is enabled for the LDP. Note LDP graceful restart provides a control plane mechanism to ensure high availability and allows detection and recovery from failure conditions while preserving Non Stop Forwarding (NSF) services.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Viewing MP-BGP Information The MP-BGP branch displays information about a router’s BGP neighbors and cross-connect VRFs. Note If there are multiple MP-BGP links between two devices, Prime Network displays each link in the content pane map view. To view MP-BGP information: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Viewing 6rd Tunnel Properties IPv6 rapid deployment (6rd) is a mechanism that allows stateless tunneling of IPv6 over IPv4. From Prime Network Vision 3.8, 6rd is supported on the following devices: • Cisco 7600 series devices • Cisco ASR 1000 series devices To view 6rd tunnel properties: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Logical Inventory > 6rd Tunnels.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-22 6rd Tunnel Properties in Logical Inventory Field Description Tunnel Name 6rd tunnel name. IPv6 Prefix IPv6 prefix used to translate the IPv4 address to an IPv6 address. Source Address Tunnel IPv4 source IP address. Tunnel SubMode Tunnel type: • 6rd—Static IPv6 interface. • 6to4—IPv6 address with the prefix embedding the tunnel source IPv4 address. • Auto-tunnel—IPv4-compatible IPv6 tunnel.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Figure 18-19 BFD Session Properties Table 18-23 describes the information displayed for BFD sessions. Table 18-23 BFD Session Properties Field Description Process Process name, such as Bidirectional Forwarding Detection. Process State Process state, such as Running. BFD Sessions Table Source IP Source IP address of the session. Destination IP Destination IP address of the session. State Session state, such as Up or Down.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services For MPLS-TP BFD sessions, the information in Table 18-24 is displayed. Table 18-24 MPLS-TP BFD Session Properties in Logical Inventory Field Description Process Process name: Bidirectional Forwarding Detection. Process State Process state, such as Running. MPLS-TP BFD Sessions Table Interface Interface used for BFD communications, hyperlinked to the routing entity in logical inventory. LSP Type Type of LSP: Working or Protected.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Step 2 In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP. Step 3 Click the Cross VRFs tab. Step 4 Double-click the required entry in the list of cross-VRFs. The Cross VRF Properties window is displayed, containing the information described in Table 18-26. Table 18-26 Cross-VRF Properties Window Field Description Name Cross-VRF name.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Table 18-27 Pseudowires Branch Tunnel Edges Table Field Description Local Interface Name of the subinterface or port. Strings, such as Aggregation Group, EFP, VLAN, and VSI, are included in the interface name, and the entry is hyperlinked to the relevant entry in logical or physical inventory: • Aggregation groups are linked to Ethernet Link Aggregation in logical inventory.
Chapter 18 Monitoring MPLS Services Monitoring MPLS Services Viewing MPLS TE Tunnel Information Prime Network Vision automatically discovers MPLS TE tunnels and enables you to view MPLS TE tunnel information in inventory. To view MPLS TE tunnel information: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Traffic Engineering Tunnels.
Chapter 18 Monitoring MPLS Services Configuring VRF Table 18-28 Tunnel Edges Table (continued) Field Description Burst (Kbps) Burst flow specification (in Kb/s) for this tunnel. Peak Rate (Kbps) Peak flow specification (in Kb/s) for this tunnel. LSP ID LSP identifier. Policy Class Value of Policy Based Tunnel Selection (PBTS) configured. Values range from 1-7. FRR TE Fast Reroute (FRR) status: Enabled or Disabled.
Chapter 18 Monitoring MPLS Services Configuring IP Interface Configuring IP Interface Unless otherwise noted, all of the following commands are launched by right-clicking the Routing Entities and choosing Commands > Configuration. The table below lists the IP Interface commands. Additional commands may be available for your devices. New commands are often provided in Prime Network Device Packages, which can be downloaded from the Prime Network software download site.
Chapter 18 Monitoring MPLS Services Configuring MPLS-TP Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
Chapter 18 Monitoring MPLS Services Configuring MPLS-TP Locking/Unlocking MPLS-TP Tunnels in Bulk An MPLS-TP network has one or multiple LSPs running between endpoint devices. If you want to shutdown one of the interfaces in the network, the MPLS-TP packet must be diverted through an alternative LSP. This can be achieved by locking the interface. The MPLS-TP bulk lockout/unlock option in Prime Network allows you to lock or unlock multiple MPLS-TP tunnels on different VNEs at the same time.
Chapter 18 Monitoring MPLS Services Configuring MPLS-TE Configuring MPLS-TE Use these commands to configures MPLS-TE on the router. The table below lists the MPLS-TE configuration commands and the MPLS-TE supported network elements. Additional commands may be available for your devices. New commands are often provided in Prime Network Device Packages, which can be downloaded from the Prime Network software download site.
Chapter 18 Monitoring MPLS Services Configuring RSVP Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
Chapter 18 Monitoring MPLS Services Configuring BGP Command Navigation Description1 Configure RSVP LSEs > right-click Label Switching > Commands > Configuration > Configure RSVP on a device or an interface. Delete RSVP Enable RSVP On Interface Disable RSVP On Interface Routing Entities > Routing Entity> IP Interfaces tab, right-click the required interface > Commands > Configuration 1.
Chapter 18 Monitoring MPLS Services Configuring VRRP Command Navigation Description1 Create BGP Router MPBGPs > right-click MPBGP > Commands > Configuration > Configures BGP routing and establish a BGP routing process with AS number and Router ID Modify BGP Router Delete BGP Router Enter various address family configuration modes that uses IPv4, IPv6, L2VPN, VPNV4 or VPNV6 address prefixes.
Chapter 18 Monitoring MPLS Services Configuring Bundle Ethernet Command Navigation Description1 Create VRRP Group Routing Entities > Routing Entity> IP Interfaces tab, right-click the required interface > Commands > Configuration Configure a group of routers to form a single virtual router.
Chapter 18 Monitoring MPLS Services Configuring Bundle Ethernet Cisco Prime Network 4.
CH A P T E R 19 Viewing IP and MPLS Multicast Configurations These topics provide an overview of the IP Multicast technology and describe how to view IP and multicast configurations in Prime Network Vision: • IP and MPLS Multicast Configuration: Overview, page 19-1 • User Roles Required to View IP and Multicast Configurations, page 19-2 • Viewing the Multicast Configurations, page 19-2 IP and MPLS Multicast Configuration: Overview IP Multicast is a bandwidth-conserving technology that reduces traffi
Chapter 19 Viewing IP and MPLS Multicast Configurations User Roles Required to View IP and Multicast Configurations User Roles Required to View IP and Multicast Configurations This topic identifies the roles that are required to work with IP and Multicast Support. Prime Network determines whether you are authorized to perform a task as follows: • For GUI-based tasks (tasks that do not affect elements), authorization is based on the default permission that is assigned to your user account.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Figure 19-1 Multicast Content Pane Table 19-2 describes the fields that are displayed in the Route Policies tab. Table 19-2 Route Policies Tab Field Name Description Name The name of the multicast route policy. Core Tree Type The type of the Multicast Distribution Tree (MDT) core tree configured in the route policy.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Viewing Multicast Protocols The following Multicast protocols are available in Prime Network: • Address Family (IPv4)—See Viewing the Address Family (IPv4) Profile, page 19-4. • Address Family (IPv6)—See Viewing the Address Family (IPv6) Profile, page 19-5. • IGMP—Viewing the IGMP profile, page 19-5. • PIM—Viewing the PIM Profile, page 19-7.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Viewing the Address Family (IPv6) Profile To view the Address Family (IPv6) profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Multicast > Address Family (IPV6). The profile details are displayed in the content pane. Table 19-4 describes the fields that are displayed in the Address Family (IPV6) profile.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations There are three versions of IGMP: • IGMP Version 1 • IGMP Version 2 • IGMP Version 3 To view the IGMP profile: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Multicast > IGMP. The IGMP details are displayed in the content pane. You can click on the tabs to view more details.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Table 19-5 IGMP Profile Details (continued) Field Name Description Group Ranges Tab Group Range The multicast group range in CDIR format, which is basically the Multicast Group IP address followed by the CDIR prefix. Protocol The PIM protocol that is used by the IGMP group range.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Table 19-6 PIM Profile Details (continued) Field Name Description IP Address The IP address of the interface. VRF The name of the VRF associated to the interface. This is a link, which when clicked will take you to the relevant record under the VRF node. PIM Status Indicates whether the PIM is enabled (ON) or disabled (OFF) on the interface.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Table 19-6 PIM Profile Details (continued) Field Name Description Topology Tab Source Address The IP address of the source of the multicast entry. In case the IP address is not available, a “*” or 0.0.0.0 is displayed here. Group Address The multicast group address or prefix for which the entry is associated with.
Chapter 19 Viewing IP and MPLS Multicast Configurations Viewing the Multicast Configurations Multicast Label Switching Prime Network provides multicast support for MPLS services. For more information on multicast label switching, see Multicast Label Switching (mLADP), page 18-42. Multicast Routing Entities Prime Network provides multicast support for routing entities.
CH A P T E R 20 Monitoring MToP Services The following topics describe Mobile Transport over Packet (MToP) services and the properties available in Cisco Prime Network Vision (Prime Network Vision): • User Roles Required to Work with MToP, page 20-1 • Viewing SAToP Pseudowire Type in Logical Inventory, page 20-2 • Viewing CESoPSN Pseudowire Type in Logical Inventory, page 20-3 • Viewing Virtual Connection Properties, page 20-5 • Viewing IMA Group Properties, page 20-13 • Viewing TDM Properties,
Chapter 20 Monitoring MToP Services Viewing SAToP Pseudowire Type in Logical Inventory The following tables identify the tasks that you can perform: • Table 20-1 identifies the tasks that you can perform if a selected element is not in one of your assigned scopes. • Table 20-2 identifies the tasks that you can perform if a selected element is in one of your assigned scopes. By default, users with the Administrator role have access to all managed elements.
Chapter 20 Monitoring MToP Services Viewing CESoPSN Pseudowire Type in Logical Inventory Figure 20-1 Step 4 SAToP Pseudowire Type in Logical Inventory To view the physical inventory for the port, click the hypertext port link. Viewing CESoPSN Pseudowire Type in Logical Inventory Circuit Emulation Services over PSN (CESoPSN) is a method for encapsulating structured (NxDS0) TDM signals as pseudowires over packet-switching networks, complementary to SAToP.
Chapter 20 Monitoring MToP Services Viewing CESoPSN Pseudowire Type in Logical Inventory To view TDM properties for Circuit Emulation (CEM) groups in Prime Network Vision: Step 1 In Prime Network Vision, right-click the device on which CESoPSN is configured, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Pseudowires. Step 3 In the Tunnel Edges table, select the required entry and scroll horizontally until you see the Pseudowire Type column. See Figure 20-2.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties Viewing Virtual Connection Properties The following topics describe how to view properties related to virtual connections: • Viewing ATM Virtual Connection Cross-Connects, page 20-6 • Viewing ATM VPI and VCI Properties, page 20-10 • Viewing Encapsulation Information, page 20-11 Buttons for viewing these properties are available at the top of the physical inventory window for the selected interface, as shown in Figure 20-3.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties 1 Poll Now button 2 Show VC Table button Displays virtual circuit (VC) information for the selected port.. For more information, see Viewing ATM VPI and VCI Properties, page 20-10. 3 Show Cross Connect button Displays cross-connect information for incoming and outgoing ports. For more information, see Viewing ATM Virtual Connection Cross-Connects, page 20-6.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties To view ATM virtual connection cross-connects: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 Open the VC Cross Connect table in either of the following ways: • In the inventory window, choose Logical Inventory > VC Switching Entities > VC Switching Entity. The Cross-Connect Table is displayed in the content pane as shown in Figure 20-4. • In the inventory window: a.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties Table 20-3 ATM Virtual Connection Cross-Connect Properties Field Description In Port Incoming port for the cross-connect. In VC Incoming virtual connection for the cross-connect. You can view additional details about the virtual connection in the following ways: • Click the hyperlinked entry to view the VC table.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties Table 20-4 Virtual Connection Traffic Descriptors Value Description ABR Available bit rate (ABR) supports nonreal-time applications that tolerate high cell delay, and can adapt cell rates according to changing network resource availability to prevent cell loss.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties Viewing ATM VPI and VCI Properties If you know the interface or link configured for virtual connection cross-connects, you can view ATM VPI and VCI properties from the physical inventory window or from the link properties window. To view ATM VPI and VCI properties, open the VC Table window in either of the following ways: • To open the VC Table window from physical inventory: a.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties Table 20-5 VC Table Properties Field Description VPI Virtual Path Identifier for the selected port. VCI Virtual Channel Identifier for the selected port. Admin Status Administrative state of the connection: Up, Down, or Unknown. Oper Status Operational state of the connection: Up, Down, or Unknown. Ingress Traffic Descriptor Traffic parameters and service categories for the incoming traffic.
Chapter 20 Monitoring MToP Services Viewing Virtual Connection Properties Figure 20-6 VC Encapsulation Properties Table 20-6 describes the information displayed in the VC Encapsulation window. Table 20-6 VC Encapsulation Properties Field Description VC Virtual connection identifier, such as VC:7/4. Type Type of encapsulation, such as Point-to-Point Protocol (PPP) over ATM (PPPoA) or ATM adaption layer Type 5 (AAL5).
Chapter 20 Monitoring MToP Services Viewing IMA Group Properties Viewing IMA Group Properties To view IMA group properties: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Logical Inventory > IMA Groups > group. IMA group properties and the IMA Members table are displayed in the content pane as shown in Figure 20-7. Figure 20-7 IMA Group Properties Table 20-7 describes the information displayed for the IMA group.
Chapter 20 Monitoring MToP Services Viewing IMA Group Properties Table 20-7 IMA Group Properties (continued) Field Description Description IMA group interface name. Frame Length Length of the IMA group transmit frames, in the number of cells: 32, 64, 128, or 256. A small frame length causes more overhead but loses less data if a problem occurs. We recommend a frame length of 128 cells. Group Number IMA group number.
Chapter 20 Monitoring MToP Services Viewing IMA Group Properties Table 20-8 describes the information displayed in the IMA Members table. Table 20-8 IMA Members Table Column Description Admin Status Administrative status of the IMA member. Channelization Channelization that occurs through the path, such as STS1-> VTG-> VT15. Information is displayed in this field only if the T1 or E1 path was channelized. If the line was not channelized, this field is not displayed.
Chapter 20 Monitoring MToP Services Viewing TDM Properties Figure 20-8 ATM IMA Port in Physical Inventory Viewing TDM Properties TDM is a mechanism for combining two or more slower-speed data streams into a single high-speed communication channel. In this model, data from multiple sources is divided into segments that are transmitted in a defined sequence. Each incoming data stream is allocated a timeslot of a fixed length, and the data from each stream is transmitted in turn.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties MToP encapsulates TDM streams for delivery over packet-switching networks (PSNs) using the following methods: • SAToP—A method for encapsulating TDM bit-streams (T1, E1, T3, or E3) as pseudowires over PSNs. • CESoPSN—A method for encapsulating structured (NxDS0) TDM signals as pseudowires over PSNs.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Viewing SONET/SDH Channelization Properties SONET and SDH use the same concepts for channelization, but the terminology differs. Table 20-10 describes the equivalent terms for SONET and SDH channelization. The information displayed in Prime Network Vision reflects whether SONET or SDH is configured on the interface.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Table 20-11 describes the information that is displayed for SONET/SDH and OC3 in the content pane. Table 20-11 SONET/SDH and OC3 Properties Field Description SONET/SDH High Order Path (HOP) Area Description SONET/SDH path description including the interface and high order path. Double-click an entry to view additional details about the path. Channelization Type of channelization, such as STS-1 or STM-1.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Figure 20-10 SONET/SDH High Order Path Properties Window Table 20-12 describes the information displayed in SONET/SDH High Order Path Properties window. Table 20-12 SONET/SDH High Order Path Properties Field Description Description SONET/SDH path description including the interface and high order path. Double-click an entry to view additional details about the path.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Table 20-12 SONET/SDH High Order Path Properties (continued) Field Description Low Order Path Tab Description Description of the low order path down to the T1 level, including the channel types (such as STS-1, VTG, or VT) and channel allocated. Physical Port Hyperlinked entry to the port in physical inventory. Channelization Channelization that occurs through the path, such as STS1-> VTG-> VT15.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Figure 20-11 T3 DS1 Channelization Properties in Physical Inventory Table 20-13 describes the information that is displayed for Channelized DS1 and DS3 in the content pane. Table 20-13 Channelized DS1 and DS3 Properties Field Description Channelized DS1 Table Description Path description including the physical interface and the channel number. Double-click an entry to view additional details about the path.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Table 20-13 Channelized DS1 and DS3 Properties (continued) Field Description DS3 Area Admin Status Administrative status of the DS3 line. Oper Status Operational status of the DS3 line. Port Type Type of port. Last Changed Date and time of the last status change of the line. Maximum Speed Maximum bandwidth for the line. Port Description Description of the port configured on the interface.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Figure 20-12 Channelized DS1 PDH Properties Window Table 20-14 describes the information that is displayed in the Channelized DS1 PDH Properties window. Table 20-14 Channelized DS1 PDH Properties Window Field Description Location Area Description Path description including the physical interface and the channel number. Channelization Type of channelization used on the line, such as CT3-> T1.
Chapter 20 Monitoring MToP Services Viewing Channelization Properties Table 20-14 Channelized DS1 PDH Properties Window (continued) Field Description Alarm State Alarm state of the DS1 line: • Clear—The alarm state is clear. • AIS—Alarm Indication Signal (AIS). • LOS—Loss of signal (LOS) alarm. • AIS_LOS—AIS loss of signal alarm. • LOF—Loss of frame (LOF) alarm. • AIS_LOF—AIS loss of frame alarm. • LOS_LOF—Loss of signal and loss of frame alarm.
Chapter 20 Monitoring MToP Services Viewing MLPPP Properties Viewing MLPPP Properties Multilink PPP (MLPPP) is a protocol that connects multiple links between two systems as needed to provide bandwidth when needed. MLPPP packets are fragmented, and the fragments are sent at the same time over multiple point-to-point links to the same remote address. MLPPP provides bandwidth on demand and reduces transmission latency across WAN links.
Chapter 20 Monitoring MToP Services Viewing MLPPP Properties Table 20-15 describes the information that is displayed for MLPPP. Table 20-15 MLPPP Properties Field Description Type Type of properties; in this case, MLPPP. MLPPP Bundle Table Step 3 MLPPP MLPPP bundle name, hyperlinked to the MLPPP Properties window. Name MLPPP interface name. Group MLPPP group to which the bundle belongs. Active Link Number of active interfaces participating in MLPPP.
Chapter 20 Monitoring MToP Services Viewing MLPPP Properties Table 20-16 describes the information that is displayed in the MLPPP Properties window. Table 20-16 MLPPP Bundle and Member Properties Field Description MLPPP MLPPP bundle name, hyperlinked to MLPPP in logical inventory. Name MLPPP interface name. Group Group to which the MLPPP bundle belongs. Active Link Number of active interfaces participating in MLPPP. Admin Status Administrative status of the MLPPP bundle: Up or Down.
Chapter 20 Monitoring MToP Services Viewing MLPPP Link Properties Table 20-16 MLPPP Bundle and Member Properties (continued) Field Description MLPPP Members Table Step 4 ID MLPPP bundle member identifier, hyperlinked to the interface in physical inventory. Type No value is displayed in this field. Binding Information Binding information to which the interface is associated. The value is null. Binding Status No value is displayed in this field.
Chapter 20 Monitoring MToP Services Viewing MLPPP Link Properties Step 3 In the link properties window, select the MLPPP link. The link properties are displayed as shown in Figure 20-16. Figure 20-16 MLPPP Link Properties Table 20-17 describes the information that is displayed for the MLPPP link. Table 20-17 MLPPP Link Properties Field Description General Properties Link Type Link protocol. In this case, MLPPP. Type Type of link: Dynamic or Static.
Chapter 20 Monitoring MToP Services Viewing MPLS Pseudowire over GRE Properties Viewing MPLS Pseudowire over GRE Properties Generic routing encapsulation (GRE) is a tunneling protocol, originated by Cisco Systems and standardized in RFC 2784. GRE encapsulates a variety of network layer packets inside IP tunneling packets, creating a virtual point-to-point link to devices at remote points over an IP network.
Chapter 20 Monitoring MToP Services Viewing MPLS Pseudowire over GRE Properties Table 20-18 describes the information included in the Tunnel Edges table specifically for MPLS pseudowire tunnels over GRE. Table 20-18 MPLS Pseudowire over GRE Properties Field Description Pseudowire Type Type of pseudowire relevant to MToP: • ATM AAL5 SDU—ATM with ATM Adaptation Layer 5 (AAL5) service data units. • ATM n-to-one VCC—ATM with n-to-one virtual channel connection (VCC).
Chapter 20 Monitoring MToP Services Viewing MPLS Pseudowire over GRE Properties Figure 20-18 GRE Tunnel Properties in Logical Inventory Table 20-19 describes the information that is displayed for GRE tunnels in logical inventory. Table 20-19 GRE Tunnel Properties in Logical Inventory Field Description Name Tunnel name. IP Address Tunnel IP address. Source IP address local to the device. Destination IP address of the remote router. State State of the tunnel: Up or Down.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Network Clock Service Overview Network clock service refers to the means by which a clock signal is generated or derived and distributed through a network and its individual nodes for the purpose of ensuring synchronized network operation. Network clocking is particularly important for mobile service providers to ensure proper transport of cellular traffic from cell sites to Base Station Control (BSC) sites.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Figure 20-19 Clock Service Properties Table 20-20 describes the information displayed for clocking service. Table 20-20 Clock Service Properties Field Description Clock Service Mode This field is not populated. Network Clock Select Action to take if the master device fails: Mode • Non-revert—Do not use the master device again after it recovers from the failure.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-20 Clock Service Properties (continued) Field Description Use Stratum4 Quality of the clock source: • True—Use Stratum 4, the lowest level of clocking quality. • False—(Default) Use Stratum 3, a higher level of clocking quality than Stratum 4. Clock Source Table This table is displayed only if there are active clock sources. Clock Source Current active clock source used by the device.
Chapter 20 Monitoring MToP Services Network Clock Service Overview To monitor PTP service: Step 1 In Prime Network Vision, right-click the required device, then choose Inventory. Step 2 In the inventory window, choose Logical Inventory > Clock > PTP Service. The PTP service properties are displayed in the content pane as shown in Figure 20-20. Figure 20-20 PTP Service Properties Table 20-21 describes the properties that are displayed for PTP service. Cisco Prime Network 4.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-21 PTP Service Properties Field Description PTP Mode Mode of PTP operation: • Boundary—Boundary clock mode. • E2E Transparent—End-to-end transparent clock mode. • Ordinary—Ordinary clock mode. • P2P Transparent—Peer-to-peer transparent clock mode. • Unknown—The clock mode is unknown. Note Cisco MWR-2941 routers support Ordinary mode only. PTP Clock ID Clock identifier derived from the device interface.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-21 PTP Service Properties (continued) Field Description Delay Request Interval (log mean value) When the interface is in PTP master mode, the interval specified to member devices for delay request messages. The intervals use base 2 values, as follows: Announce Interval (log mean value) • 4—1 packet every 16 seconds. • 3—1 packet every 8 seconds. • 2—1 packet every 4 seconds. • 1—1 packet every 2 seconds.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-21 PTP Service Properties (continued) Field Description Sync Interval (log mean value) Interval for sending PTP synchronization messages: • 4—1 packet every 16 seconds. • 3—1 packet every 8 seconds. • 2—1 packet every 4 seconds. • 1—1 packet every 2 seconds. • 0—1 packet every second. • -1—1 packet every 1/2 second, or 2 packets per second. • -2—1 packet every 1/4 second, or 4 packets per second.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Viewing Pseudowire Clock Recovery Properties To view pseudowire clock recovery properties: Step 1 Choose Logical Inventory > Clock > Pseudowire Clock Recovery. Prime Network Vision displays the Virtual CEM information by default. See Figure 20-21. Figure 20-21 Step 2 Pseudowire Clock Recovery - Virtual CEM Tab To view more information about a virtual CEM, right-click the virtual CEM, then choose Properties.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-22 Virtual CEM Group Properties Field Description CEM Interface Name CEM interface name. CEM Group Table CEM Group Name of the virtual CEM group. Framing Framing mode used for the CEM channel: Framed—Specifies the channels used for the controller, such as Channels: (1-8), (10-14). The channels that are available depend on the type of controller: T1, E1, T3, or E3.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-23 Step 4 CEM Group Properties Field Description Oper Status Operational status of the CEM interface: • Dormant—The interface is dormant. • Down—The interface is down. • Not Present—An interface component is missing. • Testing—The interface is in test mode. • Unknown—The interface has an unknown operational status. • Up—The interface is up.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Figure 20-22 Pseudowire Clock Recovery - Recovered Clock Entries Tab Table 20-24 describes the information displayed for pseudowire clock recovery. Table 20-24 Pseudowire Clock Recovery Properties Field Description Recovered Clock Source Interface (slot/subslot) in which clock recovery occurred. Click the hyperlinked entry to view its properties in physical inventory.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-24 Pseudowire Clock Recovery Properties (continued) Field Description Virtual CEM Tab CEM Interface Name Virtual CEM interface associated with the clock. Recovered Clock Entries Tab This tab appears if recovered entries exist. Transfer Type • In-band—The clocking information is sent over the same pseudowire as the bearer traffic.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Figure 20-23 SyncE Properties in Logical Inventory Table 20-25 describes the information that is displayed for SyncE. Table 20-25 SyncE Properties Field Description Synchronous Mode Status of the automatic synchronization selection process: Enabled or Disable. Equipment Clock Ethernet Equipment Clock (EEC) options: EEC-Option I or EEC-Option II.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-25 SyncE Properties (continued) Field Description SyncE Interfaces Table Interface Name Name of the Gigabit or 10 Gigabit interface associated with SyncE. If SyncE is not associated with a Gigabit or 10 Gigabit interface, this field contains Internal. Interface Hyperlinked entry to the interface routing information in the Routing Entity Controller window. For more information, see Viewing Routing Entities, page 18-31.
Chapter 20 Monitoring MToP Services Network Clock Service Overview Table 20-25 SyncE Properties (continued) Field Description ESMC Tx Whether ESMC is enabled for outgoing QL information on the interface: Enabled, Disabled, or NA (Not Available). ESMC Rx Whether ESMC is enabled for incoming QL information on the interface: Enabled, Disabled, or NA (Not Available). SSM Tx Whether SSM is enabled for outgoing QL information on the interface: Enabled, Disabled, or NA (Not Available).
Chapter 20 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Figure 20-24 Network Clock Service Overlay Example In addition, the elements configured for clocking service display a clock service icon as in the following example: Note An overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the main toolbar.
Chapter 20 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Viewing CEM Interfaces To view CEM interfaces: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Physical Inventory > Chassis > slot > subslot > interface. The CEM interface name is displayed in the content pane as shown in Figure 20-25. Figure 20-25 CEM Interface Viewing Virtual CEMs To view virtual CEMs, choose Logical Inventory > Clock > Pseudowire Clock Recovery.
Chapter 20 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Viewing CEM Groups on Physical Interfaces When you configure a CEM group on a physical interface, the CEM group properties are displayed in physical inventory for that interface. To view CEM groups configured on physical interfaces: Step 1 In Prime Network Vision, double-click the required device. Step 2 In the inventory window, choose Physical Inventory > Chassis > slot > subslot > interface.
Chapter 20 Monitoring MToP Services Viewing CEM and Virtual CEM Properties Figure 20-27 CEM Group Properties Window See Table 18-27 on page 18-51 for the properties displayed in the Pseudowire table in the CEM Group Properties window. Viewing CEM Groups on Virtual CEM Interfaces When you configure a CEM group on a virtual CEM, the CEM group information is displayed below the virtual CEM in logical inventory.
Chapter 20 Monitoring MToP Services Configuring SONET Figure 20-28 Step 4 CEM Group Properties To view additional CEM group properties, double-click the required CEM group. Table 20-23 describes the information displayed in the CEM Group Properties window. Configuring SONET These commands help in configuring the SONET device and in viewing device details. The table below lists the SONET commands can be launched from the inventory by right-clicking a SONET port and selecting Commands > SONET.
Chapter 20 Monitoring MToP Services Configuring SONET Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
Chapter 20 Monitoring MToP Services Configuring Clock Command Navigation Description Clock Source Right-click on SONET port and select Commands > SONET > Configure > Clock source of sent signal on SONET ports: TCA Threshold • internal—Controller will clock its sent data using internal clock. • line—Controller will clock its sent data using the clock recovered from the line’s receive data stream. • default—Cancels any clock source setting.
Chapter 20 Monitoring MToP Services Configuring Clock Command Navigation Description Create PTP Clock Global (For ASR 901/903) Identify the clock in the network with the highest priority. The clock with the highest priority is referred to as the master clock. All the other devices on the network synchronize their clocks with the master and are referred to as members. Constantly exchanged timing messages between master and members ensure continued synchronization.
Chapter 20 Monitoring MToP Services Configuring TDM and Channelization Command Navigation Description Create SyncE Global Right-click Clock node > Commands > Configuration > Modify SyncE Global (For ASR901, ASR903): Configure clock properties at the global level such as hold-off time, wait to restore, force switch, and so on, that helps routers to synchronize to the best available clock source.
Chapter 20 Monitoring MToP Services Configuring TDM and Channelization Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
Chapter 20 Monitoring MToP Services Configuring Automatic Protection Switching (APS ) Command Navigation Description Configure Controller Physical Inventory > Chassis > Slot > Subslot > right-click on SONET interface > Commands > Configuration > SONET > After configuring SONET/SDH type, configure the controller using additional parameters, like specifying the clock source.
Chapter 20 Monitoring MToP Services Configuring Automatic Protection Switching (APS ) You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
CH A P T E R 21 Viewing and Managing SBCs This chapter identifies and describes the properties for Session Border Controllers (SBCs) that appear in Cisco Prime Network Vision (Prime Network Vision) logical inventory. It also describes commands you can run to manage SBCs. Session Border Controllers (SBCs) control and manage real-time multimedia traffic flows between IP network borders, handling signaling, and media.
Chapter 21 Viewing and Managing SBCs User Roles Required to View SBC Properties • Viewing SBC Statistics, page 21-13 • Configuring SBC Components, page 21-14 User Roles Required to View SBC Properties This topic identifies the GUI default permission or scope security level that is required to view SBC properties in Prime Network Vision.
Chapter 21 Viewing and Managing SBCs Viewing SBC Properties in Logical Inventory Viewing SBC Properties in Logical Inventory To view SBC properties in Prime Network Vision logical inventory, right-click the element configured for SBC, then choose Inventory > Logical Inventory > Session Border Controller. The SBC properties are displayed as shown in Figure 21-1. Figure 21-1 SBC Properties in Logical Inventory Table 21-3 describes the general SBC properties displayed in logical inventory.
Chapter 21 Viewing and Managing SBCs Viewing SBC DBE Properties Table 21-3 SBC Properties (continued) Field Description Application Version SBC version number. Mode Mode in which the SBC is operating: SBC Service Name • Unified • Distributed DBE Name of the service. Viewing SBC DBE Properties The DBE controls media packet access to the network, provides differentiated services and QoS for different media streams, and prevents service theft.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Viewing VDBE H.248 Properties To view VDBE H.248 properties, choose Logical Inventory > Session Border Controller > DBE > VDBE. Table 21-6 describes the VDBE H.248 properties that are displayed in logical inventory. Table 21-6 VDBE H.248 Properties Branch Description H248 Controller H.248 controller used by the DBE.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Table 21-7 SBC SBE Properties (continued) Field Description Call Redirect Limit Maximum number of times a call is redirected before the call is declared failed. The range is 0 to 100 with a default of 2. On Hold Timeout Amount of time, in milliseconds, that the SBE waits after receiving a media timeout notification from the DBE for an on-hold call before tearing down the call.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Viewing H.248 Properties The H.248 interface is used for signaling between an SBE and a DBE in distributed mode and between an SBE and a transcoding media gateway. The SBE or SBC acts as an H.248 MGC, and the transcoding device acts as an H.248 media gateway. The connection between the MGC and the media gateway is an H.248 link. To view H.248 properties, choose Logical Inventory > Session Border Controller > H248. Table 21-9 describes the H.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Table 21-10 Policy Properties Branch Description Blacklist The Blacklists table contains the following information: CAC Policy • Name—The blacklist name. • Type—The type of source that this blacklist applies to, such as critical or normal. A Call Admission Control (CAC) policy is used to define admission control.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Table 21-10 Policy Properties (continued) Branch Description Current Blacklisting The Current Blacklistings table contains the following information: • Type—The type of source this blacklist applies to. Blacklists are used to block certain VoIP services that meet specified conditions. • Event Type—The type of event this blacklist applies to, such as CORRUPT_MESSAGE.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Table 21-10 Policy Properties (continued) Branch Description QoS Profile QoS profiles can be used by CAC policies and are used exclusively for marking IP packets. The QoS Profile table contains the following information: SDP • Name—The name of the QoS profile. • Class of Service—The type of call this profile applies to, such as voice, video, signaling, or fax. • Marking Type—The type of marking to be applied to the IP packet.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Table 21-11 SIP Properties Branch Description SIP Account The SBE Account table contains the following information: SIP Adjacency • Name—The name of the account associated with the adjacencies. • Adjacencies—The identified adjacencies. An adjacency represents a signaling relationship with a remote call agent. One adjacency is defined per external call agent. Each adjacency belongs within an account.
Chapter 21 Viewing and Managing SBCs Viewing SBC SBE Properties Table 21-11 SIP Properties (continued) Branch Description SIP Profile > Method Profile The SIP Method Profiles table contains the following information: • Name—The name of the SIP method profile. • Status—Whether or not the profile is in use. • Profile Type—The type of profile: – Whitelist—Accepts SIP requests that match the profile. – Blacklist—Rejects SIP requests that match the profile.
Chapter 21 Viewing and Managing SBCs Viewing SBC Statistics Table 21-11 SIP Properties (continued) Branch Description SIP Profile > Parameter Profile The SIP Parameter Profiles table contains the following information: SIP Timer • Name—The name of the SIP parameter profile. • Status—Whether or not the profile is in use. • Description—A brief description of the profile.
Chapter 21 Viewing and Managing SBCs Configuring SBC Components Command Navigation Description Current 15 Min Statistics Show > PM > Based on the command selected, the device’s statistics are displayed. Current 5 Min Statistics Current Day Statistics Current Hour Statistics H.
Chapter 21 Viewing and Managing SBCs Configuring SBC Components Command Navigation Description Add SIP Adjacency Right-click the SBC node > Commands > Add > SIP Adjacency Add an SIP adjacency or update an existing SIP adjacency. Update SIP Adjacency In the SIP Adjacencies window, right-click the adjacency instance > Commands > Update /Delete > SIP Adjacency.
Chapter 21 Viewing and Managing SBCs Configuring SBC Components Command Navigation Description Add SIP Header Profile Condition Expand the SBE node, SIP node, Use this command to add a and SIP Profile node, and click the condition to a SIP header profile header.
Chapter 21 Viewing and Managing SBCs Configuring SBC Components Command Navigation Description Add Blacklist Reason Right-click the blacklist instance > Commands > Add > Blacklist Reason Add, modify, or delete a blacklist reason for the blacklisted node in SBC.
Chapter 21 Viewing and Managing SBCs Configuring SBC Components Command Navigation Description Add Call Policy Table In the Call Policy Set window, right-click the policy set > Commands > Add > Call Policy Table Add, modify, or delete call policy tables Update Call Policy Table Double-click a policy set, then right-click a policy table > Commands > Update > Call Policy Table Delete Call Policy Table Add Call Rule Entry Right-click a policy table > Commands > Add > Call Rule Entry Update Call R
Chapter 21 Viewing and Managing SBCs Configuring SBC Components Command Navigation Add QoS Profile Right-click the SBE Configure QoS profile on a SBE node > Commands > Add > QoS node Profile Update QoS Profile Right-click the profile in the QoS Profile window > Commands > Update > QoS Profile Delete QoS Profile Description Cisco Prime Network 4.
Chapter 21 Viewing and Managing SBCs Configuring SBC Components Cisco Prime Network 4.
CH A P T E R 22 Monitoring AAA Configurations AAA refers to Authentication, Authorization, and Accounting, which is a security architecture for distributed systems that determines the access given to users for specific services and the amount of resources they have used. • Authentication—This method identifies users, including their login and password, challenge and response, messaging support, and encryption.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing AAA Configurations in Prime Network Vision Prime Network allows you to view the AAA configurations for Cisco ASR9000 and Cisco ASR5000 series network elements.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Table 22-2 Radius Configuration Details Field Name Description Load Balancing Method The load balancing method. Ignore Preferred Server Indicates if a transaction associated with a single AAA session should attempt to use the same server or not. VRF Virtual routing and forwarding (VRF) associated with the AAA group. Click the hyperlink to view the relevant node under the VRF node in the logical inventory.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing Radius Global Configuration Details To view the radius global configuration details: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > AAA > Radius Global Configuration. The authorization details are displayed in the content pane. Note These attributes are available only for Cisco ASR 9000 series network elements.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing AAA Group Configuration Details For a Cisco ASR5000 device, Prime Network Vision allows you to view the following configurations for an AAA group: • Diameter Configuration – Accounting Configuration – Authentication Configuration • Radius Configuration – Accounting Configuration – Accounting Keepalive and Detect Dead Server Configuration – Authentication Configuration – Authentication Keepalive and Detec
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing Diameter Configuration Details for an AAA Group To view the diameter configuration details for a AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups. You can view the AAA groups on the content pane. Step 3 Choose Diameter Configuration under a specific AAA group node.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing Radius Configuration Details for an AAA Group To view the radius configuration details for an AAA group: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Context > AAA > AAA Groups > AAA Group > Radius Configuration.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Table 22-8 describes the radius accounting configuration details. Table 22-8 Radius Accounting Configuration Field Name Description Server Selection Algorithm The algorithm to select the RADIUS accounting server(s) to which accounting data must be sent. Values are: • first-n n Default • first-server • round-robin Billing Version The billing system version of RADIUS accounting servers.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Viewing the Radius Keepalive and Detect Dead Server Configuration Details for an AAA Group To view the radius accounting/authentication Keepalive and Detect Dead Server Configuration details: Step 1 Right-click on the required device and choose the Inventory option.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Table 22-10 Radius Authentication Configuration Field Name Description Server Selection Algorithm The algorithm to select the RADIUS accounting server(s) to which accounting data must be sent. Values are: • first-server • round-robin Server Deadtime The time period after which the status of the authentication server must be changed from Down to Active.
Chapter 22 Monitoring AAA Configurations Viewing AAA Configurations in Prime Network Vision Table 22-11 Radius Charging Configuration Field Name Description Authentication Server Selection Algorithm The algorithm to select the RADIUS server(s) for active charging service to ensure proper load distribution amongst the available servers used for authentication requests.
Chapter 22 Monitoring AAA Configurations Configuring AAA Groups Table 22-12 Radius Charging Triggers Configuration Field Name Description Serving Node Change Indicates whether RADIUS trigger for serving node is enabled. Radio Access Technology Change Indicates whether RADIUS trigger for radio access technology change is enabled. User Location Information Change Indicates whether RADIUS trigger for user location information change is enabled.
Chapter 22 Monitoring AAA Configurations Configuring AAA Groups Command Navigation Description Create Diameter Accounting Server Right-click on AAA group > Commands > Configuration Use this command to create a new diameter accounting server. Create Diameter Authentication Server Use this command to create a new diameter authentication server. Delete AAA Group Use this command to delete an AAA group. Modify AAA Group Use this command to modify the attributes of an AAA group.
Chapter 22 Monitoring AAA Configurations Configuring AAA Groups Cisco Prime Network 4.
CH A P T E R 23 Monitoring IP Pools An IP pool is a sequential range of IP addresses within a certain network. We can have multiple pool configurations. Each pool can have a priority and can be assigned to a group. IP addresses can be assigned dynamically from a single pool or from a group of pools. The Least Recently Used (LRU) method is used to assign IP addresses. In each pool, the addresses are placed in a queue.
Chapter 23 Step 3 Monitoring IP Pools Right-click on an IP pool name and choose Properties. The IP Pool Properties dialog box is displayed as shown in Figure 23-1. Figure 23-1 IP Pool Properties Table 23-2 describes the fields that are displayed in the IP Pool Properties dialog box. Cisco Prime Network 4.
Chapter 23 Monitoring IP Pools Table 23-2 IP Pool Properties Field Name Description Name Name of the IP pool. IP Pool Entries Addresses In Use Number of IP addresses assigned from the pool. Start Address/Subnet Address Could be one of the following: • Starting IP address in the pool, if the pool is configured with a range. • Subnet address, if the pool is configured with a subnet mask. Free Addresses Number of free addresses available in the pool.
Chapter 23 Note Monitoring IP Pools You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
CH A P T E R 24 Monitoring BNG Configurations These topics provide an overview of the Broadband Network Gateway (BNG) technology and describe how to monitor and view BNG configurations in Prime Network Vision: • Broadband Network Gateway (BNG): Overview, page 24-1 • User Roles Required to Work With BNG, page 24-2 • Working with BNG Configurations, page 24-3 • Viewing Policy Container, page 24-13 • Viewing QoS Profile, page 24-16 Broadband Network Gateway (BNG): Overview Broadband Network Gateway
Chapter 24 Monitoring BNG Configurations User Roles Required to Work With BNG The network topology for BNG can be explained using the following models: • BNG Retail Model—The subscriber connects to the network over a digital subscriber line (DSL) circuit into a DSL access multiplexor (DSLAM), which aggregates a number of subscribers. The DSLAMs are connected to an aggregation network, which grooms the subscriber traffic and switches it to BNG. A sample of the retail model is shown in Figure 24-1.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Table 24-1 Default Permission/Security Level Required for BNG Task Viewer Operator OperatorPlus Configurator Administrator View BBA profiles X X X X X View Subscriber Access Points X X X X X Diagnose Subscriber Access Points — — — X X View DHCP Service Profile X X X X X View IP Subscriber Template X X X X X View PPP Templates X X X X X View Service Templates X X X X X View policy details
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Figure 24-2 Step 3 BBA Groups Content Pane Right-click on a group from the list and choose Properties. The BBA Group Properties dialog box is displayed. Table 24-2 describes the fields that are displayed in the BBA Group Properties dialog box. Cisco Prime Network 4.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Table 24-2 BBA Group Properties Field Name Description Name The name of the BBA Group. MTU (Bytes) The default maximum payload, which can be any value between 500 and 2000. Service Name The name of the service configured under the specified BBA group. Maximum Access Interface Limit The maximum limit of PPP over Ethernet (PPPoE) sessions on the access interface.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Table 24-3 Subscriber Access Point Properties Field Name Description Access Point The name of the access point. Associated Entity The link to the associated entity. Click this hyperlink to view the associated Data Link Aggregation record under the Ethernet Link Aggregation node.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Table 24-4 Diagnose Subscriber Access Points (continued) Diagnose Command Show PPoE Trace Show Subscriber Dynamic Template Trace All Show Subscriber Manager Disconnect History Show Subscriber Manager Session History Show Subscriber Manager Trace Show Subscriber Session Details by Filter Input parameters • Trace Filter Type • Trace Count • Trace Filter Type • Trace Event Type • Trace Count Disconnect History Filter Type
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Figure 24-3 Step 3 DHCP Profiles Right-click on a service from the list and choose Properties. The DHCP Profile Properties dialog box is displayed. Table 24-5 describes the fields that are displayed in the DHCP Profile Properties dialog box. Cisco Prime Network 4.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Table 24-5 DHCP Profile Properties Field Name Description Profile Name The name of the DHCP profile. Profile Type The network protocol that the profile belongs to. The profile type can be IPV4 or IPV6. Agent Mode The DHCP agent mode, which can be Relay, Snoop or Proxy. Lease Limit The lease limit for the profile. Lease Limit Type The lease limit type.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Prime Network supports the following types of dynamic templates: • IP subscriber templates • PPP templates • Service templates To view the configuration templates: Step 1 Right-click on the device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Dynamic Config Templates > IP Subscriber Templates or PPP template or Service template.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Table 24-6 Template Properties Field Name Description Name The name of the subscriber template. Template Type The template type, which can be IP Subscriber, PPP or Service based on the selected template. Ingress Policy The name of the ingress service policy associated with the subscriber template. This field is applicable only for IP Subscriber and Service templates. Associated Ingress Policy The associated ingress policy.
Chapter 24 Monitoring BNG Configurations Working with BNG Configurations Viewing the Settings for a PPP Template In addition to the above details, you can also view the following settings for a PPP template: • IPCP Settings • LCP Settings • Authentication Settings • PPP Timeout Settings To view the settings: Step 1 Right-click on the device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Dynamic Config Templates > PPP template.
Chapter 24 Monitoring BNG Configurations Viewing Policy Container Table 24-7 PPP Template Settings (continued) Field Name Description Maximum Authentication Response WaitTime The maximum time (in seconds) to wait for an authentication response during a PPP negotiation. Maximum Authentication Retry The maximum time (in seconds) to wait for a response during a PPP negotiation.
Chapter 24 Monitoring BNG Configurations Viewing Policy Container Step 3 Click the Policy Group tab. A list of existing groups are displayed. Step 4 Right-click on a group from the list and choose Properties. The Policy Group Properties dialog box is displayed. Table 24-8 describes the fields that are displayed in the Policy Group Properties dialog box. Table 24-8 Policy Group Properties Field Name Description Name The name of the policy group.
Chapter 24 Monitoring BNG Configurations Viewing Policy Container Step 5 Right-click on a policy from the Policies list and choose Properties. The Service Policy Properties dialog box is displayed. Table 24-9 describes the fields that are displayed in the Service Policy Properties dialog box. Table 24-9 Service Policy Properties Field Name Description Name The name of the service policy map.
Chapter 24 Monitoring BNG Configurations Viewing QoS Profile Table 24-9 Service Policy Properties (continued) Field Name Description Action Lists Sequence Number The sequence number of the policy action.
Chapter 24 Monitoring BNG Configurations Viewing QoS Profile Table 24-10 Class of Services Properties Field Name Description Name The name of the class of service. Type The type of the class of service. Values are: Matching Condition • Control Subscriber • QoS • Traffic The matching condition for the service, which can be Match All or Match Any.
Chapter 24 Monitoring BNG Configurations Viewing QoS Profile Cisco Prime Network 4.
CH A P T E R 25 Monitoring Mobile Technologies The following topics provide an overview of mobile technologies and describe how to work with mobile technologies in Prime Network Vision: • User Roles Required to Work with Mobile Technologies, page 25-1 • GPRS/UMTS Networks, page 25-4 • LTE Networks, page 25-40 • Scheduling 3GPP Inventory Retrieval Requests, page 25-109 • Viewing Operator Policies, APN Remaps, and APN Profiles, page 25-111 • Working with Active Charging Service, page 25-121 • M
Chapter 25 Monitoring Mobile Technologies User Roles Required to Work with Mobile Technologies Table 25-1 Default Permission/Security Level Required for Viewing GGSN, GTPU, and APN Properties - Element Not in User’s Scope Task Viewer Operator OperatorPlus Configurator Administrator Viewing GGSN properties — — — — X Viewing additional characteristics of a — GGSN — — — X Working with GGSN commands — — — — X Viewing GTPU properties — — — — X Working with GTPU commands — — — —
Chapter 25 Monitoring Mobile Technologies User Roles Required to Work with Mobile Technologies Table 25-1 Default Permission/Security Level Required for Viewing GGSN, GTPU, and APN Properties - Element Not in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator Viewing the ePDG configuration details — — — — X Viewing the PDSN configuration details — — — — X Viewing the Local Mobility Anchor configuration — — — — X Table 25-2 Default Permission/Securi
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-2 Default Permission/Security Level Required for Viewing GGSN, GTPU, and APN Properties - Element in User’s Scope (continued) Task Viewer Operator OperatorPlus Configurator Administrator Viewing active charging services (ACS) X X X X X Working with ACS commands — — — X X Viewing QCI-QoS mapping X X X X X Viewing the Layer 2 Tunnel Access Concentrator Configurations X X X X X Viewing the HSGW configuration X
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Figure 25-1 Basic GPRS/UMTS Network Topology The GPRS/UMTS packet core comprises two major network elements: • Gateway GPRS support node (GGSN)—A gateway that provides mobile cell phone users access to a Packet Data Network (PDN) or specified private Internet Protocol (IP) networks. • Serving GPRS support node (SGSN)—Connects the radio access network (RAN) to the GPRS/UMTS core and tunnels user sessions to the GGSN.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Figure 25-2 Mobile Technology Nodes in Logical Inventory Working With GPRS/UMTS Network Technologies The following topics explain how to work with GPRS/UMTS network technologies in Prime Network Vision: • Working with the Gateway GPRS Support Node(GGSN), page 25-6 • Working with the GPRS Tunneling Protocol User Plane (GTPU), page 25-11 • Working with Access Point Names (APNs), page 25-13 • Working with GPRS Tunneling Protocol Prime (GT
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks In addition, to providing basic GGSN functionality as described above, the system can be configured to support Mobile IP and/or Proxy Mobile IP data applications in order to provide mobility for subscriber IP PDP contexts. When supporting these services, the system can be configured to function as a GGSN and Foreign Agent (FA), a stand-alone Home Agent (HA), or a GGSN, FA, and HA simultaneously within the carrier's network.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks If the GGSN is associated with SGSNs and Public Land Mobile Networks (PLMNs), you can view the details from the respective tabs for that GGSN. Table 25-4 describes the SGSN and PLMN information associated with the GGSN. Table 25-4 SGSN and PLMN information for a GGSN Field SGSNs Description IP Address The IP address of the SGSN. Subnet Mask The subnet mask of the SGSN. PLMN ID The PLMN ID associated with the SGSN.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-5 GGSN Charging Characteristics Field Description Profiles Profile No Type of billing. For example: • 1—Hot billing • 2—Flat billing • 4—Prepaid billing • 8—Normal billing All other profiles from 0 - 15 are customized billing types. Buckets Denotes container changes in the GGSN Call Detail Record (GCDR). Prepaid Prepaid type, which could be Prohibited or Use-rulebase-configuration.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-6 GGSN Timers and QoS (continued) (continued) Field Description Guard Interval Interval, in seconds, for which the GGSN maintains responses sent to SGSN. This optimizes the handling of retransmitted messages. QCI to DSCP Mapping QoS class index A set of transport characteristics used to differentiate various packet flows.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-7 GGSN Commands Command Navigation Description Create PLMN Identifier Right-click on a GGSN group > Commands > Configuration Use this command to create a PLMN Identifier. Create SGSN Use this command to create an SGSN. Delete GGSN Use this command to delete a GGSN profile. Modify GGSN Use this command to modify a GGSN profile details.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-8 GTPU Properties in Logical Inventory Field Description Service Name The name of the GTPU service. State The status of the GTPU service. Status could be Unknown, Running, or Down. Max Retransmissions The maximum limit for GTPU echo retransmissions. Default value is 4. Retransmission Timeout The timeout in seconds for GTPU echo retransmissions. Default value is 5 Secs.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-9 GTPU Commands Command Navigation Description Create GTPU Bind IP Address Right-click on a GTPU defined > Comm ands > Configur ation Use this command to create a bind IP address for GTPU. Modify GTPU Bind IP Address Select the GTPU node > right-click Delete GTPU Bind IP Address on an IP address in the content pane > Commands > Configuration Use this command to modify the Bind IP address for GTPU.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks • IP: Method for IP address allocation (e.g., local allocation by GGSN, Mobile IP, Dynamic Host Control Protocol (DHCP), DHCP relay, etc.). IP address ranges, with or without overlapping ranges across APNs. • Tunneling: PPP may be tunneled with L2TP. IPv4 may be tunneled with GRE, IP-in-IP or L2TP. Load-balancing across multiple tunnels. IPv6 is tunneled in IPv4.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-10 APN Properties in Logical Inventory (continued) Field Description Allocation Type The method by which the APN obtains IP addresses for PDP contexts. IP Header Compression IP packet header compression parameters for the APN. New Call Policy Step 3 Specifies whether to accept or reject a new incoming call in case of duplicate session calls with a request for same IP address.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-11 Additional Configuration Details for APN (continued) Field Description Rule Definition The virtual APN rule definition can be one of the following: • access-gw-address—Specifies the access gateway (SGSN/SGW/Others) address for the virtual APN. The IP address can be an IPv4 or IPv6 address in decimal notation. IPv6 also supports :: notation for the IP address.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-11 Additional Configuration Details for APN (continued) Field Description Committed Data Rate The committed data rate allowed, in bytes, for the downlink direction and QoS traffic class. Negotiate Limit Indicates whether negotiation limit is enabled or disabled for the downlink direction and Qos traffic class. Rate Limit Indicates whether the rate limit is enabled or disabled for the downlink direction and Qos traffic class.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-11 Additional Configuration Details for APN (continued) Field Description Burst Size Auto Readjust Duration The burst size readjustment duration in seconds. This parameter indicates the number of seconds that the dynamic burst size calculation will last for. This allows the traffic to be throttled at the negotiated rates. Peak Burst Size (bytes) The peak burst size allowed, in bytes, for the uplink direction and QoS class.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Step 4 • Net BIOS—Represents the NetBIOS server configuration used by the APN. • PDP Contexts Parameters—Represents the PDP contexts supported by the APN. • PPP Profile—Represents the PPP profile used by the APN. • RADIUS—Represents the APN parameters related to communication with the RADIUS server. • Timeout—Represents the timeout parameters of the APN.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-12 APN Characteristics (continued) Field IP Parameters Description In Access Group The name of the IPv4/IPv6 access group for the APN when configured for inbound traffic. Out Access Group The name of the IPv4/IPv6 access group for the APN when configured for outbound traffic. Local Address The static local IP address assigned to the APN. Next Hop Gateway Address The IP address of the next hop gateway for the APN.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-12 APN Characteristics (continued) Field Description Mobile Node Home Agent SPI The mobile node Security Parameter Index (SPI) configured for the APN. Value is an integer between 256 and 4294967295. Mobile Node Home Agent Hash Algorithm The encryption algorithm used (if any) by the APN for security.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-12 APN Characteristics (continued) Field Description Long Duration Maximum duration, in seconds, before the system automatically reports or terminates the session. This is the maximum duration before the specified timeout action is activated for the session. Long Duration Inactivity Maximum duration, in seconds, before the session is marked as dormant.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks The table below lists the APN commands. Additional commands may be available for your devices. New commands are often provided in Prime Network Device Packages, which can be downloaded from the Prime Network software download site. For more information on how to download and install DPs and enable new commands, see the information on “Adding Additional Device (VNE) support” in the Cisco Prime Network 4.0 Administrator Guide.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Prime Network provides support on gathering the GTPP accounting setup details that are configured in the mobile gateway for transferring the different types of CDRs from charging agent to a GTPP server or accounting server. GTPP is configured within the accounting context of an APN and is also used by GGSN, P-GW, and S-GW to transmit CDRs to CGF.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-14 GTPP Properties in Logical Inventory (continued) Field Description Source Port Validation Indicates whether port checking is enabled or disabled for node alive/echo/redirection requests from the CGF. Dictionary Dictionary supported by the GTPP group. Accounting Server Group GTPP group, in which the accounting server is configured. Context Name Name of the context, in which the CGF is configured.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-15 GTPP Characteristics Field Description Accounting Server Failure Detection Detect Dead Server Consecutive Failures Number of failures that could occur before marking a CGF as dead (down). Dead Server Suppress CDRs Indicates whether suppression of CDRs is enabled or disabled when the GTPP server is detected as dead or unreachable. Dead Time Maximum duration, in seconds, before marking a CGF as dead on consecutive failures.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-15 GTPP Characteristics (continued) Field Description Indicators Indicates whether the following CDR attributes are enabled or not: • PDP Type • PDP Address • Dynamic Flag • Diagnostics • Node ID • Charging Characteristic Selection Mode • Local Record Sequence Number • MSISDN • PLMN ID • PGW PLMN ID • IMEI • RAT • User Location Information • List of Service Data • Served MNAI • Start Time • Stop Tim
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-15 GTPP Characteristics (continued) Field Description IP Address IP address of the charging agent. Port Port of the charging agent. EGCDR Data Generation Configuration Service Interval The volume octet counts for the generation of the interim eG-CDRs to service data flow container in flow-based charging (FBC).
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-15 GTPP Characteristics (continued) Field Description IP Address IP address of the backup storage server. Port UDP port number over which the GGSN communicates with the backup storage server. Timeout Maximum amount of time, in seconds, the system waits for a response from the GTPP backup storage server before assuming the packet is lost.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-16 GTPP Commands Command Navigation Description Create CGF Right-click on a GTPP group > Commands > Configuration The Charging Gateway Function (CGF) listens to GTP' messages sent from the GSNs on TCP/UDP port 3386. The core network sends charging information to the CGF, typically including PDP context activation times and the quantity of data which the end user has transferred.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Viewing eGTP Properties Prime Network Vision displays the EGTPs in an EGTP container under the Mobile node in the logical inventory. The icon used for representing EGTPs in the logical inventory is explained in Logical Inventory Icons, page A-7. To view EGTP properties: Step 1 Right-click the required device in Prime Network Vision and choose Inventory.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands. To find out if a device supports these commands, see the Cisco Prime Network 4.0 Supported Cisco VNEs. Note You might be prompted to enter your device access credentials while executing a command.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > SGSN. The SGSN services configured in Prime Network are displayed in the content pane as shown in the following figure. Step 3 Under the SGSN node, choose an SGSN service. The SGSN service details are displayed in the content pane. Table 25-19 describes the SGSN service details.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-19 SGSN Service Details (continued) Field Description Associated SGTP Service The name of the STGP service and its context associated to the SGSN service. This service is represented in the following format: @ Associated MAP Service The name of the Mobile Application Part (MAP) service and its context that is associated to the SGSN service.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-19 SGSN Service Details (continued) Field Description Dns Israu MCC-MNC-Encoding The format of the MCC and MNC values in the DNS query sent during the Inter-SGSN RAU (ISRAU), which can be any one of the following: • decimal • hexadecimal Accounting CDR Types The type of accounting Call Detail Record (CDR) configured for the SGSN service, which can be any one of the following: • MCDR • SCDR • SMS MO_CDR • SMS MT_CDR • S
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-19 SGSN Service Details (continued) Field Description Network Global MME ID Management DB Indicates whether the SGSN service is associated to the Network Global MMEID Management Database, which in turn is configured on the LTE policy. Tai Management DB Indicates whether the SGSN service is associated to the Tai Management Database, which in turn is configured on the LTE policy.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-19 SGSN Service Details (continued) Field Description Profile No. The type of billing. Time (1 - 6) The time-of-day values at different times in a day, which is required to close the current statistics container.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Table 25-20 GPRS Mobility Management Details (continued) Field Description Perform Identity After Auth Indicates whether the SGSN service is allowed to perform an identity check to ascertain the IMSI after an authentication failure on a P-TMSI message. TRAU Timeout The amount of time (in seconds) that the SGSN service must wait to purge the mobile stations’s data.
Chapter 25 Monitoring Mobile Technologies GPRS/UMTS Networks Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > SGSN > NRI Properties. The NRI properties are displayed in the content pane. Table 25-21 describes the NRI Properties details. Table 25-21 NRI Properties Details Field Description NRI Length The number of bits to be used in P-TMSI to define the NRI, which can be any number between 1 and 6. This length also determines the maximum size of the pool.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-22 Session Management Properties Details (continued) Field Description T3385 Timeout The amount of time (in seconds) to wait for a network initiated activate request before it is retransmitted again. This time can be any value between 1 and 60. T3386 Timeout The amount of time (in seconds) to wait for a network initiated modify request before it is retransmitted again. This time can be any value between 1 and 60.
Chapter 25 Monitoring Mobile Technologies LTE Networks Figure 25-3 Basic LTE Network Topology Working with LTE Network Technologies The E-UTRAN uses a simplified single node architecture consisting of the eNodeBs (E-UTRAN Node B). The eNB communicates with the Evolved Packet Core (EPC) using the S1 interface, specifically with the Mobility Management Entity (MME) and Serving Gateway (S-GW) using S1-U interface. The PDN Gateway (P-GW0 provides connectivity to the external packet data networks.
Chapter 25 Monitoring Mobile Technologies LTE Networks • Viewing the Local Mobility Anchor Configuration (LMA), page 25-106 Monitoring System Architecture Evolution Networks (SAE-GW) Systems Architecture Evolution (SAE) has a flat all-IP architecture with separation of control plane and user plane traffic. The main component of SAE architecture is the Evolved Packet Core (EPC), also known as SAE Core.
Chapter 25 Monitoring Mobile Technologies LTE Networks Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > SAE-GW Container. Prime Network Vision displays the list of SAE-GW services configured under the container. You can view the individual SAE-GW service details from the table on the right pane or by choosing Logical Inventory > Context > Mobile > SAE-GW Container > SAE-GW.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-24 SAE-GW Commands Command Navigation Description Create SAE GW Logical Inventory > Right-click on a context > Commands > Configuration Use this command to create SAE GW. Delete SAE GW Right-click on a SAE GW > Commands > Configuration Use this command to delete or modify the configuration details for a SAE GW.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-25 Step 3 P-GW Properties in Logical Inventory Field Description Service Name Name of the P-GW service. Service Status Status of the P-GW service. EGTP Service Evolved GPRS Tunneling Protocol (EGTP) service associated with the P-GW. EGTP provides tunneling support for the P-GW. GGSN Service GGSN service associated with the P-GW. LMA Service Local Mobility Anchor (LMA) that facilitates proxy mobile IP on the P-GW.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-26 P-GW Commands Command Navigation Description Create P-GW PLMN Right-click on a P-GW service > Comm ands > Configur ation Use this command to create a PLMN for P-GW. Delete P-GW Modify P-GW Use this command to delete a P-GW. Use this command to modify the configuration details for a P-GW.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-27 Step 3 S-GW Properties in Logical Inventory Field Description Service Name Name of the S-GW service. Service Status Status of the S-GW service. Accounting Context Name of the context configured on the system that processes accounting for service requests handled by the S-GW service. Accounting GTPP Group Name of the accounting GTPP group associated with the S-GW service.
Chapter 25 Monitoring Mobile Technologies LTE Networks Note You might be prompted to enter your device access credentials while executing a command. Once you have entered them, these credentials will be used for every subsequent execution of a command in the same GUI client session. If you want to change the credentials, click Edit Credentials. The Edit Credentials button will not be available for SNMP commands or if the command is scheduled for a later time.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-29 QCI-QoS Mapping (continued) Field Description Uplink DSCP marking to be used for encapsulation and UDP for uplink traffic Downlink DSCP marking to be used for encapsulation and UDP for downlink traffic Max Packet Delay Maximum packet delay, in milliseconds, that can be applied to the data. Max Error Rate Maximum error loss rate of non congestion related packet loss. Delay Class Packet delay.
Chapter 25 Monitoring Mobile Technologies LTE Networks The packets that are exchanged within an L2TP tunnel can be categorized as control packets and data packets. To view the LAC configuration details: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > LAC. The list of LAC services configured in Prime Network is displayed in the content pane.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-30 LAC Configuration Details Field Description Service Name The unique identification string for the LAC service. Status The status of the LAC service, which can be any one of the following: • Initiated • Running • Down • Started • Nonstarted • Unknown Local IP Address The local IP address bound with the LAC service.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-30 LAC Configuration Details Field Description Tunnel Selection Key The selection key to create tunnels between the L2TP service and the LNS server, based on the value of the \u2015Tunnel-Server-Auth-ID\u2016 attribute received from the AAA server.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-30 LAC Configuration Details Field Description Allow APN in Called Number Indicates whether the APN name in Called number AVP is sent as part of the Incoming-Call Request (ICRQ) message sent to the LNS.
Chapter 25 Monitoring Mobile Technologies LTE Networks • IPv6 SLACC, generating RAs responding to RSs An HSGW also establishes, maintains and terminates link layer sessions to UEs. The HSGW functionality provides interworking of the UE with the 3GPP EPS architecture and protocols. This includes support for mobility, policy control and charging (PCC), access authentication, and roaming. The HSGW also manages inter-HSGW handoffs.
Chapter 25 Monitoring Mobile Technologies LTE Networks The Authentication features supported by HSGW are: • EAP over PPP • UE and HSGW negotiates EAP as the authentication protocol during LCP • HSGW is the EAP authenticator • EAP-AKA’ (trusted non-3GPP access procedure) as specified in TS 33.
Chapter 25 Monitoring Mobile Technologies LTE Networks Figure 25-7 HSGW Service Details Table 25-31 displays the HSGW service details. Table 25-31 HSGW Service details Field Description Name The name of the HSGW service. Status The status of the service, which can be any one of the following: • Started • Not Started This field defaults to Not Started. Bind Address The IPv4 address to which the service is bound to. This field defaults to Null if binding is not done.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-31 HSGW Service details (continued) Field Description Setup Timeout The maximum amount of time (in seconds) allowed for session setup. Context Retention Timeout The maximum number of time (in seconds) that the UE session context is maintained by the HSGW service before it is torn down. Note The UE session context includes the Link Control Protocol (LCP), authentication and the A10 session context for a given UE.
Chapter 25 Monitoring Mobile Technologies LTE Networks • A10/A11 Properties—The A10/A11 interface (also known as R-P interface for RAN-to-PDSN) supports the A10 protocol for user data transport between the PCF and PDSN, and the A11 protocol for the associated signaling. A11 signaling messages are also used for passing accounting related and other information from the PCF to the PDSN. The A10/A11 interfaces support mobility between PCFs under the same PDSN.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-32 A10 A11 Configuration Details (continued) Field Description Airlink Bad Sequence Deny Code The reason for denying airlink bad sequence, which can be any one of the following: • Unsupported vendor ID • Poorly formed request Handoff With No Connection Setup Indicates whether the HSGW service must accept or deny handoff R-P sessions that do not have an Airlink Connection setup record in the A11 registration request.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-33 GRE Parameter Details (continued) Field Description Flow Control Timeout The amount of time (in milliseconds) to wait for an Transmitter On (XON) indicator from the RAN. This time can be any value between 1 and 1000000, and defaults to 10000 milliseconds. Flow Control Action The action that must be taken when the timeout limit is reached, which can be any one of the following: • disconnect-session • resume-session.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-34 IP Source Violation Configuration Details Field Description Renegotiation Limit The number of source violations that are allowed within a specified detection period, after which a PPP renegotiation is forced. Drop Limit The number of source violations that are allowed within a specified detection period, after which a call disconnect is forced.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-35 HSGW Configuration Commands (continued) Command Navigation Create SPI Expand HSGW node > right-click HSGW Use this command to create a new service > Commands > Configuration Security Parameter Index (SPI) for the HSGW service. Modify SPI Expand HSGW node > HSGW service > Use this command to modify/delete the SPI configuration details for the In content pane, click SPI tab > right-click on SPI No. field > Commands HSGW service.
Chapter 25 Monitoring Mobile Technologies LTE Networks Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > MAG > MAG service. The configuration details are displayed in the content pane. Table 25-36 displays the configuration details for a MAG service. Table 25-36 MAG Service Configuration Details Field Description Name The unique name of the MAG service.
Chapter 25 Monitoring Mobile Technologies LTE Networks Viewing the Profile-QCI Mapping Details You can view the configured mapping entries between a Rendezvous Point (RP) QoS Profile and the LTE QoS Class Index (QCI). A QCI is a scalar that is used as a reference to access node-specific parameters that control bearer level packet forwarding treatment (e.g. scheduling weights, admission thresholds, queue management thresholds, link layer protocol configuration, etc.
Chapter 25 Monitoring Mobile Technologies LTE Networks The table below lists the MAG commands. Additional commands may be available for your devices. New commands are often provided in Prime Network Device Packages, which can be downloaded from the Prime Network software download site. For more information on how to download and install DPs and enable new commands, see the information on “Adding Additional Device (VNE) support” in the Cisco Prime Network 4.0 Administrator Guide.
Chapter 25 Monitoring Mobile Technologies LTE Networks When a mobile node moves out of the home network, the HA still manages to deliver the packets to the mobile node. This is done by interacting with the Foreign Agent (FA) that the mobile node is communicating with using the Mobile IP (MIP) Standard. Such transactions are performed through the use of virtual private networks that create MIP tunnels between the HA and FA.
Chapter 25 Monitoring Mobile Technologies LTE Networks Figure 25-9 Home Agent Service Details Table 25-39 displays the Home Agent service details. Table 25-39 Home Agent Service Details Field Description Service Name The name of the home agent service. Status The status of the home agent service, which can be any one of the following: • Down • Running • Initiated • Unknown This field defaults to Down.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-39 Home Agent Service Details (continued) Field Description Force UDP Tunnel Indicates whether HA would accept requests when Network Address Translation (NAT) is not detected but the Force bit is set in the Registration Request (RRQ) with the UDP Tunnel Request.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-39 Home Agent Service Details (continued) Field Description Permit Any Hash Algorithm Indicates whether verification of MN-HA authenticator using other hash algorithms is allowed, on failure of the configured hash algorithm. Note This field is available only in the MN HA SPIs tab. Description IPSEC Crypto Maps The description of the SPI.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-40 AAA Configuration for Home Agent Service (continued) Field Description MN HA Authentication Indicates whether the HA service looks for an MN-HA authentication in the Type RRQ. MN AAA Authentication Type The method used to send authentication request to AAA for each re-registration attempt. The initial registration request and de-registrations are handled normally.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-42 displays the Policy configuration for a home agent service. Table 25-42 Policy Configuration for Home Agent Service Field Description BC Response Code The response code for a binding cache (BC) query result in response to a network failure or error. NW-Reachability Policy The action to be taken on detection of an upstream network-reachability failure. Over Load Policy The overload policy within the HA service.
Chapter 25 Monitoring Mobile Technologies LTE Networks Monitoring the Foreign Agent (FA) A Foreign Agent (FA) is basically a router on a mobile node’s visited network that provides routing services to the mobile node. The FA acts as a mediator between the mobile node and it’s home agent (HA). When the mobile node moves out of its home network, the FA registers the mobile node with a Care of Address (CoA).
Chapter 25 Monitoring Mobile Technologies LTE Networks Figure 25-11 Foreign Agent Service Details Table 25-44 displays the Foreign Agent configuration details. Table 25-44 FA Configuration Details Field Description Service Name The unique name to identify the FA service. Status The status of the FA service, which can be any one of the following: • Down • Running • Initiated • Unknown This field defaults to Down. Bind Address The IPv4 address to which the service is bound.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-44 FA Configuration Details (continued) Field Description A11 Signalling Packets IP Header DSCP The Differential Service Code Point (DSCP) value in the IP header. This value can range between 0x0 and 0x3F, and defaults to 0x0F. Note The Differentiated Services (DS) field of a packet contains 6 bits that represents the DSCP value. Out of these 6 bits, five of them represent the DSCP.
Chapter 25 Monitoring Mobile Technologies LTE Networks You can also view the following configuration details for a Foreign Agent service: • Advertisement—Foreign agents advertise their presence on their attached links by periodically multicasting or broadcasting messages called agent advertisements. Mobile nodes listen to these advertisements and determine if they are connected to their home link or foreign link. Rather than waiting for agent advertisements, an MN can also send an agent solicitation.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-45 Advertisement Configuration Details Field Description Advertisement Delay The time delay (in milliseconds) for the first advertisement for a WiMax call. This time can be any value between 10 and 5000, and defaults to 1000. Advertisement Interval The advertisement interval time (in milliseconds). This time can be any value between 100 and 1800000, and defaults to 5000 milliseconds.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-46 Authentication Configuration Details (continued) Field Description AAA Distributed MIP Keys Override Indicates whether the AAA distributed MIP Keys Override option is enabled. In other words, if this feature is enabled, then the authentication parameters for the FA service will override the dynamic keys from AAA with static keys.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-47 GRE Configuration Details (continued) Field Description Sequence Mode The mode used to handle the incoming out-of-sequence packets, which can be any one of the following: • Reorder • None This field defaults to None. Sequence Numbers Indicates whether GRE sequence numbers must be inserted into the data that is about to be transmitted over the A10 interface. This option is disabled by default.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-48 HA Configuration Details (continued) Field Description Crypto Map Name SPI The IKE crypto map for the peer home agent. SPI Number The unique SPI number that indicates a security context between the services. This number can be any value between 256 and 4294967295. Remote Address The IP address of the source service, which is expressed either in the IPv4 dotted decimal notation or IPv6 colon separated notation.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-49 Proxy Mobile IP Configuration Details (continued) Field Description HA Failover The failover status of the FA. This option is disabled by default. HA Failover Max Attempts The maximum number of times for HA Failover. This can be any value between 1 and 10, and defaults to 4. HA Failover Timeout The timeout (in seconds) for the HA failover. This time can be any value between 1 and 50, and defaults to 2.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-50 Registration Revocation Configuration Details (continued) Field Description Revocation Maximum Retries The maximum number times a revocation message must be retransmitted before failure. This value can be any value between 0 and 10, and defaults to 3. Revocation Timeout The time period (in seconds) to wait for an acknowledgement from the HA before the revocation message is retransmitted.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-51 Foreign Agent Configuration Commands (continued) Command Navigation Description Create SPI Expand FA node > right-click FA service > Commands > Configuration Use this command to configure Security Parameter Index (SPI) for a foreign agent service. Modify SPI Use these commands to modify and delete an Expand FA node > expand FA service node > HA Configuration existing SPI configured for a foreign agent service.
Chapter 25 Monitoring Mobile Technologies LTE Networks Monitoring Evolved Packet Data Gateway (ePDG) In today’s market, there are multiple access networks for mobile technologies. For example, the following access networks are available for 3rd Generation Partnership Project (3GPP) network: • General Packet Radio Service (GPRS). See GPRS/UMTS Networks, page 25-4. • Global System for Mobile communication (GSM) • Universal Mobile Telecommunication System (UMTS). See GPRS/UMTS Networks, page 25-4.
Chapter 25 Monitoring Mobile Technologies LTE Networks IP Security (IPSec) Internet Protocol Security or IPSec is a protocol suite that interacts with one another to provide secure private communications across IP networks. These protocols allow the system to establish and maintain secure tunnels with peer security gateways.
Chapter 25 Monitoring Mobile Technologies LTE Networks Figure 25-13 Crypto Template Details Table 25-52 displays the Crypto template details. Table 25-52 Crypto Template Details Field Description Template Name The unique name of the template. Control Don’t Fragment The Don’t Fragment (DF) bit in the IPSec tunnel data packet, which is encapsulated in the IPSec headers at both ends.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-52 Crypto Template Details (continued) Field Description Notify Payload - Half Open Session Start The initial count of the number of half-open sessions per IPSec manager. Transmission of information will start only when the number of half-open sessions currently open exceed the starting count.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-52 Crypto Template Details (continued) Field Description Rekey Indicates whether IPSec Child Security Association rekeying must be enabled, after approximately 90% of the child SA lifetime has expired. Rekey Keepalive Indicates whether rekeying must be allowed if data is not received on the security association since the last rekey.
Chapter 25 Monitoring Mobile Technologies LTE Networks Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Security Association > EAP Profile. The list of profiles are displayed in the content pane. Step 3 In the EAP Profile node, choose the profile. The profile details are displayed in the content pane. Table 25-53 displays the EAP Profile details.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-54 IKEv2 IPSec Transform Set/IKEv2 Transform set Details Field Description Name The name of the transform set.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-54 IKEv2 IPSec Transform Set/IKEv2 Transform set Details Field Description Mode The encapsulation mode for the transform set, which can be any one of the following: PRF • transport • tunnel The Pseudo-random Function (PRF) for the transform set, which can be any one of the following: • aes-xcbc-128 • md5 • sha1 • sha2-256 • sha2-384 • sha2-512 This field defaults to SHA1.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-55 EPDG Service Details Field Description Service Name The unique name of the ePDG service. Status The status of the ePDG service, which can be any one of the following: • Initiated • Running • Down • Started • Nonstarted IP Address The IPV4 address of the ePDG service. UDP Port The User Datagram Protocol (UDP) port of the ePDG service. Crypto Template The name of the IKEv2 crypto template to be used by the ePDG service.
Chapter 25 Monitoring Mobile Technologies LTE Networks Configuration Commands for ePDG The ePDG commands allow you to configure ePDG services in your network. Please note that these commands are available only for Cisco ASR 5000 Mobile devices. These commands can be launched from the logical inventory by choosing the Context > Commands > Configuration or Context > Commands > Show. Before executing any commands, you can preview them and view the results. If desired, you can also schedule the commands.
Chapter 25 Monitoring Mobile Technologies LTE Networks PDSN Configurations The following paragraphs list the different configurations for PDSN: • Simple IP—In this protocol, the mobile user is assigned an IP address dynamically. The user can use this IP address within a defined geographical area, which is lost when the user moves out of the area. If the user moves out of the designated area, they must register with the service provider again to obtain a new IP address.
Chapter 25 Monitoring Mobile Technologies LTE Networks • Proxy Mobile IP—This protocol provides a mobility solution for subscribers whose mobile nodes do not support the Mobile IP protocol. On behalf of the mobile node, PDSN proxies the Mobile IP tunnel with the HA. In turn, the service provider or the home agent assigns an IP address to the subscriber. This IP address does not change or is not lost even if the user moves out of the home network.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-57 PDSN Service Details Field Description Service Name The unique name of the PDSN service. Status The status of the PDSN service, which can be any one of the following: Bind Address • Initiated • Running • Down • Started • Nonstarted • Unknown The IP address to which the service is bound. This can be a IPv4 or IPv6 address.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-57 PDSN Service Details (continued) Field Description Airlink Bad Sequence Number The action to be taken when the PDSN receives an airlink record with a bad sequence number, which can be any one of the following: • Accept (default value) • Reject Note Airlink Bad Sequence Number Deny Code AAA 3GPP2 Service Option Service Option Entries At the time of the R-PA10 connection setup, an airlink record is assigned a unique sequence num
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-58 GRE Configuration Details Field Description Checksum Indicates whether the Checksum field is applicable for outgoing GRE packets.By default, this option is disabled. Checksum Verify Indicates whether the verification of the Checksum field is enabled for incoming GRE packets. Reorder Time Out The maximum time (in milliseconds) for processing the GRE packets that are coming out of order.
Chapter 25 Monitoring Mobile Technologies LTE Networks Viewing the IP Source Violation Details A Source violation occurs when a mobile device sources packets to the PDSN with a IP address that is different from the one specified during setup. Using this feature, the packets that need not be sent over the network are dropped when it tries to pass through PDSN.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-60 MSID Configuration Details Field Description MSID Authentication Indicates whether the MSID authentication feature is enabled. MSID Length Check Indicates whether MSID length is enabled for the PDSN service. By default, this option is disabled. Note This configuration is required to reject the A11-RRQs with illegal International Mobile Station Identification (IMSI).
Chapter 25 Monitoring Mobile Technologies LTE Networks Viewing the Policy Configuration Details To view the Policy configuration details for a PDSN service: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Context > Mobile > PDSN > PDSN service > Policy. The details are displayed in the content pane. Table 25-62 displays the Policy configuration details.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-63 PPP Configuration Details Field Description Context Name The destination context where the Layer 2 Tunneling protocol Access Concentrator (LAC) service is configured. Note Tunnel Type This context is the same as the PPP tunneling context. The type of the PPP tunnel established between the PDSN and the PFC, which can be any one of the following values: • L2TP • None This field defaults to None.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-64 QoS Configuration Details Field Description Policy Mismatch Indicates whether the PDSN must raise a Traffic FLow Template (TFT) violation if there is a policy mismatch of QoS. Qos Wait Indicates whether parameters related to QoS are enabled. Note Associate While configuring parameters for QoS, the minimum and maximum waiting time for transmission are also specified.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-65 Registration Details (continued) Field Description Deny New Call Connection Setup Record Absent Indicates whether new calls that do not have airlink connection setup record in the RRQ must be denied. Deny New Call Connection Setup Record Absent Deny Code The reason for denying new calls that do not have airlink connection setup record in RRQ.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-66 Timers and Restrictions Details Field Description Inter PDSN Handoff Indicates whether the Inter-PDSN handoff feature off is enabled. Inter-PDSN handoff relates to the handoff between two PCFs with connectivity to different PDSNs. Note Inter-PDSN handoff can be of two types: Fast Handoff and Dormant Handoff. Fast Handoff uses a GRE tunnel between two PDSNs to transport user data for a single service instance.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-66 Timers and Restrictions Details (continued) Field Description Retransmission TimeOut The timeout period (in seconds) for retransmission of RP control packets. This time can be any value between 1 and 1000000 and defaults to 3 seconds. Pdsn Type0 Tft Indicates whether Traffic Flow Template (TFT) of the PDSN is changed from type 0 TFT to type 1 TFT. Tft Validation TimeOut The TFT validation timeout (in seconds) for QoS changes.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-67 PDSN Configuration Commands (continued) Command Navigation Description Show PDSN Expand PDSN node > right-click PDSN service > Commands > Show Use this command to view and confirm the PDSN service configuration details. Modify GRE Expand PDSN node > PDSN service > Use this command to modify the Generic right-click GRE > Commands > Routing Encapsulation (GRE) configuration Configuration settings for a specified PDSN service.
Chapter 25 Monitoring Mobile Technologies LTE Networks The major functional entities of PMIPv6 are Mobile Access Gateways (MAGs), Local Mobility Anchors (LMAs), and Mobile Nodes (MNs). The Local Mobility Anchor (LMA) is the home agent for a mobile node in a Proxy Mobile IPv6 (PMIPv6) domain. It is the topological anchor point for mobile node home network prefixes and manages the binding state of an mobile node.
Chapter 25 Monitoring Mobile Technologies LTE Networks Table 25-68 LMA Service Details Field Description Service Name The unique service name of the LMA. Status The status of the LMA service, which can be any one of the following: • Down • Running • Initiated • Unknown. This field defaults to Down. Local IPv6 Address The IP address of the interface serving as S2a (that is connected to HSGW) or S5/S8 (that is connected to S-GW) interface.
Chapter 25 Monitoring Mobile Technologies Scheduling 3GPP Inventory Retrieval Requests Table 25-68 LMA Service Details (continued) Field Description Signalling Packet IP Header DSCP The Differentiated Services Code Point (DSCP) marking that is applicable to the IP header that is carrying outgoing signalling packets. Simultaneous Binding The maximum number of Care of addresses that can be bound for the same user as identified by their Network Access Identifier (NAI) and home address.
Chapter 25 Monitoring Mobile Technologies Scheduling 3GPP Inventory Retrieval Requests Table 25-69 General Tab in Web Service Scheduler Field Description Operation Select from the following inventory request: • getAllInventory - This inventory request is used to retrieve Inventory data for all supported devices under Prime Network.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Viewing Operator Policies, APN Remaps, and APN Profiles Operator policy provides mechanisms to fine tune the behavior of subsets of subscribers above and beyond the behaviors described in the user profile. It can also be used to control the behavior of visiting subscribers in roaming scenarios, enforcing roaming agreements, and providing a measure of local protection against foreign subscribers.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Prime Network Vision displays the list of operator policies configured under the container. You can view the individual policy details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Policy > Operator Policies > Policy. Table 25-70 describes the details available for each operator policy.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Table 25-70 Operator Policies in Logical Inventory (continued) Field Description OI APN Profile Name of the APN profile associated with the operator identifier. An APN profile groups a set of APN-specific parameters that may be applicable to one or more APNs.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Prime Network Vision displays the list of APN remaps configured under the container. You can view the individual APN remap details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Profile > APN Remaps > APN Remap. Table 25-71 describes the details available for each APN remap.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Table 25-72 Default APN Properties in Logical Inventory Field Description Default APN Name Name of the default APN. Use Default APN When Indicates whether the configured default APN can be used or not, if there is No APN is Requested no APN in the request. Use Default APN When Indicates whether the configured default APN can be used or not, if DNS DNS Query Fails query fails.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Prime Network Vision displays the list of APN profiles configured under the container. You can view the individual APN profile details from the table on the right pane or by choosing Logical Inventory > local > Mobile > Profile > APN Profiles > APN Profile. Table 25-73 describes the details available for each APN remap.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Table 25-73 APN Profile Properties in Logical Inventory (continued) Field Description IP Source Validation Configures settings related to IP source violation detection with one of the following criteria: • deactivate—Deactivates the PDP context with one of the following conditions: – Deactivates all PDP contexts of the MS/UE. Default is to deactivate errant PDP contexts.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Table 25-73 APN Profile Properties in Logical Inventory (continued) Field Description DNS Query Charging Characteristics ID Format Gateway Entries Format of the charging characteristic information to be included. Gateway Entry Gateway entry configured for the APN profile. IP Address IPv4 or IPv6 addresses of the gateway configured.
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Table 25-73 APN Profile Properties in Logical Inventory (continued) Field Description Minimum Transfer Delay Minimum transfer delay, in milliseconds. Residual BER Undetected bit error ratio (BER) in the delivered SDUs. MBR Map Down Attribute that maps or converts the received HLR maximum bit rate (MBR) (from value) to a locally configured downlink MBR value (to value).
Chapter 25 Monitoring Mobile Technologies Viewing Operator Policies, APN Remaps, and APN Profiles Step 3 Expand the APN Profile node. The following list of characteristics configured for the APN profile are displayed: – PDP Inactivity Actions—Attributes related to PDP data inactivity.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-74 APN Profile Additional Characteristics (continued) Field Description QoS Class Background Indicates whether background traffic class of service is enabled or not. QoS Class Interactive Indicates whether interactive traffic class of service is enabled or not. QoS Class Streaming Indicates whether streaming traffic class of service is enabled or not.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service • Routing Ruledefs—Routing ruledefs are used to route packets to content analyzers. Routing ruledefs determine which content analyzer to route the packet to, when the protocol fields and/or protocol states in ruledef expression are true. • Charging Ruledefs—Charging ruledefs are used to specify what action to take based on the analysis done by the content analyzers.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Viewing Active Charging Services You can view the active charging services in logical inventory as shown in Figure 25-18.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-75 Active Charging Services in Logical Inventory Field Description Service Name Name of the active charging service. TCP Flow Idle Timeout Maximum duration, in seconds, a TCP flow can remain idle. UDP Flow Idle Timeout Maximum duration, in seconds, a UDP flow can remain idle. ICMP Flow Idle Timeout Maximum duration, in seconds, an Internet Control Message Protocol (ICMP) flow can remain idle.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Viewing Content Filtering Categories To view content filtering categories in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services >ACS >Content Filtering Categories. Prime Network Vision displays the list of content filtering categories configured under the container.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service volume from the quota according to the traffic analysis rules. When the subscriber’s quota gets to the threshold level specified by the prepaid rating and charging server, system sends a new access request message to the server and server updates the subscriber's quota. The charging server is also updated at the end of the call.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-77 Credit Control Properties in Logical Inventory (continued) Field Description Secondary Peer Secondary hostname. Secondary Realm Realm for the secondary host. IMSI Range Mode Mode of peer selection based on IMSI prefix or suffix. IMSI Start Value Starting value of the IMSI range for peer selection. IMSI End Value Diameter Ending value of the IMSI range for peer selection.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-77 Credit Control Properties in Logical Inventory (continued) Field Description Volume Threshold Volume threshold limit for subscriber quota in the prepaid credit control service. Server Unreachable Failure Handling Initial Request Failure handling behavior if server is unreachable during initial session establishment. Value could be continue or terminate.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-78 Charging Action Properties in Logical Inventory (continued) Field Description Service ID Configured service ID used to associate the charging action in rule definitions configuration. Charging EDR Name Name of the EDR format for the billing action in the ACS. EGCDRs Indicates whether eG-CDRs must be generated when the subscriber session ends or an interim trigger condition occurs.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-78 Charging Action Properties in Logical Inventory (continued) Field Description Downlink Indicates whether downlink flow limit is configured for the subscriber or not. Charging Action Bandwidth Direction Direction Direction of the packet flow: Uplink or Downlink Peak Data Rate Peak data rate configured for the uplink or downlink packet flow.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-78 Charging Action Properties in Logical Inventory (continued) Field Description EDR Name of the EDR format for the billing action in the ACS. EGCDR Indicates whether eG-CDRs must be generated when the subscriber session ends or an interim trigger condition occurs. Rf Indicates whether Rf accounting is enabled or not.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-79 Rule Definition Group Properties in Logical Inventory Field Description Name Name of the rule definition group. Application Type Purpose of the rule definition, which could be charging, routing, post-processing, or Traffic Performance Optimization (TPO). Copy Packet To Log Indicates whether to copy every packet that matches the rule to a log file.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-80 describes the details available for each rule definition group. Table 25-80 Rule Definition Group Properties in Logical Inventory Field Description Name Name of the rule definition group. Application Type Purpose of the rule definition group, which could be charging, routing, content filtering, post-processing, or Traffic Performance Optimization (TPO).
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service To view a rule base in logical inventory: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services > ACS > Rulebase Container. Prime Network Vision displays the list of rule bases configured under the container.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-82 Rule Base Properties in Logical Inventory (continued) Field Description Charging Action Priorities tab Charging rule definitions and their priorities in the rulebase. Routing Action Priorities tab Routing actions and their priorities in the rulebase. Post Processing Action Priorities Post-processing actions and their priorities in the rulebase.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Viewing Fair Usage Properties To view fair usage properties configured for the ACS: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > local > Mobile > Active Charging Services > ACS > Fair Usage. Prime Network Vision displays the details on the content pane. Table 25-84 describes the fair usage properties.
Chapter 25 Monitoring Mobile Technologies Working with Active Charging Service Table 25-85 Active Charging Services Configuration Commands Command Navigation Description Create Ruledef Expand Active Charging Services node > right-click ACS service > Commands > Configuration Rule definitions (Ruledefs) are user-defined expressions, based on protocol fields and/or protocol-states, which define what actions to take when specific field values are true.
Chapter 25 Monitoring Mobile Technologies Mobile Technologies Commands: Summary Table 25-85 Active Charging Services Configuration Commands (continued) Command Navigation Description Create Charging Action Expand Active Charging Services node > right-click ACS service > Commands > Configuration Charging Action is an action taken on the incoming data packets once the data packets are treated by the routing and charging rule components.
Chapter 25 Monitoring Mobile Technologies Mobile Technologies Commands: Summary Command Navigation Description Create AAA Group Context > Commands > Configuration AAA refers to Authentication, Authorization, and Accounting, which is a security architecture for distributed systems that determines the access given to users for specific services and the amount of resources they have used. Use this command to create a new AAA group.
Chapter 25 Monitoring Mobile Technologies Mobile Technologies Commands: Summary Command Navigation Description Create GGSN Context > Commands > Configuration Gateway GPRS Support Node (GGSM) is the gateway between the GPRS wireless data network and other external packet data networks such as radio networks, IP networks, or private networks. GGSN provides network access to external hosts wishing to communicate with mobile subscribers (MS). Use this command to create a GGSN service.
Chapter 25 Monitoring Mobile Technologies Mobile Technologies Commands: Summary Command Navigation Description Create DHCP DHCP is used to automate host configuration by assigning IP Context > addresses, delegating prefixes (in IPv6), and providing extensive Commands > Configuration > configuration information to network computers. DHCP Use this command to create a DHCP service. Delete DHCP Use this command to delete a DHCP service.
Chapter 25 Monitoring Mobile Technologies Mobile Technologies Commands: Summary Command Navigation Description Create Route Access List Context > Commands > Configuration > Route Map and Route Access List Access lists are a set of rules, organized in a rule table and are used to filter and identify traffic. Create Route Map Use this command to create a new access list.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Command Navigation Create Policy Accounting Use this command to create a new accounting policy. Right-click on context > Commands > Configuration > Policy Accounting Modify Policy Accounting Use these commands to modify/delete an accounting policy.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Figure 25-19 depicts the topology of the LTE network along with MME: Figure 25-19 MME Topology The different features of the MME are listed below: • Involved in bearer activation/deactivation • Provides P-GW selection to the subscriber to connect to PDN • Tracks the UE for idle mode and paging procedures, including transmissions • Chooses the S-GW for a UE during initial attach and also at the time of intra-LTE h
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity • S1-MME Interface—The interface used by MME to communicate with eNodeBs on the same PLMN. This interface is the reference point for the control plane protocol between eNodeB and MME, this interface uses the S1 Application Protocol (SI-AP) instead of the Stream Control Transmission Protocol (SCTP) as the transport layer protocol for guaranteed delivery of signaling messages between MME and eNodeB.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Figure 25-20 MME Configuration Details Table 25-86 displays the MME service details. Table 25-86 MME Service Details Field Description Service Name The unique name of the MME service. Status The status of the MME service, which can be any one of the following: • Unknown • Initiated • Running • Down • Started • Not Started MME Group ID The unqiue ID of the group to which the MME service belongs to.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-86 MME Service Details (continued) Field Description SGS Service The name of the SGS peer service associated with the MME service, which is pre-configured for the selected context. Peer MME DNS Context The DNS client service that is used to query and select a peer MME. The peer MME is then associated with the MME service to be used for inter-MME handovers.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-86 MME Service Details (continued) Field Description UE DB Purge Timeout The amount of time (in minutes) after which the User Equipment is attached to the MME service and reuses the previously established security parameters. Note The UE database is maintained by the MME as a cache of the EPS context for each UE. This cache is maintained in each session manager where the UE was attached first.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-86 MME Service Details (continued) Field Description Weight The weightage assigned to a P-GW address, which indicates the address that must be used as the preferred P-GW. This weight can be any value between 1 and 100 and the address with the lowest values indicates the least preferred address. Peer MME GUMMEI tab MME ID The unique MME ID of the peer MME. PLMN ID The PLMN ID of the peer MME service.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-86 MME Service Details (continued) Field Description S16 Interface Indicates whether the peer SGSN service is allowed to communicate over the S16 Interface. S3 Interface Indicates whether the peer SGSN service is allowed to communicate over the S3 Interface.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-87 EMM Configuration Details (continued) Field Description T3412 Timeout The timeout duration (in seconds) for the T3412 timer, which is used for periodic tracking area update (P-TAU). This time can be any value between 1 and 11160, and defaults to 5400. When this timer expires, the periodic tracking area update procedure starts and the timer is reset for the next start.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-88 ESM Configuration Details Field Description T3485 Timeout The timeout duration (in seconds) for the T3485 timer, which is used to activate the default EPS Bearer context. The timer starts when the MME sends the Activate Default EPS Bearer Context Request message to the UE.
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-89 LTE Security Procedure Configuration Details Field Description Encryption Algorithm Priority 1 The encryption algorithm that must be treated as the first priority for security procedures on the MME service, which can be any one of the following values: Encryption Algorithm Priority 2 Encryption Algorithm Priority 3 Integrity Algorithm Priority 1 Integrity Algorithm Priority 2 • 128-eea0—Null Cipherin
Chapter 25 Monitoring Mobile Technologies Monitoring the Mobility Management Entity Table 25-90 Policy Configuration Details Field Description IMEI Query type The type of IMEI query use for attaching the user equipment and tracking area update procedure,which can be any one of the following: • imei (International Mobile Equipment Identity) • imei-sv (International Mobile Equipment Identity-Software Version) Set UE Time Indicates whether the MME serivce must set the time in the UE during the att
Chapter 25 Monitoring Mobile Technologies Viewing the Stream Control Transmission Protocol Table 25-91 S1 Interface Configuration Details (continued) Field Description QoS DSCP The Quality of Service (QoS) Differentiated Service Code Point (DSCP) used when sending data packets (of a particular 3GPP QoS class) over the S1-MME interface.
Chapter 25 Monitoring Mobile Technologies Viewing the Stream Control Transmission Protocol • Optional bundling of multiple user messages into a single SCTP packet • Network-level fault tolerance through supporting of multi-homing at either or both ends of an association The SCTP application submits data to be transmitted in messages to the SCTP transport layer. The messages and control information is separated and placed in chunks (data and control chunks), each identified by a chunk header.
Chapter 25 Monitoring Mobile Technologies Viewing the Stream Control Transmission Protocol Figure 25-21 SCTP Template Details Table 25-92 describes the SCTP Template details. Table 25-92 SCTP Template Details Field Description Template Name The unique name of the SCTP template.
Chapter 25 Monitoring Mobile Technologies Viewing the Stream Control Transmission Protocol Table 25-92 SCTP Template Details (continued) Field Description Checksum The type of checksum that is used to increase data integrity of the SCTP packets, which can be any one of the following: • adler32—the Adler-32 checksum algorithm is used • crc32—the 32 bit cyclic redundancy check algorithm is used. Cookie Lifetime The lifetime (in milliseconds) of the SCTP cookie.
Chapter 25 Monitoring Mobile Technologies Viewing the Stream Control Transmission Protocol Table 25-92 SCTP Template Details (continued) Field Description Bundle Timeout The amount of time (in seconds) after which the chunks of SCTP packets are bundled and committed for transmission. Alternate Accept Flag Indicates whether the alternate accept flag that denotes additional lifetime for the association, is enabled. Cisco Prime Network 4.
Chapter 25 Monitoring Mobile Technologies Viewing the Stream Control Transmission Protocol Cisco Prime Network 4.
CH A P T E R 26 Monitoring Data Center Configurations Data Center is a centralized repository, either physical or virtual for the storage, management, dissemination of data and information organized around a particular manner. In other words, it is a facility used to house computer systems and associated components, such as telecommunications and storage systems.
Chapter 26 Monitoring Data Center Configurations User Roles Required to Work with Data Center Configurations Table 26-1 Devices supported as part of Data Center (continued) Device Type Device Non Cisco Servers Dell Blade Server IBM Blade Server (PowerEdge Servers) IBM Blade Server (Intel Servers) Prime Network supports the following technologies as part of data center: • Virtual Port Channel (vPC), page 26-3 • Cisco FabricPath, page 26-7 • Virtualization, page 26-11 • Viewing the Storage Are
Chapter 26 Monitoring Data Center Configurations Virtual Port Channel (vPC) Table 26-2 Default Permission/Security Level Required for the Data Center Configurations Task Viewer Operator OperatorPlus Configurator Administrator Viewing the Data Stores X of a Data Center X X X X Viewing the Host X1 Servers of a Data Center X1 X1 X1 X1 Viewing the Virtual Machines of a Data Center X1 X1 X1 X1 X1 Viewing Host Cluster Details X1 X1 X1 X1 X1 Viewing Resource Pool X1 Details X1 X1
Chapter 26 Monitoring Data Center Configurations Virtual Port Channel (vPC) Figure 26-1 vPC Architecture vPC domain Nexus 7000 device vPC peer link Nexus 7000 device vPC device vPC device 273225 Peer-keepalive link A vPC consists of the following components: • Two vPC peer switches, among which one is primary and one is secondary. The system formed by the two peer switches is referred to as a vPC domain.
Chapter 26 Monitoring Data Center Configurations Virtual Port Channel (vPC) Viewing Virtual Port Channel Configuration To view the vPC configuration details in Prime Network Vision: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > VPC Domain. The vPC domain details are displayed in the content pane as shown in Figure 26-2. Figure 26-2 vPC Domain in Logical Inventory Table 26-3 describes the vPC domain details.
Chapter 26 Monitoring Data Center Configurations Virtual Port Channel (vPC) Table 26-3 vPC Domain Properties Field Name Description Domain ID Unique ID that is used to identify the vPC peer links and ports connected to the vPC downstream devices. Peer Status Status of the peer link. Keep Alive Status Status of the keep alive link, which could be Alive or Down. Consistency Status Consistency status of the vPC, which could be Success or Failed.
Chapter 26 Monitoring Data Center Configurations Cisco FabricPath Viewing vPC Configuration The following commands can be launched from the inventory by right-clicking VPC Domain and choosing Commands > Show. The table below lists vPC show commands. Additional commands may be available for your devices. New commands are often provided in Prime Network Device Packages, which can be downloaded from the Prime Network software download site.
Chapter 26 Monitoring Data Center Configurations Cisco FabricPath Cisco FabricPath provides the following features: • Allows Layer 2 multipathing in the FabricPath network. • Provides built-in loop prevention and mitigation with no need to use the Spanning Tree Protocol (STP). • Provides a single control plane for unknown unicast, broadcast, and multicast traffic. • Enhances mobility and virtualization in the FabricPath network.
Chapter 26 Monitoring Data Center Configurations Cisco FabricPath Viewing Cisco FabricPath Configuration To view the FabricPath configuration in Prime Network Vision: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > FabricPath. The FabricPath configuration details are displayed in the content pane as shown in Figure 26-4. You can also view the properties, by right-clicking the FabricPath node and choosing Properties.
Chapter 26 Monitoring Data Center Configurations Cisco FabricPath Table 26-4 Cisco FabricPath Configuration Field Name Description Switch ID Unique ID of the Cisco FabricPath virtual switch. System-ID System MAC address of the Cisco FabricPath. Gracefulmerge Disabled Indicates whether graceful merge feature is enabled are not. Value could be True or False. If this feature is enabled, the switch would be effectively linked to the Cisco FabricPath network.
Chapter 26 Monitoring Data Center Configurations Virtualization Command Navigation Description FabricPath Conflict Right-click on the FabricPath node > Commands > Show Use this command to view the Cisco FabricPath conflicts. MAC Address-Table Learning Mode Use this command to view the MAC address-table learning mode.
Chapter 26 Monitoring Data Center Configurations Virtualization The various components of virtualization are: Hypervisor (Host Server) A hypervisor, also called a blade server, a virtual machine manager, or a host server, is a program that allows multiple operating systems to share a single hardware host. Each operating system appears to have the host's processor, memory, and other resources all to itself.
Chapter 26 Monitoring Data Center Configurations Virtualization Viewing Virtual Data Centers To view the virtual data centers in the logical inventory: Step 1 Right-click on the required device and choose the Inventory option. Step 2 In the Inventory window, choose Logical Inventory > Compute Virtualization. The virtual data centers are listed in the content pane. Table 26-5 describes the virtual data center properties.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-6 Data Store Properties Field Name Description Name Name of the data store. Storage Type Type of data storage for the data store. Capacity Capacity of the data store, in GB. Free Space Free space of the data store, in GB. Provisioned Space The amount of provisioned space available for the data store. Accessible Indicates whether the data store is accessible or not. Value could be True or False.
Chapter 26 Monitoring Data Center Configurations Virtualization Figure 26-6 Host Server Details Table 26-7 describes the host server details. Cisco Prime Network 4.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-7 Host Servers of a Data Center Field Name Description Name Name of the host server. IP Address The IP address of the host server. DNS Name The domain name of the host sever. State Management state of the host server. EVC Mode Enhanced vMotion Capability (Evc) of the host server. VMotion Enabled Indicates whether vMotion service is enabled or not.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-7 Host Servers of a Data Center (continued) Field Name Description Statistics tab CPU Usage CPU usage by the host server, in GHz. Memory Usage Memory usage by the host server, in GB. Disk Usage CPU Allocation tab Amount of disk space used by the host server, in GB. Resource Type The type of resource, which in this instance is CPU. Allocatable Maximum CPU allocation for the host center, in GHz.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-7 Host Servers of a Data Center (continued) Field Name Description Duplex Mode Communication mode, which could be one of the following: • Half—Transmit data in one direction at a time. • Full—Transmit data in both the directions at the same time. Compute Resource Pool Provider Name The compute resource pool name. Description The description of the compute resource pool. Status The status of the compute resource pool.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-8 Virtual Machines Field Name Description Name Name of the associated data center. Virtual Machines VM ID The unique identification code for the virtual machine. VM Name The name of the virtual machine. Data Center Name The name of the data center associated to the virtual machine. Associated VM Entity The associated virtual machine entity. Hypervisor The hypervisor associated tot he virtual machine.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-9 Virtual Machine Properties Field Name Description VM ID The unique identification code of the virtual machine. Name Name of the virtual machine. IP Address IP address of the virtual machine. DNS Name Domain name of the virtual machine. MAC Address MAC Address of the virtual machine. State Execution state of the virtual machine, which could be Powered On, Powered Off, or Suspended.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-9 Virtual Machine Properties (continued) Field Name Description Expandable Allocation Expandable allocation availability for the virtual machine. Value could be true or false. Share Relative importance of the virtual machine for CPU allocation, which could be High, Normal, or Low. Custom Share Weight Custom share weight assigned to the virtual machine. Memory Allocation tab Resource Type The type of resource.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-9 Virtual Machine Properties (continued) Field Name Description MAC Address MAC address of the virtual entity network endpoint. Duplex Mode Communication mode, which could be one of the following: • Half—Transmit data in one direction at a time. • Full—Transmit data in both the directions at the same time. Operational Status The operational status of the virtual machine.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-10 describes the Host Cluster details. Table 26-10 Host Cluster Details Field Name Description Name The name of the host cluster. Data Center Name The name of the associated data center. Description The description of the host cluster.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-10 Host Cluster Details (continued) Field Name Description Share The relative importance of the virtual machine for memory allocation, which could be High, Normal, or Low. Custom Share Weight Statistics tab The custom share weight assigned to the virtual machine. CPU Usage CPU usage by the virtual machine, in GHz. Memory Usage Memory usage by the virtual machine, in GB.
Chapter 26 Monitoring Data Center Configurations Virtualization Table 26-11 Resource Pool Properties Field Name Description Name The compute resource pool name. Provider Name The description of the compute resource pool. Status The status of the compute resource pool. Root Pool CPU Allocation tab Indicates whether the compute resource pool is the root pool. Resource Type The type of resource, which in this instance is CPU.
Chapter 26 Monitoring Data Center Configurations Viewing the Map Node for an UCS Network Element Viewing the Map Node for an UCS Network Element Using Prime Network Vision, you can view the physical layout and topology among the multi-chassis devices on the map. The multi-chassis devices have more than one physical chassis, but they are represented as a single entity in Prime Network. In a map, this device is shown as an aggregation of all the device chassis.
Chapter 26 Monitoring Data Center Configurations Viewing the Map Node for an UCS Network Element Step 5 Close the inventory window. Each of these parts, i.e. the blade servers, Fabric InterConnect chassis, and IO Modules, can be connected to each other internally. For example, an IO Module can be connected to a blade server or there could also be a link between the IO Module and Fabric InterConnect chassis.
Chapter 26 Monitoring Data Center Configurations Viewing the Map Node for an UCS Network Element Note Sub-nodes are available for the chassis that have blade servers under them. You can expand/contract these sub-nodes to view more details. However, the elements under the Fabric InterConnect chassis will not be displayed in the map.You can also view the inventory for an element by double-clicking on a node in the map. The inventory window will open with the selected node.
Chapter 26 Monitoring Data Center Configurations Viewing the Virtual Network Devices of a Data Center Viewing the Virtual Network Devices of a Data Center Prime Network supports the following virtual network devices of a data center: • Cisco Cloud Service Router (CSR) 1000v • Virtual Security Gateway Viewing the CSR 1000v Properties The Cisco Cloud Services Router (CSR) 1000V is a single-tenant router in virtual form-factor that delivers comprehensive WAN gateway functionality to multi-tenant provider
Chapter 26 Monitoring Data Center Configurations Viewing the Virtual Network Devices of a Data Center Figure 26-11 Element Properties Window Note The CSR 1000v device is associated with a hypervisor and physically available on a blade server. The links to the hypervisor and blade server are displayed in the Properties window. Step 4 Under the Logical Inventory node, you can view the Access Lists, Cisco Discovery Protocol, Operating System requirements, and Routing Entities.
Chapter 26 Monitoring Data Center Configurations Viewing the Virtual Network Devices of a Data Center Figure 26-12 depicts the deployment of VSG: Figure 26-12 Deployment of VSG The Cisco VSG operates with the Cisco Nexus 1000V in the VMware vSphere hypervisor, and the Cisco VSG leverages the virtual network service datapath (vPath) that is embedded in the Nexus 1000V Virtual Ethernet Module (VEM). A VEM can be associated to a Cisco VSG.
Chapter 26 Monitoring Data Center Configurations Viewing the Compute Server Support Details Viewing the Compute Server Support Details Prime Network provides support for the following compute servers: • UCS B-Series Servers—The Cisco UCS B-Series Blade Servers are crucial building blocks of the Cisco Unified Computing System and are designed to increase performance, energy efficiency, and flexibility for demanding virtualized and non virtualized applications.
Chapter 26 Monitoring Data Center Configurations Viewing the Compute Server Support Details Figure 26-13 Blade Server Configuration Details Table 26-12 describes the configuration details of a blade server. Table 26-12 Blade Server Configuration Details Field Name Description Name The name of the blade server. Uuid The unique ID of the blade server. Status The status of the server. Maximum Memory The total amount of memory (in gigabytes) available on the server.
Chapter 26 Monitoring Data Center Configurations Viewing the Compute Server Support Details Table 26-12 Blade Server Configuration Details (continued) Field Name Description Cores The number of cores used by the blade server. Used Speed The actual used speed of the processor, in GHz. Rated Speed The rated speed of the processor, in GHz. RAM Size The RAM size of the processor, in GB. NvRAM Size The NvRAM Size of the processor, in GB.
Chapter 26 Monitoring Data Center Configurations Viewing the Compute Server Support Details Table 26-12 Blade Server Configuration Details (continued) Field Name Description IP Address The IP address of the hypervisor. Name The name of the hypervisor. State The status of the hypervisor, which could be Running, Runnable, Waiting, Exiting, or Other. Vendor The name of the vendor for the hypervisor.
Chapter 26 Monitoring Data Center Configurations Viewing the Compute Server Support Details Step 3 Select the Server node. The server configuration details are displayed in the content pane along with the details of the operating system available in the server.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Viewing the Storage Area Network Support Details A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SANs are primarily used to make storage devices, such as disk arrays, tape libraries, and optical jukeboxes, accessible to servers so that the devices appear like locally attached devices to the operating system.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Figure 26-14 VSAN Configuration Details Table 26-13 describes the VSAN configuration details. Cisco Prime Network 4.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Table 26-13 VSAN Configuration Details Field Name Description VSAN ID The unique identification code of the VSAN. Name The name of the VSAN. Admin Status The administrative status of the VSAN, which can be any one of the following: Oper Status Load Balancing Type • Active—Indicates that the VSAN is configured and enabled and that you can activate the services of the VSAN.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Table 26-13 VSAN Configuration Details (continued) Field Name Description Admin Status The administrative status of the interface, which can be any one of the following: Oper Status Trunk Oper Mode • Up • Down The operational status of the interface, which can be any one of the following: • Up • Down • Trunking The operational status of the trunk mode for a VSAN interface, which can be any
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Table 26-13 VSAN Configuration Details (continued) Field Name Description Oper Port Mode The operational port mode of the port. Allowed VSANs The VSANs that are active and allowed to receive data for the specified VSAN range. The port will allow traffic for the VSANs specified here. Native VSAN The VSAN ID to which the FC port belongs.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Table 26-14 FC Configuration Details Field Name Location Information Description Type The type of fibre interface, which can be any one of the following: • Fibre Channel Location The location of the FC/FCoE interface. Sending Alarms Indicates whether the port is sending all alarms correctly. Port Alias The port alias of the interface. Managed The managed status.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Table 26-14 FC Configuration Details (continued) Field Name Description RxB2B Credit The Receive Buffer to Buffer Credit value for the fibre channel. This value is configured for each interface.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Table 26-15 FCoE Configuration Details (continued) Field Name Description Allowed VLANs TenGigabit Ethernet The list of the VLANs allowed on this VLAN interface. MAC Address The MAC address. Ethernet LMI Enabled Indicates whether the Ethernet Local Management Interface (LMI) is enabled. Discovery Protocols Discovery Protocol Type The type of discovery protocol, which can be CDP or LLDP.
Chapter 26 Monitoring Data Center Configurations Viewing the Storage Area Network Support Details Figure 26-15 Fibre Channel Link Aggregation Table 26-16 describes the Fibre Channel Link Aggregation Properties. Table 26-16 Fibre Channel Link Aggregation Properties Field Name Description Channel ID The unique identification code for the aggregation. Channel Description The description of the aggregation. Admin Status The administrative status of the aggregation.
Chapter 26 Monitoring Data Center Configurations Searching for Compute Services Viewing Fibre Channel Links Between Devices in a Map To view the FC links between devices in a map: Step 1 In Prime Network Vision, open the map that contains the Fibre Channel links. Step 2 Click on the Filter icon in the navigation menu and select only the Fibre Channel check box. Click OK. The map that you have opened only displays the Fibre Channel links between devices.
Chapter 26 Monitoring Data Center Configurations Searching for Compute Services Figure 26-16 Note Compute Service Search You can also click the Show All radio button to view a list of devices with hypervisors, blade servers, and virtual machines. Table 26-17 describes the compute services search results. Table 26-17 Compute Services Search Result Field Name Description Severity The severity of the device. Name The name of the device.
Chapter 26 Monitoring Data Center Configurations Searching for Compute Services Cisco Prime Network 4.
CH A P T E R 27 Monitoring Cable Technologies Cable broadband communication operates in compliance with the Data Over Cable Service Interface Specification (DOCSIS) standard which prescribes multivendor interoperability and promotes a retail model for the consumer's direct purchase of a cable modem (CM) of choice.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies service provider. On the subscriber side of the headend, the CMTS enables the communication with subscribers' cable modems. A single CMTS can accommodate thousands of cable modems, and provides the connection point to the Internet backbone.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies For more information on user authorization, see the Cisco Prime Network 4.0 Administrator Guide. By default, users with the Administrator role have access to all managed elements. To change the Administrator user scope, see the topic on device scopes in the Cisco Prime Network 4.10 Administrator Guide.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies • Wideband Channels—A Wideband Channel or Bonded Group (BG) is a logical grouping of one or more physical RF channels over which MPEG-TS packets are carried. Wideband channel carries DOCSIS bonded packets encapsulated in MPEG-TS packets from a WCMTS to one or more WCMs. The wideband channel, comprising of one or more RF channels on the EQAM device, is used for DS data traffic.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies Table 27-2 DTI Client Configuration Details (continued) Field Description Root Server Source The clock source of the DTI server, which can be any one of the following: Server Type • Internal • External • GPS • None The type of DTI Server, which can be any one of the following: • Root • User Time • NTPV 4 • GPS Client Performance Stable Indicates the stability of the performance of the DTI c
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies Table 27-3 describes the QAM Domain configuration details. Table 27-3 QAM Domain Configuration Details Field Description QAM Domain ID QAM Domain The unique identification code of the QAM domain. QAM Domain ID The unique identification code of the QAM domain. UDP Start Range The starting port in the range of UDP ports for the video route.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies Table 27-4 MAC Domain Configuration Details (continued) Field Description Status The status of the upstream channel, which can be any one of the following: • Up • Down • Administrative Up • Administrative Down • Unknown Port The port to which the upstream channel is associated with. Frequency The frequency of the upstream channel. Channel width The width of the upstream channel.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies Viewing the Narrowband Channels Configuration Details To view the Narrowband channels configuration details: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 In the logical inventory window, choose Logical Inventory > Narrowband Channels > Narrowband channel cable. The Narrowband channels configuration details are displayed in the content pane.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies Table 27-6 Wideband Channels Configuration Details Field Description Wideband Name The name of the wideband channel. Status The status of the wideband channel, which can be any one of the following: Bonding Group ID • Up • Down • Administrative Up • Administrative Down • Unknown The unique identification code of the bonding group.
Chapter 27 Monitoring Cable Technologies User Roles Required to Work with Cable Technologies Table 27-6 Wideband Channels Configuration Details (continued) Field Description MAC Address The MAC address that is assigned to the RF channel for downstream data transmission. DEPI Remote ID The Downstream External PHY Interface (DEPI) remote session ID that is assigned to the RF channel.
Chapter 27 Monitoring Cable Technologies Configure Cable Ports and Interfaces Configure Cable Ports and Interfaces These commands help in configuring the cable ports and IP interface. The table below lists the navigation of each of these commands. To run the these commands, the software on the network element must support the technology. Before executing any commands, you can preview them and view the results.
Chapter 27 Monitoring Cable Technologies View Upstream and Downstream Configuration for Cable Configure Cable Interfaces Command Navigation Description Create IP Interface Logical Inventory > Routing Entities > Routing Entity > Commands > Configuration Configure IP interface as part of the routing entity for the selected device.
Chapter 27 Monitoring Cable Technologies View QAM Configurations Configure RF and Frequency Profiles Command Navigation Create RF Profile NE > Configures a combination of RF attributes to Commands > Configurati be used across all line cards in the chassis. on > RF Profile Modify RF Profile Description Delete RF Profile Delete Frequency Profile NE > Configure the frequency profile at the port Commands > Configurati level.
Chapter 27 Monitoring Cable Technologies Configure DEPI and L2TP Configure DEPI and L2TP These commands help in configuring the Downstream External PHY Interface (DEPI) and Layer 2 Tunnel Protocol (L2TP). The table below lists the navigation of each of these commands. To run these commands, the software on the network element must support the technology. Before executing any commands, you can preview them and view the results.
CH A P T E R 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements This chapter discusses the following technology enhancements in Prime Network: • ADSL2+ • VDSL2 • Bonding Group Each of these technologies are discussed in the following topics covered in this section: • User Roles Required to Work with ADSL2+/VDSL2 Technologies, page 28-1 • Viewing the ADSL2+/VDSL2 Configuration Details, page 28-2 • Viewing the DSL Bonding Group Configuration Details, page 28-5 User Roles Required to Work wit
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Table 28-1 Default Permission/Security Level Required for ADSL2+/VDSL2 technology enhancements Task Viewer Operator OperatorPlus Configurator Administrator Viewing the ADSL2+/VDSL2 Configuration details X X X X X Viewing the ADSL/ADSL2+ Physical Inventory details for a device X X X X X Viewing the DSL Bonding Group Configuration details X X X X X Viewing the
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Figure 28-1 XDSL Traffic Descriptor Details Table 28-2 describes the XDSL Traffic Descriptor details. Table 28-2 XDSL Traffic Descriptor Details Field XDSL Traffic Descriptors Description Profile Name The name of the ADSL2+/VDSL2 profile. Transmission System The operating mode of the transmission system.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Table 28-2 XDSL Traffic Descriptor Details Field Description Tx Maximum Noise Margin [dB] The maximum amount of noise (in decibel) transmitted by XDSL TU-C/TU-R. Rx Maximum Noise Margin [dB] The maximum amount of noise (in decibel) received by XDSL TU-C/TU-R. Transmission System The operating mode of the transmission system.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies The Operating Mode indicates whether the device is an ADSL2 or VDSL 2 device. The Aggregation Group indicates whether the port is associated to a DSL bonding group. This is a link, which when clicked will take you to the relevant bonding group in the DSL Bonding Group node.For more information about the attributes in this section, refer to Table 28-2.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Table 28-3 describes the DSL Bonding Group details. Table 28-3 DSL Bonding Group Details Field Description Physical Link Aggregations ID The unique identification code of the DSL bonding group. Group Number The group number for the DSL bonding group. Description The description of the DSL bonding group.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Table 28-3 DSL Bonding Group Details Field Description Peer Admin Scheme The peer administrative scheme of the DSL bonding group, which can be any one of the following: Peer Oper Scheme • G998.1 • G998.2 • Unknown The peer operational scheme of the DSL bonding group, which can be any one of the following: • G998.1 • G998.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Viewing Transport Models Supported by ADSL2+ and VDSL2 In Prime Network, the following transport models are supported in the ADSL2+ and VDSL2 technologies: • N-to-One—In this most commonly used model, a Service VLAN tag (S-Vid) is assigned to a service throughout the network.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Table 28-4 describes the N-to-One Access Profile details. Table 28-4 N-to-One Access Profiles Field Description Table Types The type of access profile, which in this instance is N-to-One Access Profiles. N-to-One Access Profiles Input Service The input service policy applicable to the device. IGMP Source Address The Internet Group Management Protocol (IGM) source address.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Viewing the One-to-One Access Profile To view the One-to-One access profile details, expand the logical inventory and choose One-to-One Access Profiles. Figure 28-4 One-to-One Access Profile Table 28-5 describes the N-to-One Access Profile details.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Viewing the TLS Access Profile To view the TLS access profile details: Step 1 Right-click the required device in Prime Network Vision and choose Inventory. Step 2 Expand the Logical Inventory node and choose TLS Access Profiles. The relevant details are displayed in the content pane as shown in Figure 28-5.
Chapter 28 Monitoring ADSL2+ and VDSL2 Technology Enhancements User Roles Required to Work with ADSL2+/VDSL2 Technologies Cisco Prime Network 4.
REVIEW DRAFT—CISCO CONFIDENTIAL A P P E N D I X A Icon and Button Reference The following topics identify the buttons, icons, and badges used in Cisco Prime Network Vision (Prime Network Vision) and Cisco Prime Network Events (Prime Network Events): • Icons, page A-1 • Links, page A-10 • Severity Icons, page A-13 • Buttons, page A-14 • Badges, page A-19 Icons The following topics describe the icons used in Prime Network Vision: • Network Element Icons, page A-2 • Business Element Icons, page
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Network Element Icons Table A-1 Icon Prime Network Vision Network Element Icons Network Element Access pseudowire Router Cisco ASA device ATM switch Basic rate access (BRA) Cisco 7600 series router Cisco ASR 1000 series router Cisco ASR 5000 series router Cisco ASR 9000 series router Cisco CRS series router Cisco IOS XR 12000 series router Cisco MWR 3941 Cisco Nexus 1000 series Cisco Unified Computing System (UCS) 6
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-1 Icon Prime Network Vision Network Element Icons (continued) Network Element Cloud Digital subscriber line access multiplexer (DSLAM) Ethernet switch Generic Server Generic SNMP device Ghost, or unknown device ICMP device Lock, or security violation; viewable by a user with a higher permission level Missing icon, displayed in either of the following situations: • A device has been deleted via Prime Network Admin
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-1 Icon Prime Network Vision Network Element Icons (continued) Network Element Printer RFGW-10 device Service control switch UBR 10012 device UCS C Series device vCenter device Virtual Security Gateway (VSG) device WiFi element Business Element Icons Table A-2 Icon Prime Network Vision Business Element Icons Business Element Aggregation or root node Backup pseudowire edge Business IP interface Connection ter
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-2 Icon Prime Network Vision Business Element Icons (continued) Business Element Customer EFP cross-connect Ethernet service Ethernet virtual connection (EVC) Label-Switched Path (LSP) endpoint LSP midpoint Network LSP Network pseudowire Network TP tunnel Network VLAN Protected LSP Pseudowire edge Pseudowire switching entity Site Cisco Prime Network 4.
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-2 Icon Prime Network Vision Business Element Icons (continued) Business Element Subnet Switching entity TP tunnel endpoint Virtual router VPLS forward VPLS instance VPN Working LSP Cisco Prime Network 4.
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Logical Inventory Icons Table A-3 describes the icons used in logical inventory.
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-3 Icon Logical Inventory Icons (continued) Logical Inventory Item Probe Y.
Appendix A Icon and Button Reference Icons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-3 Icon Logical Inventory Icons (continued) Logical Inventory Item VLAN Trunk Protocol (VTP) Mobile node GGSN / SAE-GW / P-GW / S-GW / EGTP / GTPP container GGSN / SAE-GW / P-GW / S-GW / EGTP / GTPP GTPU APN container APN ACS Operator policy APN profile / APN remap Virtual data center Data store Data stores container Host server or hypervisor Host servers/hypervisor container Virtual machine Cisco Prime Ne
Appendix A Icon and Button Reference Links REVIEW DRAFT—CISCO CONFIDENTIAL Table A-3 Icon Logical Inventory Icons (continued) Logical Inventory Item Virtual machines container VSAN Compute Resource Pool Physical Inventory Icons Table A-4 describes the icons used in physical inventory.
Appendix A Icon and Button Reference Links REVIEW DRAFT—CISCO CONFIDENTIAL Link Icons Table A-5 identifies the available link types and their representation in Prime Network Vision.
Appendix A Icon and Button Reference Links REVIEW DRAFT—CISCO CONFIDENTIAL Link Colors Table A-6 Link Colors and Severity Color Severity Description Critical Critical alarm is on the link. Major Major alarm is on the link. Minor Minor alarm is on the link. Normal Link is operating normally. Selected Link is selected. Link Characteristics Table A-7 Link Characteristics Example Description Solid Line vs.
Appendix A Icon and Button Reference Severity Icons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-7 Link Characteristics (continued) Example Description Tunnel—The center color represents the severity of any alarms on the link. Arrowhead vs. No Arrowhead No arrowhead—Bidirectional link. Arrowhead Unidirectional link, with the flow in the direction of the arrowhead. Severity Icons Table A-8 identifies the severity icons used in Prime Network Events and Prime Network Vision.
Appendix A Icon and Button Reference Buttons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-8 Icon Severity Indicators (continued) Color Severity Green Cleared, Normal, or OK Medium Blue Information Dark Blue Indeterminate Buttons The following topics describe the buttons used in Prime Network Vision: • Prime Network Vision Buttons, page A-14 • Table Buttons, page A-17 • Link Filtering Buttons, page A-17 • Prime Network Events Buttons, page A-18 • Ticket Properties Buttons, page A-18 • Rep
Appendix A Icon and Button Reference Buttons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-9 Button Prime Network Vision Buttons (continued) Function Displays the map view in the Prime Network Vision content pane (the button toggles when selected or deselected). Displays the list view in the Prime Network Vision content pane (the button toggles when selected or deselected). Displays the links view in the Prime Network Vision content pane (the button toggles when selected or deselected).
Appendix A Icon and Button Reference Buttons REVIEW DRAFT—CISCO CONFIDENTIAL Table A-9 Button Prime Network Vision Buttons (continued) Function Opens the Find Business Tag dialog box, enabling you to find and detach a business tag according to a name, key, or type. Map Zoom and Layout Tools Defines the way in which the NES are arranged in the Prime Network Vision map view: circular, hierarchical, orthogonal, or symmetric. Fits the entire subnetwork or map in the map pane.
Appendix A Icon and Button Reference Buttons REVIEW DRAFT—CISCO CONFIDENTIAL Table Buttons Table A-10 Table Buttons Icon Name Description Find Searches the current table for the string you enter. Export to CSV Exports the information displayed in the list view. Either the selected rows are exported, or, when nothing is selected, the entire table is exported. Sort Table Values Sorts the information displayed in the list view (for example, according to element category).
Appendix A Icon and Button Reference Buttons REVIEW DRAFT—CISCO CONFIDENTIAL Prime Network Events Buttons Table A-12 Button Prime Network Events Buttons Function Displays the previous page of events in the Prime Network Events window. Displays the next page of events in the Prime Network Events window. Refreshes the events displayed in the log by querying the database. If a filter is active, the refresh is done according to the filter.
Appendix A Icon and Button Reference Badges REVIEW DRAFT—CISCO CONFIDENTIAL Table A-13 Ticket Properties Window Buttons (continued) Icon Description Clicking on this ticket will deacknowledge a ticket. Saves the notes for the selected ticket. This button is enabled only when text is entered in the Notes field of the Notes tab.
Appendix A Icon and Button Reference Badges REVIEW DRAFT—CISCO CONFIDENTIAL VNE Communication State Badges Table A-15 VNE Communication State Badges Badge State Name Description None Agent Not Loaded The VNE is not responding to the gateway because it was stopped, or it was just created. This communication state is the equivalent of the Defined Not Started investigation state. VNE/Agent Unreachable The VNE is not responding to the gateway.
Appendix A Icon and Button Reference Badges REVIEW DRAFT—CISCO CONFIDENTIAL Table A-16 VNE Investigation State Badges (continued) Badge State Name Description None Operational The VNE has a stable model of the device. Modeling may not be fully complete, but there is enough information to monitor the device and make its data available to other applications, such as activation scripts. A VNE remains in this state unless it is stopped or moved to the maintenance state, or there are device errors.
Appendix A Icon and Button Reference Badges REVIEW DRAFT—CISCO CONFIDENTIAL Table A-17 Icon Network Element Technology-Related Badges (continued) Description Associated LSP is in lockout state Multiple links Reconciliation REP blocking primary REP primary Redundancy service STP root Alarm and Ticket Badges See Severity Icons, page A-13 for information about the icons used for alarm and ticket badges. Cisco Prime Network 4.
REVIEW DRAFT—CISCO CONFIDENTIAL G L O S S A RY A AAA AAA refers to Authentication, Authorization, and Accounting, which is a security architecture for distributed systems that determines the access given to users for specific services and the amount of resources they have used. aggregation A user-defined collection of network elements. For example, an aggregation can contain devices, links, VPNs, and other aggregations.
Glossary REVIEW DRAFT—CISCO CONFIDENTIAL C carrier grade NAT A large-scale Network Address Translation (NAT) that provides translation of millions of private IPv4 addresses to public IPv4 addresses. CCM Change and Configuration Management provides tools that allow you to manage the software and device configuration changes that are made to devices in your network.
Glossary REVIEW DRAFT—CISCO CONFIDENTIAL G GRE Generic routing encapsulation (GRE) is a tunneling protocol, originated by Cisco Systems and standardized in RFC 2784. GRE encapsulates a variety of network layer packets inside IP tunneling packets, creating a virtual point-to-point link to devices at remote points over an IP network. H Home Agent A router on a mobile node’s home network which tunnels datagrams for delivery to the mobile node when it is away from home.
Glossary REVIEW DRAFT—CISCO CONFIDENTIAL LMA Local Mobility Anchor is the home agent for a mobile node in a Proxy Mobile IPv6 (PMIPv6) domain. It is the topological anchor point for mobile node home network prefixes and manages the binding state of an mobile node. logical link An association between two network elements (based on a chain of physical links between the elements); for example, a tunnel.
Glossary REVIEW DRAFT—CISCO CONFIDENTIAL Q QoS Quality of services is the technique of prioritizing traffic flows and specifying preferences for forwarding packets with higher priority. S SAN A storage area network (SAN) is a dedicated network that provides access to consolidated, block level data storage. SBC Session Border Controllers control and manage real-time multimedia traffic flows between IP network borders, handling signaling, and media.
Glossary REVIEW DRAFT—CISCO CONFIDENTIAL virtualization A concept of creating a virtual version of any resource, such as hardware platform, operating system, storage device, or network resources VLAN Virtual local-area network (LAN). Group of devices on one or more LANs that are configured (using management software) so that they can communicate as if they were attached to the same wire, when in fact they are located on a number of different LAN segments.
I N D EX RADIUS global configuration Numerics RADIUS protocol 3GPP inventory retrieval 25-109 create AAA group add 6rd forwarding (command) 13-6 25-138 create diameter accounting server 18-46 delete AAA group 17-1 17-1 22-12 22-12 modify AAA group IPv6 VPN over MPLS 22-12 create diameter authentication server 6VPE and IPv6 22-1 AAA commands 6rd tunnels, viewing properties 22-4 22-12 access gateway badge 3-8, A-21 viewing properties A 12-19 access list commands A10/A11 configurat
Index overview wizards 25-121 protocol analyzer 3-35 activation script, launching 25-121 rule base 2-39 Active Charging Service. See ACS for charging action, viewing 25-133 ADSL2+ 25-122 device inventory, viewing 28-4 rule definition groups DSL cable bonding group 28-5 overview commands.
Index profiles blocking 25-115, 25-119 remap tables clock service 25-113 view properties lock create QoS to DSCP mapping create virtual APN 25-22 25-22 modify APN show APN 2-34, 2-38 applying overlays 20-59 3-9, A-22 STP root 3-9, A-22 3-9, A-22 A-21 A-22 A-20 VNE investigation states A-20 VNE management states 2-19 BBA (Broadband Access) groups 20-59 24-3 BFD 18-34 associated VLANs commands.
Index overview PPP in Report Manager 24-9 in tickets window 24-12 service 24-9 DHCP service profile overview C 24-7 24-1 QoS profile cable 24-16 service groups CMTS 24-13 service policies 24-13 diagnosing viewing DSL 27-1 27-1 fiber node 24-6 27-10 MAC domain 24-5 user role required 27-1 DOCSIS subscriber access points 24-2 overview 12-73 viewing properties for VLANs Broadband Access (BBA) groups 12-70 24-3 27-5 user roles required 27-2 wideband channels 27-8 Carri
Index GUI 4-1 Chinese characters in business tags jobs 4-68 Circuit Emulation Services over PSN. See CESoPSN overview Cisco Discovery Protocol (CDP) properties 1-3, 4-1 processes, check in logical inventory 4-68 setup tasks in physical inventory Configuration Management device groups devices viewing 4-5 12-6 12-8 12-6 clearing and removing tickets 4-9 9-16 clock 4-4 Prime Network user roles commands (MToP) 4-3 create ESMC global 4-69 20-55 CDP.
Index delete AAA group 22-12 modify AAA group 22-12 ACS. See ACS commands CFM. See CFM commands E-LMI. See E-LMI commands L-OAM. See L-OAM commands cable FabricPath (data center). See FabricPath commands DEPI and L2TP. See DEPI and L2TP commands GPRS/UMTS interfaces. See interfaces commands APN. See APN commands ports. See ports commands eGTP. See eGTP commands QAM. See QAM configurations GGSN. See GGSN commands show downstream GTPP. See GTPP commands show upstream 27-12 GTPU.
Index SONET. See SONET commands backing up files to archive TDM and channelization. See TDM and channelization commands change logs comparing files ping. See ping commands SBC. See SBC commands show users (Telnet sessions) 1-10 global settings 4-61 4-66 4-13 4-2 restoring file from archive to devices setup tasks VLAN commands. See VLAN commands vPC (data center). See data center commands Y.1731. See Y.1731 commands Y.1731 IPSLA. See Y.
Index vPC pinging show port channel capacity show vPC 5-28 right-click menu 26-7 satellite 26-7 show vPC consistency parameter Defined Not Started, VNE investigation state 3-22, 4-41 setting up 26-7 2-21 2-32 1-4 severity indicator 2-18 Dense Wavelength Division Multiplexing. See DWDM software image files.
Index organization show RTPM counters xxiv related documentation xxvii downstream rates, show (cable) 27-12 DSL 14-15 show RTPM threshold 14-15 show wavelength map 14-15 Dynamic Host Configuration Protocol. See DHCP ADSL2. SeeADSL2 cable technologies and 27-1 E VDSL2. See VDSL2 duplication count (tickets) 9-13 EAP profile (ePDG) DWDM EFD discovery commands. See DWDM commands user roles required cross-connects viewing adding G.
Index ESM configuration (MME) EVC 25-151 E-LMI Ethernet flow domains listing all 2-5 configuring renaming 12-42 viewing viewing properties of Ethernet flow point (EFP), viewing properties 15-21 services multiplex 18-11 Ethernet LMI 12-106 shared switching entities viewing properties commands.
Index AAA and GMM properties (SGSN) 25-73, 25-76 advertisement configuration authentication 25-75 commands. See foreign agent commands GTPP. See GTPP GTPU. See GTPU 25-79 registration revocation viewing eGTP. See eGTP 25-78 25-72 proxy mobile overview 25-80 25-4 SGSN. See SGSN 25-72 technologies foreign agent commands create FA GPRS/UMTS networks APN. See APN 25-77 home agent details for overview GPRS/UMTS network GGSN.
Index delete storage server modify CGF MAG 25-29 overview 25-29 modify GTPP 25-53 QCI mapping details (profile) 25-29 modify storage server show CGF 25-62 topology 25-29 viewing 25-29 25-64 25-54 25-55 HSGW commands create HSGW H 25-61 create overload policy History tab (tickets) create PLMN entries 9-11 25-61 25-61 create QCI-QOS mapping home agent AAA and create SPI 25-69 25-61 commands.
Index distributing images to devices I global settings icons overview alarm and ticket badges A-22 A-19 business elements 2-11, A-4 links 3-30, A-7 management states 2-19 4-7 user roles required automatic mode A-10 links and Prime Network Events A-13 Prime Network Vision A-1 reconciliation 4-29 4-69 20-13 accumulating affected parties 2-10, A-2 physical inventory 9-18 9-17 9-17 6-12 proactive mode 9-17 Initializing (VNE management state) 3-9 2-19 Inter-Chassis Communicat
Index device view pane in inventory 3-13 device view pane toolbar General tab in Prime Network 3-14 support in Prime Network 3-12 Network Events tab user roles required 3-15 17-2 17-2 IS-IS 3-9, 3-11 physical inventory commands 3-19, 3-21 create ISIS address family 3-13, 3-23 Provisioning Events tab ticket and events pane Tickets tab 17-4 17-1 viewing IPv6 information 3-9 Ports tab 17-1 notes, for viewing IPv6 addresses 3-27 navigation pane overview 17-2 IPv6 VPN over MPLS (6
Index Link OAM properties 6-4 commands.
Index endpoints customizing 18-14 lockout state Ethernet services, adding 18-6 on Ethernet links 2-40 filtering links 18-11 redundancy service properties Working and Protected 18-14 link icons 5-25 A-10 NE icons, zooming in and out 18-5 LTE networks network elements in ePDG. See ePDG opening foreign agent. See foreign agent overlays callouts HSGW.
Index viewing properties monitoring services 12-29 mLDP NDP table database, viewing neighbors, viewing overview 18-34 PathTracer and 18-42 18-26 11-29 pseudowire end-to-end emulation tunnels, viewing 18-50 18-43 18-42 pseudowire over GRE, properties MLPPP link properties rate limit information 20-29 MLPPP properties routing entities 20-26 create policy accounting 25-138 create QCI-QoS mapping delete policy accounting 25-138 25-138 modify policy accounting configuration details 25-
Index update global configuration multicast profiles 18-54 MPLS-TP tunnels adding to maps 18-5 applying overlays 18-16 BFD sessions, viewing properties discovery labeling 19-5 PIM 19-7 LSP lockout state 19-4 19-1 routing entities locking and unlocking (bulk) viewing iPv6 overview 18-54 19-10 supported network elements 18-56 user roles required 18-6 19-1 19-2 multicast label switching.
Index viewing for VLANs operating system information properties for VPNs 3-31 See also devices 5-24 Ethernet service Network Events tab pseudowire inventory window removing 3-15 link properties window Notes tab (tickets) 18-25 in maps 3-6 12-62 viewing 6-12 VLAN 9-14 NRI properties (SGSN) NTP commands add NTP server command 12-90, 12-98 12-62 5-24 12-45 removing 25-38 1-6 remove NTP server command 12-108 12-62 REP information 12-63 STP information 12-66 viewing STP link
Index VLAN bridge create PDSN 11-10 Layer 2 TP path information 25-105 delete PCF security entry 11-28 Layer 2 VPNs 11-32 delete PDSN 25-105 Layer 3 VPNs 11-32 modify GRE 25-105 opening modify IP source violation 11-3 overview 25-105 modify MSID 11-1, 11-2 path trace 25-105 modify PCF parameters 25-105 from inventory 11-7 modify PCF security entry from map view 11-5 modify PDSN 25-105 25-105 options for starting 11-5 modify policy QinQ path information 11-27 modify PPP
Index PDSN System tab 25-100 polling, initiating tickets.
Index pseudowires adding 12-90 applying overlay display pseudowire ping pseudowire 12-95, 12-120 associated VRF entity view configuration pinging 27-13 show RF profile 27-13 27-5 25-138 QoS, configuration (PDSN) quick view, for links 12-105 25-48 25-101 6-7 12-102 12-90 R 12-90 12-120 RADIUS redundancy service properties 12-96 viewing AAA and 22-1 commands endpoint properties properties 12-87 add RADIUS server 12-93 12-96 tunnel links in VPLS overlays 12-82 VCCV and CC inf
Index home agent (LTE networks) related documentation Software Version Summary by device 25-71 Software Version Summary by version xxvii REP maximum concurrent reports icons and badges primary badge 10-39 Detailed Event Count (by device) 3-9, A-22 primary blocking badge Detailed Service Events 3-9, A-22 show REP segment information (command) 12-119 viewing for VLAN service link properties in VLAN domain views Detailed Syslogs 10-15 Detailed Tickets 10-16 Detailed Traps 12-64 10-15 1
Index show route access lists show route map 25-138 DBE properties 21-4 H.
Index delete Codec list update SIP header profile 21-18 delete Codec list entry update SIP header profile entry 21-18 update Codec list entry add SIP option profile delete SIP option profile 21-18 SBC commands, performance statistics show H.
Index service properties NRI show PM section counters show PM trace details 25-38 session management view properties 20-53 show TCA threshold 25-39 20-53 20-53 See also TDM and channelization commands 25-32 Spanning Tree Protocol.
Index Notes tab T toolbar T3 DS1 and DS3, viewing properties 20-21 TACACS commands 9-14 9-10 tickets acknowledging add TACACS+ server 1-6 alarm count add TACACS server badges remove TACACS+ server 1-6 9-6 A-22 clearing remove TACACS server 9-15 9-15 clearing and removing tag manipulations, for associated VLANs 12-55 TDM and channelization commands Details tab 8-15 duplication count 9-6 configure AU3 20-57 EFP severities and configure AU4 20-57 filtering configure AUG mappi
Index U UCS VDSL2 28-1 Y.1731 16-2 26-32 UNI (E-LMI), configure 15-18, 15-20 Unified Computing System (UCS) devices.
Index hypervisor overview 26-36 network discovery and 26-26 viewing properties 26-32 vCenter and switching entities 26-28 viewing map node overlays 26-12, 26-19, 26-46 virtual network devices, viewing 26-29 virtual storage area network (VSAN). See VSAN VMware and VSG 12-63 viewing STP information 12-66 overview 12-46 removing 12-52 12-62 tag manipulations for associations 26-30 trunk groups 26-30 virtual port channel.
Index Unsupported properties, viewing 2-21 VNEs 18-26 removing from maps communication state badges investigation state badges management state sites A-20 virtual routers 2-19 modifying properties 3-16 updating information 3-18 18-18 18-27 VRFs commands viewing communication status viewing properties 18-27 viewing in maps A-20 3-17 3-16 vPC create VRF 25-138 delete VRF 18-53 modify VRF commands (data center) ping VRF show port channel capacity show vPC 1-9 traceroute VRF 26
Index Y Y.1731 commands configure IP SLA parameters 16-4 configure probe endpoint association configure profile 16-4 create on demand probe configuration deassociate profile 16-4 16-4 delete IP SLA parameters delete profile 16-4 show IP SLA 16-4 show SLA operations detail show SLA profiles 16-4 16-4 16-4 performance management probes 16-4 16-1 16-2, 16-4 technology overview user roles required 16-1 16-2 Cisco Prime Network 4.
Index Cisco Prime Network 4.